You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/get-started/pages/release-notes/helm-charts.adoc
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,20 @@ The connectors subchart has been removed from the Helm chart because it is not o
44
44
45
45
TIP: For a supported and scalable Kafka Connect alternative, consider using Redpanda Connect. For more information, see xref:redpanda-connect:get-started:index.adoc[].
46
46
47
+
=== Reference Kubernetes Secrets and ConfigMaps for Redpanda cluster configuration
48
+
49
+
You can now set any Redpanda cluster configuration property using the new `extraClusterConfig` field. This allows you to reference values from Kubernetes Secrets or ConfigMaps. For example, use this field to inject sensitive credentials or reuse shared configurations across features like Tiered Storage, Iceberg, and disaster recovery.
50
+
51
+
This enhancement improves:
52
+
53
+
- Security: Avoid hardcoding secrets in Helm values or manifests.
54
+
55
+
- Reusability: Centralize common values used by multiple features.
56
+
57
+
- Maintainability: Better integrate with GitOps workflows and Kubernetes-native resource management.
58
+
59
+
See xref:manage:kubernetes/k-configure-helm-chart.adoc#extra-cluster-config[Set Redpanda cluster properties from Kubernetes Secrets or ConfigMaps].
60
+
47
61
== Redpanda chart v5.10.x
48
62
49
63
=== Ability to change StatefulSet replicas without restarting brokers
Copy file name to clipboardExpand all lines: modules/get-started/pages/release-notes/operator.adoc
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,6 +72,20 @@ The connectors subchart has been removed from the Helm chart because it is not o
72
72
73
73
TIP: For a supported and scalable Kafka Connect alternative, consider using Redpanda Connect. For more information, see xref:redpanda-connect:get-started:index.adoc[].
74
74
75
+
=== Reference Kubernetes Secrets and ConfigMaps for Redpanda cluster configuration
76
+
77
+
You can now set any Redpanda cluster configuration property using the new `extraClusterConfig` field. This allows you to reference values from Kubernetes Secrets or ConfigMaps. For example, use this field to inject sensitive credentials or reuse shared configurations across features like Tiered Storage, Iceberg, and disaster recovery.
78
+
79
+
This enhancement improves:
80
+
81
+
- Security: Avoid hardcoding secrets in Helm values or manifests.
82
+
83
+
- Reusability: Centralize common values used by multiple features.
84
+
85
+
- Maintainability: Better integrate with GitOps workflows and Kubernetes-native resource management.
86
+
87
+
See xref:manage:kubernetes/k-configure-helm-chart.adoc#extra-cluster-config[Set Redpanda cluster properties from Kubernetes Secrets or ConfigMaps].
== Set Redpanda cluster properties from Kubernetes Secrets or ConfigMaps
215
+
216
+
Starting in v25.1.1 of the Redpanda Operator and Redpanda Helm chart, you can set **any Redpanda cluster configuration property** by referencing Kubernetes Secrets or ConfigMaps using the `config.extraClusterConfig` field.
217
+
218
+
This feature provides a more secure, maintainable, and declarative way to manage sensitive or shared configuration values across your Redpanda deployment.
219
+
220
+
Use this method to:
221
+
222
+
- Securely inject sensitive values, such as credentials for Iceberg, TLS, or object storage.
223
+
- Reuse the same value across multiple features, such as Tiered Storage, Iceberg, and disaster recovery, without duplication.
224
+
- Centralize config management in Kubernetes-native resources to support GitOps and reduce drift.
225
+
226
+
For example, to set `iceberg_rest_catalog_client_secret` using a Secret called `iceberg-config`:
. Remove the configuration key you want to reset from `spec.clusterSpec.config`.
327
+
328
+
With this annotation, the Redpanda Operator ensures that removed keys are also removed from the Redpanda cluster configuration.
329
+
330
+
331
+
If this annotation is not set, the Redpanda Operator retains previously applied values even if you remove them from the custom resource.
332
+
333
+
--
334
+
CLI::
335
+
+
336
+
--
337
+
338
+
To reset a configuration property using the Redpanda CLI:
339
+
340
+
- Run the xref:reference:rpk/rpk-cluster/rpk-cluster-config-set.adoc[`rpk cluster config set`] command with an empty string:
341
+
342
+
[source,bash]
343
+
----
344
+
rpk cluster config set <property> ""
345
+
----
346
+
347
+
- Or, use the xref:reference:rpk/rpk-cluster/rpk-cluster-config-edit.adoc[`rpk cluster config edit`] command and delete the line for the property.
348
+
349
+
If you're using a file, such as a `values.yaml` or a Redpanda resource, to manage your configuration, make sure to also remove the property from that file. Otherwise, it may be reapplied the next time you run `helm upgrade` or the Pods restart.
350
+
351
+
--
352
+
======
353
+
213
354
== Configure Redpanda Console
214
355
215
356
Redpanda Console is included as a subchart of the Redpanda Helm chart.
Starting in Redpanda Operator v25.1.1, you can configure object storage settings using `extraClusterConfig`. This lets you securely reference sensitive values from Kubernetes Secrets or ConfigMaps, and reuse values like your bucket name across multiple features, such as Tiered Storage, Iceberg, and topic recovery.
4
+
5
+
See xref:manage:kubernetes/k-configure-helm-chart.adoc#extra-cluster-config[Set Redpanda cluster properties from Kubernetes Secrets or ConfigMaps].
CAUTION: Do not set an object storage property to an empty string (`""`) or `null` to reset it. This may result in invalid or incomplete configuration. For safe ways to reset a property, see xref:manage:kubernetes/k-configure-helm-chart.adoc#reset-config[Reset configuration values].
Copy file name to clipboardExpand all lines: modules/manage/partials/tiered-storage.adoc
+29-13Lines changed: 29 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ rpk cluster license info
33
33
- Migrating topics from one bucket or container to another is not supported.
34
34
- Multi-region buckets or containers are not supported.
35
35
36
-
CAUTION: Redpanda strongly recommends that you do not re-enable Tiered Storage after previously enabling and disabling it. Re-enabling Tiered Storage can result in inconsistent data and data gaps in Tiered Storage for a topic.
36
+
CAUTION: Redpanda Data recommends that you do not re-enable Tiered Storage after previously enabling and disabling it. Re-enabling Tiered Storage can result in inconsistent data and data gaps in Tiered Storage for a topic.
37
37
38
38
== Set up Tiered Storage
39
39
@@ -50,14 +50,18 @@ Redpanda natively supports Tiered Storage with Amazon Simple Storage Service (S3
50
50
ifdef::env-kubernetes[]
51
51
==== Amazon S3
52
52
53
-
TIP: If deploying Redpanda on an AWS Auto-Scaling group (ASG), keep in mind that the ASG controller terminates nodes and spins up replacements if the nodes saturate and are unable to heartbeat the controller (based on the EC2 health check). For more information, see the https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/monitoring-system-instance-status-check.html#types-of-instance-status-checks[AWS documentation^]. Redpanda recommends deploying on Linux or Kubernetes. For more information, see xref:deploy:deployment-option/self-hosted/index.adoc[Deploy Redpanda].
53
+
[NOTE]
54
+
====
55
+
If you deploy Redpanda directly on AWS EC2 instances managed by an Auto-Scaling Group (ASG), be aware that ASG may terminate and replace instances based on system-level health checks. This can result in unexpected Redpanda broker terminations, risking availability or data loss.
54
56
55
-
You can configure access to Amazon S3 with either an IAM role attached to the instance or with access keys.
57
+
Redpanda Data recommends deploying on Kubernetes or using other orchestrators that understand Redpanda's stateful nature and can handle Pod lifecycle and storage gracefully.
56
58
57
-
[TIP]
59
+
See xref:deploy:deployment-option/self-hosted/index.adoc[Deploy Redpanda] for deployment best practices.
58
60
====
61
+
62
+
You can configure access to Amazon S3 with either an IAM role attached to the instance or with access keys.
63
+
59
64
If you need to manage and store encryption keys separately from your cloud provider, you can <<configure-access-with-an-aws-kms-key,configure access to an AWS S3 bucket that Redpanda Tiered Storage uses to leverage your AWS KMS key (SSE-KMS)>> instead of the default AWS S3-managed key (SSE-S3). This option enables you to segregate data from different teams or departments and remove that data at will by removing the encryption keys.
60
-
====
61
65
62
66
===== **Configure access with an IAM role**
63
67
@@ -135,11 +139,13 @@ Replace the following placeholders:
135
139
- `<region>`: The region of your S3 bucket.
136
140
- `<redpanda-bucket-name>`: The name of your S3 bucket.
137
141
+
138
-
CAUTION: Do not set an object storage property to an empty string `""` or to `null` as a way to reset it to its default value.
NOTE: The `serviceAccount` annotations and the `statefulset` Pod labels are essential for the Azure webhook to inject the necessary Azure-specific environment variables and the projected service account token volume into the pods. For more information, visit https://learn.microsoft.com/en-us/azure/aks/workload-identity-overview?tabs=dotnet[Microsoft Entra Workload ID with Azure Kubernetes Service (AKS)^].
580
+
The `serviceAccount` annotations and the `statefulset` Pod labels are essential for the Azure webhook to inject the necessary Azure-specific environment variables and the projected service account token volume into the pods. For more information, visit https://learn.microsoft.com/en-us/azure/aks/workload-identity-overview?tabs=dotnet[Microsoft Entra Workload ID with Azure Kubernetes Service (AKS)^].
567
581
568
-
CAUTION: Do not set an object storage property to an empty string `""` or to `null` as a way to reset it to its default value.
- For information about how to grant access from an internet IP range (if you need to open additional routes/ports between your broker nodes and Azure Blob Storage; for example, in a hybrid cloud deployment), see the https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&bc=%2Fazure%2Fstorage%2Fblobs%2Fbreadcrumb%2Ftoc.json&tabs=azure-portal#grant-access-from-an-internet-ip-range[Microsoft documentation^].
- `storage.tiered`: Make sure to configure the target cluster with the same Tiered Storage settings as the failed source cluster.
154
154
- `config.cluster.cloud_storage_attempt_cluster_restore_on_bootstrap`: Automate cluster restore in Kubernetes. Setting to `true` is recommended when using an automated method for deployment. When bootstrapping a cluster with a given bucket, make sure that any previous cluster using the bucket is fully destroyed, otherwise Tiered Storage subsystems may interfere with each other.
0 commit comments