Redis Enterprise Software 发行说明 6.2.18-43(2022 年 9 月)

数据库审计。私钥加密。MEMORY USAGE 命令的主动-主动数据库支持。对 crdb-cli 的改进。

Redis 企业软件

Redis 企业软件版本 6.2.18 现已推出!

此版本的 Redis 企业软件提供:

  • RedisJSON on Active-Active 正式发布
  • 数据库连接审计
  • 私钥加密
  • 主动-主动支持memory usage命令
  • crdb-cli改进
  • 与开源 Redis v6.2.6 的兼容性
  • 其他增强功能和修复

下表显示了可用软件包的 MD5 校验和:

MD5 校验和(6.2.18-43 9 月版)
Ubuntu 16 版本 055973eb7009073b0c199ec1dfd81018
Ubuntu 18 的 8c37c6ae10b0ae4956e3c11db80d18ce
RedHat Enterprise Linux (RHEL) 7
Oracle Enterprise Linux (OL) 7
c770a66d9bfdd8734f1208d64aa67784
RedHat Enterprise Linux (RHEL) 8
Oracle Enterprise Linux (OL) 8
85eb6339f837205d83f215e32c1d028f

新增功能和增强功能

使用 RedisJSON 的主动-主动数据库正式发布

将 RedisJSON 与 RediSearch 结合使用时,主动-主动数据库现在支持对嵌套 JSON 文档进行索引、查询和全文搜索。

数据库连接审计

您现在可以审核数据库连接和身份验证事件,以跟踪活动并对其进行故障排除。管理员现在可以使用第三方系统实时跟踪和分析连接事件。

私钥加密

启用后,私钥加密将加密存储在集群配置存储 (CCS) 中的私钥。私钥使用安全、独立的内部流程进行加密。数据库必须至少为 6.2.2 或更高版本才能使用此功能。

对 MEMORY USAGE 命令的主动-主动支持

Redis Enterprise 主动-主动数据库现在支持 MEMORY USAGE 命令,该命令简化了故障排除,并允许应用程序检测异常行为和危险趋势。 要了解更多信息,请参阅Active-Active with RedisJSON.

MEMORY USAGE 报告键及其值的 RAM 内存使用情况(以字节为单位)。结果包括为数据值分配的内存以及与键关联的管理开销。

crdb-cli改进

crdb-cli用于管理主动-主动数据库的实用程序现在允许更深入地了解管理作,从而更轻松地调查和排除问题。您现在可以使用:

  • crdb-cli task list检索有关集群上所有主动-主动数据库的当前和先前任务的详细信息

  • crdb-cli task --task-id <task-id>以获取有关特定任务的详细信息。

要了解更多信息,请参阅crdb-cli

Redis 模块

Redis Enterprise Software v6.2.18-43(9 月版)包括以下 Redis 模块:

请参阅升级模块以了解如何升级数据库的模块。

其他增强功能

  • 添加了对主动-主动数据库上的 MODULE LIST 命令的支持

  • 增强了 CRDB-CLI 工具输入参数的有效性检查

  • Syncer 滞后计算已得到改进,并修复了多个错误计算

  • 支持包包括主动-主动数据库的其他信息

  • 添加了通过运行

    rladmin info db [{db:<id> | <name>}]

    要了解更多信息,请参阅分布式同步

版本变更

重大更改

RS84006 - 使用 REST API 创建数据库时,这组特定条件可能会导致错误:

  • 已启用分片
  • oss_sharding 和 implicit_shard_key 均已停用
  • 定义 shard_key_regex

如果发生这种情况,数据库终端节点将返回(error) ERR key "test" does not match any rule.

要解决此问题,请执行下列作之一:

  • 显式定义 shard_key_regex
  • 启用 oss_sharding 或 implicit_shard_key(同时启用两者也有效)

先决条件和说明

  • 您可以从 Redis Enterprise Software v6.0 及更高版本升级到 v6.2.18

  • 请参阅 v6.2.4 发行说明,了解有关对升级策略所做的更改以及这些更改可能如何影响您的体验的重要说明。

  • 不支持从 v6.0 之前的版本升级。

  • 如果您计划将集群升级到 RHEL 8,请参阅 v6.2.8 发行说明以了解已知限制。

弃用

主动-主动数据库持久性

用于主动-主动数据库数据持久性的快照选项将在 Redis Enterprise Software 的未来版本中弃用。如果您的数据库使用快照暂留,我们强烈建议您切换到 AOF 暂留。用crdb-cli为此,请执行以下作:

crdb-cli crdb update --crdb-guid <CRDB_GUID> --default-db-config '{"data_persistence": "aof", "aof_policy":"appendfsync-every-sec"}'

TLS 1.0 and TLS 1.1

TLS 1.0 and TLS 1.1 connections are considered deprecated in favor of TLS 1.2 or later.

Please verify that all clients, apps, and connections support TLS 1.2. Support for the earlier protocols will be removed in a future release.

Certain operating systems, such as RHEL 8, have already removed support for the earlier protocols. Redis Enterprise Software cannot support connection protocols that are not supported by the underlying operating system.

3DES encryption cipher

The 3DES encryption cipher is considered deprecated in favor of stronger ciphers like AES.

Please verify that all clients, apps, and connections support the AES cipher. Support for 3DES will be removed in a future release.

Certain operating systems, such as RHEL 8, have already removed support for 3DES. Redis Enterprise Software cannot support cipher suites that are not supported by the underlying operating system.

Product lifecycle updates

Redis Enterprise Software v6.0.x reached end-of-life (EOL) on May 31, 2022.

EOL of Redis Enterprise Software 6.2.x was reset to occur 18 months after the release of version 6.4, in accordance with the updated EOL policy. The new EOL date is August 31, 2024.

To learn more, see the Redis Enterprise Software product lifecycle, which details the release number and the end-of-life schedule for Redis Enterprise Software.

For Redis modules information and lifecycle, see Module lifecycle.

Resolved issues

  • RS64002 - Fixes email alerts for LDAP mappings.
  • RS79519 - fixes a bug that prevented Administrators from editing an Active-Active database using the API with username instead of email as their identifier.
  • RS78039 - fixes a bug that caused the sync between two shards to pause when resetting a shard's data which can be when performing full sync or importing an RDB.
  • RS73454 - Updates internal timeouts to enable faster resharding.
  • RS75783 - Fixes failover due to false identification of dead nodes when master node goes down.
  • RS75206, RS52686 - Fixes backup_interval_offset in case where the user chose an offset that is higher than backup_interval; Fixes the UI from resetting backup_interval_offset after manual DB configuration.
  • RS75176 - Fixes rare case of stuck state machine during “maintenance off”.
  • RS57200 - Add an IP address to "failed_authentication_attempt" errors.
  • RS56615 - Changed rladmin tune db db_name max_aof_load_time to receive the value in seconds; Added max_aof_load_time option to rladmin help tune.
  • RS54745 - Fixes the Rest API to reject BDB creation using negative integers as a uid.
  • RS46092 - Fixes rlcheck failure when somaxconn policy is a value other than 1024.
  • RS68965, RS80615 - Adds internode encryption ports 3340-3344 to rlcheck connectivity.
  • RS63302 - Adds umask validation for root user when installing.
  • RS46947 - Fixes removal of old installations in install.sh.

Known limitations

Feature limitations

  • RS81463 A shard might crash when resharding an Active-Active database with Auto Tiering . Specifically, the shard will crash when volatile keys or Active-Active tombstone keys reside in Flash memory.

  • RS54131 Running the QUIT command on a TLS connected database closes connection and does not return a +OK reply

Upgrade limitations

Before you upgrade a cluster that hosts Active-Active databases with modules to v6.2.18, perform the following steps:

  1. Use crdb-cli to verify that the modules (modules) and their versions (in module_list) are as they appear in the database configuration and in the default database configuration:

    crdb-cli crdb get --crdb-guid <crdb-guid>
    
  2. From the admin console's redis modules tab, validate that these modules with their specific versions are loaded to the cluster.

  3. If one or more of the modules/versions are missing or if you need help, contact Redis support before taking additional steps.

Security

Open source Redis security fixes compatibility

As part of Redis's commitment to security, Redis Enterprise Software implements the latest security fixes available with open source Redis. The following Open Source Redis CVEs do not affect Redis Enterprise:

  • CVE-2021-32625 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis since Redis Enterprise does not implement LCS. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.4, Redis 6.0.14)

  • CVE-2021-32672 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the LUA debugger is unsupported in Redis Enterprise. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16)

  • CVE-2021-32675 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the proxy in Redis Enterprise does not forward unauthenticated requests. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16)

  • CVE-2021-32762 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the memory allocator used in Redis Enterprise is not vulnerable. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16)

  • CVE-2021-41099 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the proto-max-bulk-len CONFIG is blocked in Redis Enterprise. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16) security fixes for recent CVEs. Redis Enterprise has already included the fixes for the relevant CVEs. Some CVEs announced for Open Source Redis do not affect Redis Enterprise due to different and additional functionality available in Redis Enterprise that is not available in Open Source Redis.

RATE THIS PAGE
Back to top ↑