content/operate/rs/release-notes/rs-6-2-18-releases/rs-6-2-18-43.md
Redis Enterprise Software version 6.2.18 is now available!
This version of Redis Enterprise Software offers:
memory usage commandcrdb-cli improvementsThe following table shows the MD5 checksums for the available packages:
| Package | MD5 checksum (6.2.18-43 September release) |
|---|---|
| Ubuntu 16 | 055973eb7009073b0c199ec1dfd81018 |
| Ubuntu 18 | 8c37c6ae10b0ae4956e3c11db80d18ce |
| RedHat Enterprise Linux (RHEL) 7 | |
| Oracle Enterprise Linux (OL) 7 | c770a66d9bfdd8734f1208d64aa67784 |
| RedHat Enterprise Linux (RHEL) 8 | |
| Oracle Enterprise Linux (OL) 8 | 85eb6339f837205d83f215e32c1d028f |
Active-Active databases now support Index, query, and full-text search of nested JSON documents when combining RedisJSON with RediSearch.
You can now [audit database connection]({{< relref "/operate/rs/security/audit-events" >}}) and authentication events to track and troubleshoot activity. Administrators can now use third-party systems to track and analyze connection events in realtime.
When enabled, private key encryption encrypts private keys stored in the cluster configuration store (CCS). Private keys are encrypted using a secure, self-contained internal process. Databases must be at least version 6.2.2 or later to use this feature.
Redis Enterprise Active-Active databases now support the [MEMORY USAGE]({{< relref "/commands/memory-usage" >}}) command, which simplifies troubleshooting and lets applications detect anomalous behavior and dangerous trends.
To learn more, see [Active-Active with RedisJSON]({{< relref "/operate/oss_and_stack/stack-with-enterprise/json/active-active" >}}).
MEMORY USAGE reports the RAM memory use, in bytes, of a key and its value. The result includes the memory allocated for the data value and the administrative overhead associated with the key.
crdb-cli improvementsThe crdb-cli utility used to manage Active-Active databases now allows greater visibility into management operations to make it easier to investigate and troubleshoot problems. You can now use:
crdb-cli task list to retrieve details about current and previous tasks for all Active-Active databases on a cluster
crdb-cli task --task-id <task-id> to get detailed information about a specific task.
To learn more, see [crdb-cli]({{< relref "/operate/rs/references/cli-utilities/crdb-cli" >}})
Redis Enterprise Software v6.2.18-43 (September release) includes the following Redis modules:
See [Upgrade modules]({{< relref "/operate/oss_and_stack/stack-with-enterprise/install/upgrade-module" >}}) to learn how to upgrade a module for a database.
Added support for the MODULE LIST command on Active-Active databases
Enhanced validity checks of the input parameters of the CRDB-CLI tool
The Syncer lag calculation has been improved and fixes multiple miscalculations
Support package includes additional information for Active-Active databases
Added the ability to retrieve the syncer mode (centralized / distributed) by running
rladmin info db [{db:<id> | <name>}]
To learn more, see [Distributed sychronization]({{< relref "/operate/rs/databases/active-active/synchronization-mode" >}})
RS84006 - When using the REST API to create a database, this specific set of conditions can lead to an error:
If this occurs, the database endpoint returns (error) ERR key "test" does not match any rule.
To address this issue, do one of the following:
You can [upgrade to v6.2.18]({{< relref "/operate/rs/installing-upgrading/upgrading" >}}) from Redis Enterprise Software v6.0 and later.
Refer to [v6.2.4 release notes]({{< relref "/operate/rs/release-notes/rs-6-2-4-august-2021" >}}) for important notes regarding changes made to the upgrade policy and how those changes might impact your experience.
Upgrades from versions earlier than v6.0 are not supported.
If you plan to upgrade your cluster to RHEL 8, see the [v6.2.8 release notes]({{< relref "/operate/rs/release-notes/rs-6-2-8-october-2021" >}}) for known limitations.
The snapshot option for [data persistence on Active-Active databases]({{< relref "/operate/rs/databases/active-active" >}}manage/#data-persistence) will be deprecated in a future version of Redis Enterprise Software. If you have an Active-Active database using snapshot persistence, we strongly encourage you to switch to AOF persistence. Use crdb-cli to do so:
crdb-cli crdb update --crdb-guid <CRDB_GUID> --default-db-config '{"data_persistence": "aof", "aof_policy":"appendfsync-every-sec"}'
TLS 1.0 and TLS 1.1 connections are considered deprecated in favor of TLS 1.2 or later.
Please verify that all clients, apps, and connections support TLS 1.2. Support for the earlier protocols will be removed in a future release.
Certain operating systems, such as RHEL 8, have already removed support for the earlier protocols. Redis Enterprise Software cannot support connection protocols that are not supported by the underlying operating system.
The 3DES encryption cipher is considered deprecated in favor of stronger ciphers like AES.
Please verify that all clients, apps, and connections support the AES cipher. Support for 3DES will be removed in a future release.
Certain operating systems, such as RHEL 8, have already removed support for 3DES. Redis Enterprise Software cannot support cipher suites that are not supported by the underlying operating system.
Redis Enterprise Software v6.0.x reached end-of-life (EOL) on May 31, 2022.
EOL of Redis Enterprise Software 6.2.x was reset to occur 18 months after the release of version 6.4, in accordance with the updated EOL policy. The new EOL date is August 31, 2024.
To learn more, see the Redis Enterprise Software [product lifecycle]({{< relref "/operate/rs/installing-upgrading/product-lifecycle" >}}), which details the release number and the end-of-life schedule for Redis Enterprise Software.
For Redis modules information and lifecycle, see [Module lifecycle]({{< relref "/operate/oss_and_stack/stack-with-enterprise/modules-lifecycle" >}}).
RS81463 A shard might crash when resharding an Active-Active database with Auto Tiering . Specifically, the shard will crash when volatile keys or Active-Active tombstone keys reside in Flash memory.
RS54131 Running the QUIT command on a TLS connected database closes connection and does not return a +OK reply
Before you upgrade a cluster that hosts Active-Active databases with modules to v6.2.18, perform the following steps:
Use crdb-cli to verify that the modules (modules) and their versions (in module_list) are as they appear in the database configuration and in the default database configuration:
crdb-cli crdb get --crdb-guid <crdb-guid>
From the admin console's redis modules tab, validate that these modules with their specific versions are loaded to the cluster.
If one or more of the modules/versions are missing or if you need help, contact Redis support before taking additional steps.
As part of Redis's commitment to security, Redis Enterprise Software implements the latest security fixes available with open source Redis. The following Open Source Redis CVEs do not affect Redis Enterprise:
CVE-2021-32625 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis since Redis Enterprise does not implement LCS. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.4, Redis 6.0.14)
CVE-2021-32672 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the LUA debugger is unsupported in Redis Enterprise. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16)
CVE-2021-32675 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the proxy in Redis Enterprise does not forward unauthenticated requests. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16)
CVE-2021-32762 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the memory allocator used in Redis Enterprise is not vulnerable. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16)
CVE-2021-41099 - Redis Enterprise is not impacted by the CVE that was found and fixed in open source Redis because the proto-max-bulk-len CONFIG is blocked in Redis Enterprise. Additional information about the open source Redis fix is on the Redis GitHub page (Redis 6.2.6, Redis 6.0.16) security fixes for recent CVEs. Redis Enterprise has already included the fixes for the relevant CVEs. Some CVEs announced for Open Source Redis do not affect Redis Enterprise due to different and additional functionality available in Redis Enterprise that is not available in Open Source Redis.