You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: New features, enhancements, and other changes added to Redis Cloud during
9
+
September 2025.
10
+
highlights: Data Integration
11
+
linktitle: September 2025
12
+
weight: 70
13
+
tags:
14
+
- changelog
15
+
---
16
+
17
+
## New features
18
+
19
+
### Data Integration
20
+
21
+
Redis Cloud now supports [Redis Data Integration (RDI)]({{< relref "/operate/rc/databases/rdi" >}}) to create data pipelines that ingest data from a supported primary database to Redis.
22
+
23
+
Using a data pipeline lets you have a cache that is always ready for queries. RDI Data pipelines ensure that any changes made to your primary database are captured in your Redis cache within a few seconds, preventing cache misses and stale data within the cache.
24
+
25
+
See [Data Integration]({{< relref "/operate/rc/databases/rdi" >}}) to learn how to set up data pipelines with Redis Cloud.
Copy file name to clipboardExpand all lines: content/operate/rc/databases/rdi/setup.md
+13-4Lines changed: 13 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
80
80
-**Scheme**: Select **Internal**.
81
81
-**Load balancer IP address type**: Select **IPv4**.
82
82
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
83
-
1. In **Security groups**, select the security group associated with your source database.
83
+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
84
84
1. In **Listeners and routing**:
85
85
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
86
86
1. In **Specify group details**:
@@ -93,7 +93,11 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
93
93
-**Port**: Enter your source database's port.
94
94
-**Default action**: Select the target group you created in the previous step.
95
95
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
96
-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
96
+
1. After the network load balancer is active, select **Security**.
97
+
98
+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
99
+
100
+
1. Select the security group ID to open the Security group settings.
97
101
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
98
102
-**Type**: Select **HTTP**.
99
103
-**Source**: Select **Anywhere - IPv4**.
@@ -146,7 +150,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
146
150
-**Scheme**: Select **Internal**.
147
151
-**Load balancer IP address type**: Select **IPv4**.
148
152
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
149
-
1. In **Security groups**, select the security group associated with your source database.
153
+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
150
154
1. In **Listeners and routing**:
151
155
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
152
156
1. In **Specify group details**:
@@ -164,7 +168,12 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
164
168
- **Port**: Enter your source database's port.
165
169
- **Default action**: Select the target group you created in the previous step.
166
170
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
167
-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
171
+
1. After the network load balancer is active, select **Security**.
172
+
173
+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
174
+
175
+
1. Select the security group ID to open the Security group settings.
176
+
168
177
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
0 commit comments