Skip to content

Commit 42f5751

Browse files
committed
RC RDI: Changelog and clarify security group rules
1 parent e22d829 commit 42f5751

File tree

2 files changed

+38
-4
lines changed

2 files changed

+38
-4
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
Title: Redis Cloud changelog (September 2025)
3+
alwaysopen: false
4+
categories:
5+
- docs
6+
- operate
7+
- rc
8+
description: New features, enhancements, and other changes added to Redis Cloud during
9+
September 2025.
10+
highlights: Data Integration
11+
linktitle: September 2025
12+
weight: 70
13+
tags:
14+
- changelog
15+
---
16+
17+
## New features
18+
19+
### Data Integration
20+
21+
Redis Cloud now supports [Redis Data Integration (RDI)]({{< relref "/operate/rc/databases/rdi" >}}) to create data pipelines that ingest data from a supported primary database to Redis.
22+
23+
Using a data pipeline lets you have a cache that is always ready for queries. RDI Data pipelines ensure that any changes made to your primary database are captured in your Redis cache within a few seconds, preventing cache misses and stale data within the cache.
24+
25+
See [Data Integration]({{< relref "/operate/rc/databases/rdi" >}}) to learn how to set up data pipelines with Redis Cloud.

content/operate/rc/databases/rdi/setup.md

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
8080
- **Scheme**: Select **Internal**.
8181
- **Load balancer IP address type**: Select **IPv4**.
8282
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
83-
1. In **Security groups**, select the security group associated with your source database.
83+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
8484
1. In **Listeners and routing**:
8585
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
8686
1. In **Specify group details**:
@@ -93,7 +93,11 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
9393
- **Port**: Enter your source database's port.
9494
- **Default action**: Select the target group you created in the previous step.
9595
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
96-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
96+
1. After the network load balancer is active, select **Security**.
97+
98+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
99+
100+
1. Select the security group ID to open the Security group settings.
97101
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
98102
- **Type**: Select **HTTP**.
99103
- **Source**: Select **Anywhere - IPv4**.
@@ -146,7 +150,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
146150
- **Scheme**: Select **Internal**.
147151
- **Load balancer IP address type**: Select **IPv4**.
148152
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
149-
1. In **Security groups**, select the security group associated with your source database.
153+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
150154
1. In **Listeners and routing**:
151155
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
152156
1. In **Specify group details**:
@@ -164,7 +168,12 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
164168
- **Port**: Enter your source database's port.
165169
- **Default action**: Select the target group you created in the previous step.
166170
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
167-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
171+
1. After the network load balancer is active, select **Security**.
172+
173+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
174+
175+
1. Select the security group ID to open the Security group settings.
176+
168177
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
169178
- **Type**: Select **HTTP**.
170179
- **Source**: Select **Anywhere - IPv4**.

0 commit comments

Comments
 (0)