You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/embeds/supported-platforms-embed.md
+10-3Lines changed: 10 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,33 @@
1
1
2
-
Redis Enterprise Software (RS) is supported on several operating systems, cloud environments, and virtual environments.
2
+
Redis Enterprise Software is supported on several operating systems, cloud environments, and virtual environments.
3
3
4
4
{{< note >}}
5
5
Make sure your system meets these requirements:
6
6
7
7
- Only 64-bit operating systems are supported.
8
8
- You must install Redis Enterprise Software directly on the host, not through system cloning.
9
-
- You must install on a clean host with no other applications running so that all RAM is allocated to the OS and RS only.
9
+
- You must install on a clean host with no other applications running so that all RAM is allocated to the OS and Redis Enterprise Software only.
10
10
- Linux distributions must be installed with at least "Minimal Install" configuration.
11
11
{{< /note >}}
12
12
13
13
|**Platform**|**Versions/Information**|
14
14
|------------|-----------------|
15
15
| Ubuntu | 14.04 (Support ends on November 30, 2020)<br>16.04, 18.04<br>Server version is recommended for production installations. Desktop version is only recommended for development deployments. |
16
16
| RHEL/CentOS 6 | 6.7, 6.8, 6.9 (Support ends on November 30, 2020) |
| Oracle Linux 6 | Based on the corresponding RHEL version |
19
19
| Oracle Linux 7 | Based on the corresponding RHEL version |
20
20
| Amazon Linux | Version 1 |
21
21
| Docker |[Docker images]({{< relref "/rs/getting-started/getting-started-docker.md" >}}) of Redis Enterprise Software are certified for Development and Testing only. |
22
22
| Kubernetes | See the [Platform documentation]({{< relref "/kubernetes/_index.md" >}}) |
23
23
24
+
Be aware that Redis Enterprise Software relies on certain components that require support from the operating system. You cannot enable support for components, services, protocols, or versions that aren't supported by the operating system running Redis Enterprise Software. In addition, updates to the operating system or to Redis Enterprise Software can impact component support.
25
+
26
+
To illustrate, version 6.2.8 of Redis Enterprise Software removed support for TLS 1.0 and TLS 1.1 on Red Hat Enterprise Linux 8 (RHEL 8) because that operating system [does not enable support](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening) for these versions by default.
27
+
28
+
If you have trouble enabling specific components, features, or versions, verify that they're supported by your operating system and that they're configured correctly.
29
+
30
+
24
31
## VMware
25
32
26
33
Redis Enterprise is compatible with VMware, but make sure that you:
Redis Enterprise Software (RS) uses self-signed certificates out-of-the-box to make sure that the product is secure by default.
10
+
Redis Enterprise Software uses self-signed certificates out-of-the-box to make sure that the product is secure by default.
11
11
The self-signed certificates are used to establish encryption-in-transit for the following traffic:
12
12
13
13
- Management admin console (CM) - The certificate for connections to the management admin console
@@ -16,7 +16,7 @@ The self-signed certificates are used to establish encryption-in-transit for the
16
16
- Syncer - The certificate for Active-Active and Replica Of synchronization between clusters
17
17
- Metrics exporter - The certificate to export metrics to Prometheus
18
18
19
-
These self-signed certificates are generated on the first node of each RS installation and are copied to all other nodes added to the cluster.
19
+
These self-signed certificates are generated on the first node of each Redis Enterprise Software installation and are copied to all other nodes added to the cluster.
20
20
21
21
When you use the default self-signed certificates and you connect to the admin console over a web browser, you'll seen an untrusted connection notification.
22
22
@@ -28,7 +28,7 @@ When you update the certificates, the new certificate replaces the same certific
28
28
29
29
## How to update TLS certificates
30
30
31
-
You can use either the rladmin CLI or the REST API to update the certificates.
31
+
You can use either the rladmin command-line interface (CLI) or the REST API to update the certificates.
- cert_name - The name of the certificate to replace:
69
-
- For management UI: `cm`
69
+
- For management admin console: `cm`
70
70
- For REST API: `api`
71
71
- For database endpoint: `proxy`
72
72
- For syncer: `syncer`
@@ -83,7 +83,7 @@ Where:
83
83
84
84
The new certificates are used the next time the clients connect to the database.
85
85
86
-
When you upgrade RS, the upgrade process copies the certificates that are on the first upgraded node to all of the nodes in the cluster.
86
+
When you upgrade Redis Enterprise Software, the upgrade process copies the certificates that are on the first upgraded node to all of the nodes in the cluster.
87
87
88
88
### Update syncer certificates for Active-Active databases
TLS protocols and ciphers define the overall suite of algorithms that clients are able to connect to the servers with. You can change the TLS protocols and ciphers to improve the security posture of your RS cluster and databases. The default settings are in line with industry best practices, but you can customize them to match the security policy of your organization.
108
+
TLS protocols and ciphers define the overall suite of algorithms that clients are able to connect to the servers with. You can change the TLS protocols and ciphers to improve the security posture of your Redis Enterprise cluster and databases. The default settings are in line with industry best practices, but you can customize them to match the security policy of your organization.
109
109
110
110
The communications for which you can modify TLS protocols and ciphers are:
111
111
@@ -115,6 +115,12 @@ The communications for which you can modify TLS protocols and ciphers are:
115
115
116
116
You can configure the TLS protocols and ciphers with the `rladmin` commands shown here, or with the REST API.
117
117
118
+
Be aware that TLS support depends on the operating system. You cannot enable support for protocols or versions that aren't supported by the operating system running Redis Enterprise Software. In addition, updates to the operating system or to Redis Enterprise Software can impact protocol and version support.
119
+
120
+
To illustrate, version 6.2.8 of Redis Enterprise Software removed support for TLS 1.0 and TLS 1.1 on Red Hat Enterprise Linux 8 (RHEL 8) because that operating system [does not enable support](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening) for these versions by default.
121
+
122
+
If you have trouble enabling specific versions of TLS, verify that they're supported by your operating system and that they're configured correctly.
123
+
118
124
### TLS protocol for the control plane
119
125
120
126
To set the minimum TLS protocol for the control plane:
@@ -178,7 +184,7 @@ For your changes to take effect on the discovery service, restart the service wi
178
184
supervisorctl restart sentinel_service
179
185
```
180
186
181
-
After you set the minimum TLS version, RS does not accept communications with
187
+
After you set the minimum TLS version, Redis Enterprise Software does not accept communications with
0 commit comments