Skip to content

Commit 2d9f5aa

Browse files
RDSC-3996 Add RDI 1.14.1 release notes. Update the Google Spanner documentation wrt new default option for using the service account
1 parent 287a62d commit 2d9f5aa

File tree

2 files changed

+65
-10
lines changed

2 files changed

+65
-10
lines changed

content/integrate/redis-data-integration/data-pipelines/prepare-dbs/spanner.md

Lines changed: 29 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -60,9 +60,10 @@ for more details, including additional configuration options and dialect-specifi
6060

6161
## 3. Create a service account
6262

63-
To allow RDI to access the Spanner instance, you'll need to create a service account with the
64-
appropriate permissions. This service account will then be provided to RDI as a secret for
65-
authentication.
63+
To allow RDI to access the Spanner instance, you'll need to create a service account with the
64+
appropriate permissions. By default, RDI uses Google Cloud Workload Identity authentication
65+
when the service account is assigned to the GKE cluster. Alternatively, you can provide the
66+
service account credentials as a Kubernetes secret (see step 4 for details).
6667

6768
1. Create the service account
6869

@@ -109,25 +110,42 @@ authentication.
109110
--project=YOUR_PROJECT_ID
110111
```
111112

112-
## 4. Set up secrets for Kubernetes deployment
113+
### Authentication methods
113114

114-
Before deploying the RDI pipeline, you need to configure the necessary secrets for both the source
115-
and target databases. Instructions for setting up the target database secrets are available in the
115+
RDI supports two authentication methods for accessing Spanner:
116+
117+
1. **Workload Identity (default)**: The service account is assigned to the GKE cluster, and RDI
118+
automatically uses the cluster's identity to authenticate. This is the recommended approach
119+
as it's more secure and doesn't require managing credential files.
120+
121+
2. **Service account credentials file**: You provide the service account key file as a Kubernetes
122+
secret. This method requires setting `use_credentials_file: true` in your RDI configuration.
123+
124+
## 4. Set up secrets for Kubernetes deployment (optional)
125+
126+
Before deploying the RDI pipeline, you need to configure the necessary secrets for the target
127+
database. Instructions for setting up the target database secrets are available in the
116128
[RDI deployment guide]({{< relref "/integrate/redis-data-integration/data-pipelines/deploy#set-secrets-for-k8shelm-deployment-using-kubectl-command" >}}).
117129
118-
In addition to the target database secrets, you'll also need to create a Spanner-specific secret
119-
named `source-db-credentials`. This secret should contain the service account key file generated
120-
during the Spanner setup phase. Use the command below to create it:
130+
**Optional**: If you prefer to use service account credentials file instead of Workload Identity
131+
authentication, you'll need to create a Spanner-specific secret named `source-db-credentials`.
132+
This secret should contain the service account key file generated during the Spanner setup phase.
133+
Use the command below to create it:
121134

122135
```bash
123136
kubectl create secret generic source-db-credentials --namespace=rdi \
124137
--from-file=gcp-service-account.json=~/spanner-reader-account.json \
125138
--save-config --dry-run=client -o yaml | kubectl apply -f -
126139
```
127140

128-
Be sure to adjust the file path (`~/spanner-reader-account.json`) if your service account key is
141+
Be sure to adjust the file path (`~/spanner-reader-account.json`) if your service account key is
129142
stored elsewhere.
130143

144+
{{< note >}}
145+
If you create the `source-db-credentials` secret, you must also set `use_credentials_file: true`
146+
in your RDI configuration to use the credentials file instead of Workload Identity authentication.
147+
{{< /note >}}
148+
131149
## 5. Configure RDI for Spanner
132150

133151
When configuring your RDI pipeline for Spanner, use the following example configuration in your
@@ -142,6 +160,7 @@ sources:
142160
project_id: your-project-id
143161
instance_id: your-spanner-instance
144162
database_id: your-spanner-database
163+
# use_credentials_file: false # Set to true if using service account credentials file instead of Workload Identity
145164
change_streams:
146165
change_stream_all:
147166
{}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
Title: Redis Data Integration release notes 1.14.1 (August 2025)
3+
alwaysopen: false
4+
categories:
5+
- docs
6+
- operate
7+
- rs
8+
description: |
9+
New RDI API v2 with enhanced pipeline management.
10+
Improved Oracle RAC support with configuration scaffolding.
11+
Enhanced metrics and monitoring capabilities.
12+
Better TLS/mTLS support across components.
13+
linkTitle: 1.14.1 (August 2025)
14+
toc: 'true'
15+
weight: 978
16+
---
17+
18+
{{< note >}}This maintenance release replaces the 1.14.0 release.{{< /note >}}
19+
20+
RDI’s mission is to help Redis customers sync Redis Enterprise with live data from their slow disk-based databases to:
21+
22+
- Meet the required speed and scale of read queries and provide an excellent and predictable user experience.
23+
- Save resources and time when building pipelines and coding data transformations.
24+
- Reduce the total cost of ownership by saving money on expensive database read replicas.
25+
26+
RDI keeps the Redis cache up to date with changes in the primary database, using a [_Change Data Capture (CDC)_](https://en.wikipedia.org/wiki/Change_data_capture) mechanism.
27+
It also lets you _transform_ the data from relational tables into convenient and fast data structures that match your app's requirements. You specify the transformations using a configuration system, so no coding is required.
28+
29+
## What's New in 1.14.1
30+
31+
- Support for Google Cloud Workload Identity authentication when a service account is assigned to the GKE cluster
32+
- Fixed RDI API job validation that was incorrectly failing when schemas are not explicitly specified in source configuration, even though the configuration was valid
33+
34+
## Limitations
35+
36+
RDI can write data to a Redis Active-Active database. However, it doesn't support writing data to two or more Active-Active replicas. Writing data from RDI to several Active-Active replicas could easily harm data integrity as RDI is not synchronous with the source database commits.

0 commit comments

Comments
 (0)