Redis Enterprise for Kubernetes 8.0.10-21 (February 2026) release notes
Feature release with OSS Cluster API support for external clients, ARM architecture support, and Redis Software 8.0.10-64.
| Redis Enterprise for Kubernetes |
|---|
Redis Enterprise for Kubernetes 8.0.10-21 is a feature release that supports Redis Software 8.0.10-64 and includes new features and enhancements.
Highlights
- OSS Cluster API support for external clients
- ARM architecture support
- Redis Software 8.0.10-64 support
Enhancements
- Added OSS Cluster API support for external clients
- Added ARM architecture support
- Added Vault secret support for user-defined modules
- Added
extraLabelsinjection to resources created by the services rigger - Added
clusterCredentialSecretNamecustomization with Kubernetes secrets - REC username default value now derives from the cluster credentials secret
- Added Kubernetes 1.35 support on select platforms
Resolved issues
- Fixed invalid
containerStatusesindexing caused by incorrect order assumption - Removed unnecessary update calls from the services rigger to load balancers
- Fixed multiple security issues
API changes
| CRD | Field | Change | Description |
|---|---|---|---|
| REDB | spec.ossClusterSettings |
Added | Additional OSS cluster mode settings. |
| REDB | spec.ossClusterSettings.enableExternalAccess |
Added | Toggles whether this database supports external access in OSS cluster mode. When enabled, advertised database topology includes the external endpoints for the Redis Enterprise nodes hosting the database shards. The external access mechanism (such as LoadBalancer services) is configured using the ossClusterSettings.externalAccessType field of the RedisEnterpriseCluster. When external access is enabled, the corresponding database secret will have the list of primary shard IPs in the oss_startup_nodes field. |
Supported distributions
The following table shows supported distributions at the time of this release. You can also find this list in Supported Kubernetes distributions.
✅ Supported – This distribution is supported for this version of Redis Enterprise Software for Kubernetes.
⚠️ Deprecated – This distribution is still supported for this version of Redis Enterprise Software for Kubernetes, but support will be removed in a future release.
❌ End of life – Support for this distribution ended.
Any distribution not listed in the table is not supported for production workloads.
| Kubernetes version | 1.30 | 1.31 | 1.32 | 1.33 | 1.34 | 1.35 |
|---|---|---|---|---|---|---|
| Community K8s | ⚠️ | ✅ | ✅ | ✅ | ||
| Amazon EKS | ⚠️ | ✅ | ✅ | |||
| Azure EKS | ⚠️ | ✅ | ✅ | |||
| Google GKE | ⚠️ | ✅ | ✅ | ✅ | ||
| Rancher REK2 | ❌ | ⚠️ | ✅ | ✅ | ||
| VMware VKS | ✅ | |||||
| OpenShift | 4.17 | 4.18 | 4.19 | 4.20 | ||
| --- | --- | --- | --- | --- | --- | |
| ⚠️ | ✅ | ✅ | ✅ | |||
| VMware TKGI | 1.21 | 1.22 | 1.23 | |||
| --- | --- | --- | --- | --- | --- | |
| ⚠️ | ✅ | ✅ |
Downloads
- Redis Enterprise:
redislabs/redis:8.0.10-64 - Operator:
redislabs/operator:8.0.10-21 - Services Rigger:
redislabs/k8s-controller:8.0.10-21 - Callhome client:
redislabs/re-call-home-client:8.0.10-21 - Redis Enterprise operator bundle:
8.0.10-21.0
Known limitations
New limitations
- SSO configuration does not work with IPv6 or dual-stack (IPv4/IPv6) clusters.
Existing limitations
-
Upgrades from versions earlier than 7.4.2-2 are not supported. If you use an earlier version, upgrade to 7.4.2-2 before upgrading to 8.0.10-21.
-
Missing endpoint for admission endpoint (rare). (RED-119469) Restart the operator pod.
-
The REDB
redisVersionfield cannot be used for memcached databases. (RED-119152) -
Modifying the database suffix for an Active-Active database while the services rigger is terminating causes a loop. (RED-107687) The services rigger deletes and recreates ingress or route resources repeatedly. Wait for the services rigger pod to finish terminating before modifying the suffix.
-
REAADB changes might fail with "gateway timeout" errors, especially on OpenShift. (RED-103048) Retry the operation.
-
Creating two databases with the same name in the Redis Enterprise Cluster Manager UI deletes the service and makes the database unavailable. (RED-99997) Avoid duplicate database names. The admission controller prevents duplicate names when you create databases through the Kubernetes operator.
-
Installing the operator bundle produces the warning
Warning: would violate PodSecurity "restricted: v1.24". (RED-97381) Ignore this warning. Red Hat documentation identifies this issue as benign. -
RERC resources must have a unique name. (RED-96302) The
rec-name/rec-namespacestring must differ from all other participating clusters in the Active-Active database. -
Admission does not block REAADB resources with a
shardCountthat exceeds the license quota. (RED-96301) Correct the REAADB configuration and reapply. -
The Active-Active controller supports only global database options. (RED-86490) Location-specific configuration is not supported.
-
Removing an Active-Active setup might leave services or routes undeleted. (RED-77752) Delete the services or routes manually.
-
Setting
autoUpgradetotruecan cause unexpected database upgrades whenredisUpgradePolicyis alsotrue. (RED-72351) Contact support if your deployment is affected. -
Using the previous quick start guide causes REDB creation issues due to an unrecognized memory field name. (RED-69515) Use the current version of the Deploy Redis Enterprise Software for Kubernetes guide.
-
PVC size does not work with decimal values. (RED-62132) Use integer values for the PVC size.
-
REC might report error states on initial startup. (RED-61707) No workaround exists. Ignore the errors.
-
HashiCorp Vault integration does not support Gesher. (RED-55080) No workaround exists. Gesher support is deprecated.
-
REC clusters fail to start on Kubernetes clusters with unsynchronized clocks. (RED-47254) Use NTP to synchronize the underlying Kubernetes nodes.
-
Deleting an OpenShift project with a deployed REC might hang. (RED-47192) When an REC cluster is deployed in a project (namespace) with REDB resources, you must delete the REDB resources before deleting the REC. The project deletion hangs until you delete the REDB resources. Delete the REDB resources first, then delete the REC, and then delete the project.
-
Clusters must be named "rec" in OLM-based deployments. (RED-39825) When you deploy the operator through OLM, the security context constraints (SCC) are bound to a specific service account name ("rec"). The deployment fails if the cluster has a different name.
-
Readiness probe does not correctly report failures. (RED-39300) The StatefulSet readiness probe does not mark a node as "not ready" when running
rladmin statuson node failure. -
Internal DNS and Kubernetes DNS might conflict. (RED-37462) DNS conflicts can occur between the cluster
mdns_serverand Kubernetes DNS. This affects only DNS resolution from within cluster nodes for Kubernetes DNS names. -
Kubernetes-based 5.4.10 clusters might negatively affect existing 5.4.6 clusters. (RED-37233) Upgrade your clusters to the latest version.
-
Node CPU usage is reported instead of pod CPU usage. (RED-36884) The reported CPU usage is for the Kubernetes worker node hosting the REC pod, not the pod itself.
-
An unreachable cluster shows status as running. (RED-32805) When a cluster is unreachable, the status remains
runninginstead of showing an error. -
Long cluster names cause routes to be rejected. (RED-25871) A cluster name longer than 20 characters causes route rejection because the host part of the domain name exceeds 63 characters. Limit the cluster name to 20 characters or fewer.
-
Cluster CR (REC) errors are not reported after invalid updates. (RED-25542) A cluster CR specification error is not reported if you update two or more invalid CR resources in sequence.