Skip to content

Commit a215066

Browse files
committed
touchups
1 parent 99d30e6 commit a215066

File tree

1 file changed

+22
-20
lines changed

1 file changed

+22
-20
lines changed

articles/azure-cache-for-redis/cache-troubleshoot-connectivity.md

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,24 +5,24 @@ description: Learn how to resolve connectivity problems when creating clients wi
55

66

77
ms.topic: conceptual
8-
ms.date: 04/16/2025
8+
ms.date: 04/17/2025
99
appliesto:
1010
- ✅ Azure Cache for Redis
1111
ms.custom: template-concept, ignite-2024
1212
---
1313

1414
# Troubleshoot Azure Cache for Redis connectivity
1515

16-
This article explains how to troubleshoot common issues connecting your client application to Azure Cache for Redis. Connectivity issues might be caused by intermittent conditions, or by incorrect cache configuration. This article is divided into intermittent issues and cache configuration issues.
16+
This article explains how to troubleshoot common issues with connecting your client application to Azure Cache for Redis. Connectivity issues might be caused by intermittent conditions, or by incorrect cache configuration. This article is divided into intermittent issues and cache configuration issues.
1717

18-
**Intermittent issues:
18+
**Intermittent connectivity issues**
1919

2020
- [Kubernetes-hosted applications](#kubernetes-hosted-applications)
2121
- [Linux-based client application](#linux-based-client-application)
2222
- [Number of connected clients](#number-of-connected-clients)
2323
- [Server maintenance](#server-maintenance)
2424

25-
**Configuration issues:
25+
**Cache configuration connectivity issues**
2626

2727
- [Firewall rules](#third-party-firewall-or-external-proxy)
2828
- [Private endpoint configuration](#private-endpoint-configuration)
@@ -31,25 +31,25 @@ This article explains how to troubleshoot common issues connecting your client a
3131

3232
## Test connectivity
3333

34-
You can test connectivity using the Redis command line tool _redis-cli_. For more information on Redis CLI, see [Use the Redis command-line tool with Azure Cache for Redis](cache-how-to-redis-cli-tool.md).
34+
You can test connectivity by using the Redis command line tool _redis-cli_. For more information on Redis CLI, see [Use the Redis command-line tool with Azure Cache for Redis](cache-how-to-redis-cli-tool.md).
3535

3636
If redis-cli is unable to connect, you can test connectivity by using `PSPING` in Azure PowerShell.
3737

3838
```azurepowershell-interactive
3939
psping -q <cachename>:<port>
4040
```
4141

42-
If the number of sent packets is equal to the number of received packets, there is no drop in connectivity.
42+
If the number of sent packets is equal to the number of received packets, there's no drop in connectivity.
4343

4444
## Intermittent connectivity issues
4545

4646
Your client application might have intermittent connectivity issues caused by spikes in the number of connections or by events such as patching.
4747

4848
### Kubernetes hosted applications
4949

50-
If your client application is hosted on Kubernetes, check whether the pod running the client application or the cluster nodes are under memory, CPU, or network pressure. A pod running the client application can be affected by other pods running on the same node and might throttle Redis connections or IO operations.
50+
If your client application is hosted on Kubernetes, check whether the cluster nodes or the pod running the client application are under memory, CPU, or network pressure. A pod running the client application can be affected by other pods running on the same node and might throttle Redis connections or IO operations.
5151

52-
If you're using _Istio_ or any other service mesh, make sure that your service mesh proxy reserves port 13000-13019 or 15000-15019. Clients use these ports to communicate with nodes in a clustered Azure Redis cache, and could cause connectivity issues on those ports.
52+
If you're using _Istio_ or any other service mesh, make sure that your service mesh proxy reserves ports `13000-13019` or `15000-15019`. Clients use these ports to communicate with nodes in a clustered Azure Redis cache, and could cause connectivity issues on those ports.
5353

5454
### Linux-based client application
5555

@@ -69,25 +69,27 @@ If your application can't connect to your Azure Redis cache at all, some cache c
6969

7070
### Firewall rules
7171

72-
If you have a firewall configured for your Azure Cache for Redis, ensure that your client IP address is added to the firewall rules. On the Azure portal page for your cache, check **Firewall** under **Settings** in the left navigation menu.
72+
If you have a firewall configured for your Azure Redis cache, ensure that your client IP address is added to the firewall rules. To check the firewall rules, select **Firewall** under **Settings** in the left navigation menu for your cache page.
7373

74-
If you use a third-party firewall or proxy in your network, make sure they allow the Azure Cache for Redis endpoint `*.redis.cache.windows.net` and the ports `6379` and `6380`. You might need to allow more ports when you use a clustered cache or geo-replication.
74+
#### Third-party firewall or external proxy
75+
76+
If you use a third-party firewall or proxy in your network, make sure they it allows the Azure Cache for Redis endpoint `*.redis.cache.windows.net` and the ports `6379` and `6380`. You might need to allow more ports when you use a clustered cache or geo-replication.
7577

7678
### Private endpoint configuration
7779

78-
Check your private endpoint configuration as follows:
80+
In the Azure portal, check your private endpoint configuration by selecting **Private Endpoint** under **Settings** in the left navigation menu for your cache.
7981

80-
- Ensure that **Public Network Access** is set correctly. In the Azure portal, select **Private Endpoint** in the left navigation menu for your cache.
82+
- On the **Private Endpoint** page, ensure that **Enable public network access** is set correctly.
8183

8284
- Public network access is disabled by default when you create a private endpoint.
83-
- To connect to your cache private endpoint from outside your cache virtual network, you must enable **Public Network Access**.
84-
- If you delete your private endpoint, make sure to enable public network access.
85+
- To connect to your cache private endpoint from outside your cache virtual network, you must enable public network access.
86+
- If you delete your private endpoint, be sure to enable public network access.
8587

86-
- Make sure your private endpoint is configured correctly. For more information, see [Create a private endpoint with a new Azure Cache for Redis instance](cache-private-link.md#create-a-private-endpoint-with-a-new-azure-cache-for-redis-instance).
88+
- Select the link under **Private endpoint** and make sure your private endpoint is configured correctly. For more information, see [Create a private endpoint with a new Azure Cache for Redis instance](cache-private-link.md#create-a-private-endpoint-with-a-new-azure-cache-for-redis-instance).
8789

88-
- Make sure your application connects to `<cachename>.redis.cache.windows.net` on port 6380. Avoid using `<cachename>.privatelink.redis.cache.windows.net` in the configuration or the connection string.
90+
- Make sure your application connects to `<cachename>.redis.cache.windows.net` on port `6380`. Avoid using `<cachename>.privatelink.redis.cache.windows.net` in the configuration or the connection string.
8991

90-
- To verify that a command resolves to the private IP address for the cache, run a command like `nslookup <hostname>` from within the virtual network that's linked to the private endpoint.
92+
- To verify that a command resolves to the private IP address for the cache, run a command like `nslookup <hostname>` from within the virtual network linked to the private endpoint.
9193

9294
### Public IP address change
9395

@@ -104,13 +106,13 @@ Check your virtual network configuration as follows:
104106

105107
For more information, see [Configure virtual network support for a Premium Azure Cache for Redis instance](cache-how-to-premium-vnet.md).
106108

107-
#### Geo-replication issues using virtual network injection with Premium caches
109+
#### Geo-replication using VNet injection with Premium caches
108110

109-
Geo-replication between caches in the same virtual network is supported. Geo-replication between caches in different virtual networks is also supported, with the following caveats:
111+
Geo-replication between caches in the same virtual network is supported. Geo-replication between caches in different virtual networks is supported with the following caveats:
110112

111113
- If the virtual networks are in the same region, you can connect them using [virtual network peering](/azure/virtual-network/virtual-network-peering-overview) or a [VPN Gateway VNet-to-VNet connection](/azure/vpn-gateway/vpn-gateway-howto-vnet-vnet-resource-manager-portal).
112114

113-
- If the virtual networks are in different regions, geo-replication using virtual network peering isn't supported. A client virtual machine in VNet 1 (region 1) can't access a cache in VNet 2 (region 2) by using its DNS name because of a constraint with Basic internal load balancers. Instead, use a VPN Gateway VNet-to-VNet connection. For more information about virtual network peering constraints, see [Virtual Network peering requirements and constraints](/azure/virtual-network/virtual-network-manage-peering#requirements-and-constraints).
115+
- If the virtual networks are in different regions, geo-replication using virtual network peering isn't supported. A client virtual machine in `VNet 1` (region 1) can't access a cache in `VNet 2` (region 2) by using its name, because of a constraint with Basic internal load balancers. Instead, use a VPN Gateway VNet-to-VNet connection. For more information about virtual network peering constraints, see [Virtual Network peering requirements and constraints](/azure/virtual-network/virtual-network-manage-peering#requirements-and-constraints).
114116

115117
To configure your virtual network effectively and avoid geo-replication issues, you must configure both the inbound and outbound ports correctly. For more information on avoiding the most common virtual network misconfiguration issues, see [Geo-replication peer port requirements](cache-how-to-premium-vnet.md#geo-replication-peer-port-requirements).
116118

0 commit comments

Comments
 (0)