You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/docs/components/data-accelerators/cayenne/index.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,6 +48,7 @@ Use [S3 Express One Zone](#aws-s3-express-one-zone-storage) when persistence of
48
48
49
49
## Advanced Internals
50
50
51
+
51
52
### Sequence-based Upserts and Deletes
52
53
Cayenne uses Iceberg-style sequence numbers to enable upsert and delete semantics. Each row is tagged with a sequence number, allowing efficient handling of row-level changes without rewriting entire files. Deletes are tracked as tombstones, and upserts are resolved at query time.
Copy file name to clipboardExpand all lines: website/docs/reference/spicepod/runtime.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -215,6 +215,15 @@ The TLS section specifies the configuration for enabling Transport Layer Securit
215
215
216
216
In addition to configuring TLS via the manifest, TLS can also be configured via `spiced` command line arguments using the `--tls-enabled true` flag along with `--tls-certificate`/`--tls-certificate-file` and `--tls-key`/`--tls-key-file`.
217
217
218
+
### Certificate Hot-Reload
219
+
220
+
Spice can hot-reload TLS certificates and client CA files for runtime endpoints. Update the certificate, key, or CA file on disk, then send `SIGHUP` to the Spice process to reload without restart. Only file-based certificates/keys/CA are hot-reloaded (not inline PEM). Existing connections are not interrupted; only new connections use the updated files. If reload fails, the previous certificate remains active and a warning is logged.
221
+
222
+
**Steps:**
223
+
1. Replace the certificate/key/CA file on disk.
224
+
2. Send `SIGHUP` to the Spice process (e.g., `kill -SIGHUP <pid>`).
225
+
3. Check logs for reload confirmation or errors.
226
+
218
227
### `runtime.tls.enabled`
219
228
220
229
Enables or disables TLS for the runtime endpoints.
@@ -233,10 +242,9 @@ The TLS certificate to use for securing the runtime endpoints. The certificate c
233
242
```yaml
234
243
runtime:
235
244
tls:
236
-
...
237
245
certificate: |
238
246
-----BEGIN CERTIFICATE-----
239
-
...
247
+
(certificate contents)
240
248
-----END CERTIFICATE-----
241
249
```
242
250
@@ -254,7 +262,6 @@ The path to the TLS PEM-encoded certificate file. Only one of `certificate` or `
254
262
```yaml
255
263
runtime:
256
264
tls:
257
-
...
258
265
certificate_file: /path/to/cert.pem
259
266
```
260
267
@@ -265,10 +272,9 @@ The TLS key to use for securing the runtime endpoints. The key can also come fro
265
272
```yaml
266
273
runtime:
267
274
tls:
268
-
...
269
275
key: |
270
276
-----BEGIN PRIVATE KEY-----
271
-
...
277
+
(private key contents)
272
278
-----END PRIVATE KEY-----
273
279
```
274
280
@@ -286,7 +292,6 @@ The path to the TLS PEM-encoded key file. Only one of `key` or `key_file` must b
286
292
```yaml
287
293
runtime:
288
294
tls:
289
-
...
290
295
key_file: /path/to/key.pem
291
296
```
292
297
@@ -323,7 +328,6 @@ Path to a PEM-encoded CA bundle used to verify client certificates. The file is
323
328
```yaml
324
329
runtime:
325
330
tls:
326
-
...
327
331
client_auth_ca_file: /path/to/client-ca.pem
328
332
```
329
333
@@ -334,10 +338,9 @@ Inline PEM (or `${ secrets:... }`) form of the client CA bundle. Mutually exclus
Copy file name to clipboardExpand all lines: website/docs/reference/sql/dml.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,8 @@ sidebar_position: 30
7
7
8
8
Data Manipulation Language (DML) statements are used to insert, update, and delete data in tables. Spice supports DML operations on [write-capable data connectors](../../tags/write) configured with `access: read_write`.
9
9
10
-
:::warning[Supported Operations]
11
-
Spice supports `INSERT`for write-capable connectors and `MERGE INTO` for [Spice Cayenne](../../components/data-accelerators/cayenne) catalog tables. `UPDATE` and `DELETE` statements are not yet supported as standalone operations. For data modifications, use `MERGE INTO`or the source database directly.
10
+
:::info[Supported Operations]
11
+
Spice supports `INSERT`, `UPDATE`, and `DELETE`for write-capable connectors that support these operations. As of v2.0.0-rc.5, the [Snowflake](../../components/data-connectors/snowflake) connector supports all three DML operations when `access: read_write` is set. For Cayenne, use `MERGE INTO`for updates and deletes.
0 commit comments