Skip to content

Commit 6983e8a

Browse files
Merge pull request #2096 from redis/RDSC-3996-rdi-1.14.1-release-notes
RDSC-3996 Add RDI 1.14.1 release notes. Update the Google Spanner documentation wrt new default option for using the service account
2 parents 86d738e + 9c5de3f commit 6983e8a

File tree

3 files changed

+65
-11
lines changed

3 files changed

+65
-11
lines changed

config.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ rdi_redis_gears_version = "1.2.6"
5555
rdi_debezium_server_version = "2.3.0.Final"
5656
rdi_db_types = "cassandra|mysql|oracle|postgresql|sqlserver"
5757
rdi_cli_latest = "latest"
58-
rdi_current_version = "1.14.0"
58+
rdi_current_version = "1.14.1"
5959

6060
[params.clientsConfig]
6161
"Python"={quickstartSlug="redis-py"}

content/integrate/redis-data-integration/data-pipelines/prepare-dbs/spanner.md

Lines changed: 28 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -60,9 +60,9 @@ for more details, including additional configuration options and dialect-specifi
6060

6161
## 3. Create a service account
6262

63-
To allow RDI to access the Spanner instance, you'll need to create a service account with the
64-
appropriate permissions. This service account will then be provided to RDI as a secret for
65-
authentication.
63+
To allow RDI to access the Spanner instance, you'll need to create a service account with the
64+
appropriate permissions. By default, RDI uses Google Cloud Workload Identity authentication. In this case RDI will assume the [service account is assigned to the GKE cluster](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#enable_on_clusters_and_node_pools). Alternatively, you can provide the
65+
service account credentials as a Kubernetes secret (see step 4 for details).
6666

6767
1. Create the service account
6868

@@ -109,25 +109,42 @@ authentication.
109109
--project=YOUR_PROJECT_ID
110110
```
111111

112-
## 4. Set up secrets for Kubernetes deployment
112+
### Authentication methods
113113

114-
Before deploying the RDI pipeline, you need to configure the necessary secrets for both the source
115-
and target databases. Instructions for setting up the target database secrets are available in the
114+
RDI supports two authentication methods for accessing Spanner:
115+
116+
1. **Workload Identity (default)**: The service account is assigned to the GKE cluster, and RDI
117+
automatically uses the cluster's identity to authenticate. This is the recommended approach
118+
as it's more secure and doesn't require managing credential files.
119+
120+
2. **Service account credentials file**: You provide the service account key file as a Kubernetes
121+
secret. This method requires setting `use_credentials_file: true` in your RDI configuration.
122+
123+
## 4. Set up secrets for Kubernetes deployment (optional)
124+
125+
Before deploying the RDI pipeline, you need to configure the necessary secrets for the target
126+
database. Instructions for setting up the target database secrets are available in the
116127
[RDI deployment guide]({{< relref "/integrate/redis-data-integration/data-pipelines/deploy#set-secrets-for-k8shelm-deployment-using-kubectl-command" >}}).
117128
118-
In addition to the target database secrets, you'll also need to create a Spanner-specific secret
119-
named `source-db-credentials`. This secret should contain the service account key file generated
120-
during the Spanner setup phase. Use the command below to create it:
129+
**Optional**: If you prefer to use a service account credentials file instead of Workload Identity
130+
authentication, you'll need to create a Spanner-specific secret named `source-db-credentials`.
131+
This secret should contain the service account key file generated during the Spanner setup phase.
132+
Use the command below to create it:
121133

122134
```bash
123135
kubectl create secret generic source-db-credentials --namespace=rdi \
124136
--from-file=gcp-service-account.json=~/spanner-reader-account.json \
125137
--save-config --dry-run=client -o yaml | kubectl apply -f -
126138
```
127139

128-
Be sure to adjust the file path (`~/spanner-reader-account.json`) if your service account key is
140+
Be sure to adjust the file path (`~/spanner-reader-account.json`) if your service account key is
129141
stored elsewhere.
130142

143+
{{< note >}}
144+
If you create the `source-db-credentials` secret, you must also set `use_credentials_file: true`
145+
in your RDI configuration to use the credentials file instead of Workload Identity authentication.
146+
{{< /note >}}
147+
131148
## 5. Configure RDI for Spanner
132149

133150
When configuring your RDI pipeline for Spanner, use the following example configuration in your
@@ -142,6 +159,7 @@ sources:
142159
project_id: your-project-id
143160
instance_id: your-spanner-instance
144161
database_id: your-spanner-database
162+
# use_credentials_file: false # Default: uses Workload Identity. Set to true to use service account credentials file instead
145163
change_streams:
146164
change_stream_all:
147165
{}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
Title: Redis Data Integration release notes 1.14.1 (August 2025)
3+
alwaysopen: false
4+
categories:
5+
- docs
6+
- operate
7+
- rs
8+
description: |
9+
New RDI API v2 with enhanced pipeline management.
10+
Improved Oracle RAC support with configuration scaffolding.
11+
Enhanced metrics and monitoring capabilities.
12+
Better TLS/mTLS support across components.
13+
linkTitle: 1.14.1 (August 2025)
14+
toc: 'true'
15+
weight: 977
16+
---
17+
18+
{{< note >}}This maintenance release replaces the 1.14.0 release.{{< /note >}}
19+
20+
RDI’s mission is to help Redis customers sync Redis Enterprise with live data from their slow disk-based databases to:
21+
22+
- Meet the required speed and scale of read queries and provide an excellent and predictable user experience.
23+
- Save resources and time when building pipelines and coding data transformations.
24+
- Reduce the total cost of ownership by saving money on expensive database read replicas.
25+
26+
RDI keeps the Redis cache up to date with changes in the primary database, using a [_Change Data Capture (CDC)_](https://en.wikipedia.org/wiki/Change_data_capture) mechanism.
27+
It also lets you _transform_ the data from relational tables into convenient and fast data structures that match your app's requirements. You specify the transformations using a configuration system, so no coding is required.
28+
29+
## What's New in 1.14.1
30+
31+
- Support for Google Cloud Workload Identity authentication when a service account is assigned to the GKE cluster
32+
- Fixed RDI API job validation that was incorrectly failing when schemas are not explicitly specified in source configuration, even though the configuration was valid
33+
34+
## Limitations
35+
36+
RDI can write data to a Redis Active-Active database. However, it doesn't support writing data to two or more Active-Active replicas. Writing data from RDI to several Active-Active replicas could easily harm data integrity as RDI is not synchronous with the source database commits.

0 commit comments

Comments
 (0)