Requirements
- A provisioned Redis instance that your LangSmith instance will have network access to. We recommend using a managed Redis service like:
- Note: We only officially support Redis versions >= 5.
- We support both Standalone and Redis Cluster. See the appropriate sections for deployment instructions.
- We support no authentication, password, and IAM/Workload Identity authentication.
- By default, we recommend an instance with at least 2 vCPUs and 8GB of memory. However, the actual requirements will depend on your tracing workload. We recommend monitoring your Redis instance and scaling up as needed.
Standalone Redis
Connection String
You will need to assemble the connection string for your Redis instance. This connection string should include the following information:- Host
- Database
- Port
- URL params
- Use
rediss://when TLS is enabled on your Redis server. - Provide the password in the connection string.
Configuration
With your connection string in hand, you can configure your LangSmith instance to use an external Redis instance. You can do this by modifying thevalues file for your LangSmith Helm Chart installation or the .env file for your Docker installation.
Redis Cluster
As of LangSmith helm version 0.12.25, we officially support Redis Cluster.Host Names
When using Redis Cluster, provide a list of node hostnames and ports. Each node URI must be in the form:rediss here. For Redis Cluster:
- Provide the password separately via
redis.external.cluster.passwordor through a Secret usingpasswordSecretKey. - Enable TLS separately with
redis.external.cluster.tlsEnabled: true.
Configuration
When connecting to an external Redis Cluster, configure the Helm values underredis.external.cluster. You can either:
- Provide node URIs and (optionally) a password directly in
values.yaml. - Or reference an existing Kubernetes
Secretcontaining node URIs and password.
TLS with Redis
Use this section to configure TLS for Redis connections. For mounting internal/public CAs so LangSmith trusts your Redis server certificate, see Configure custom TLS certificates.Server TLS (one-way)
To validate the Redis server certificate:- Provide a CA bundle using
config.customCa.secretNameandconfig.customCa.secretKey. - For Standalone Redis, use
rediss://in the connection URL. - For Redis Cluster, set
redis.external.cluster.tlsEnabled: true.
Mutual TLS with Client Auth (mTLS)
As of LangSmith helm chart version 0.12.29, we support mTLS for Redis clients. For server-side authentication in mTLS, use the Server TLS steps (custom CA) in addition to the following client certificate configuration. If your Redis server requires client certificate authentication:- Provide a Secret with your client certificate and key.
- Reference it via
redis.external.clientCert.secretNameand specify the keys withcertSecretKeyandkeySecretKey. - For Standalone Redis, keep using
rediss://in the connection URL. - For Redis Cluster, set
redis.external.cluster.tlsEnabled: true.
Pod security context for certificate volumes
The certificate volumes mounted for mTLS are protected by file access restrictions. To ensure all LangSmith pods can read the certificate files, you must setfsGroup: 1000 in the pod security context.
You can configure this in one of two ways:
Option 1: Use commonPodSecurityContext
Set the fsGroup at the top level to apply it to all pods:
fsGroup to each pod’s security context individually. See the mtls configuration example for a complete reference.
IAM Authentication
As of LangSmith helm chart version 0.12.34, we support IAM authentication for Redis. This allows you to use cloud provider workload identity instead of static passwords.IAM authentication is supported for both standalone Redis and Redis Cluster configurations. However, not all cloud providers support IAM authentication for all Redis offerings. Check your cloud provider’s documentation to verify IAM support for your specific Redis setup (e.g., GCP only supports IAM for Memorystore Cluster, not standalone Memorystore).
Supported providers
| Provider | Redis Service | Documentation |
|---|---|---|
| AWS | ElastiCache for Redis | IAM authentication |
| GCP | Memorystore for Redis | IAM authentication |
| Azure | Azure Cache for Redis | Microsoft Entra authentication |
Prerequisites
- Configure workload identity in your Kubernetes cluster. See your cloud provider’s documentation:
- Enable IAM authentication on your Redis instance and grant access to your workload identity. Refer to your cloud provider’s documentation linked above.
- Annotate your Kubernetes ServiceAccounts and Deployments/Jobs with the workload identity binding per your cloud provider’s requirements.
Configuration
To enable IAM authentication, set theiamAuthProvider field and use an IAM-compatible connection string (with identity as username, no password):
Helm
Kubernetes Secret
Redis Cluster with IAM Authentication
For Redis Cluster with IAM authentication, configure both the cluster settings and IAM provider:Helm
Required annotations
You must apply the ServiceAccount annotations and pod labels required by your cloud provider’s workload identity to all LangSmith components that connect to Redis. This includes: Deployments:backend, queue, platformBackend, hostBackend
Example for the backend service (repeat for other services listed above):