You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/embeds/rc-rdi-secrets-permissions.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,4 +14,6 @@
14
14
}
15
15
} ]
16
16
}
17
-
```
17
+
```
18
+
19
+
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page. Save the secret ARN to use when you [define your source database]({{<relref "/operate/rc/databases/rdi/define">}}).
Copy file name to clipboardExpand all lines: content/operate/rc/databases/rdi/setup.md
+21-16Lines changed: 21 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
80
80
-**Scheme**: Select **Internal**.
81
81
-**Load balancer IP address type**: Select **IPv4**.
82
82
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
83
-
1. In **Security groups**, select the security group associated with your source database.
83
+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
84
84
1. In **Listeners and routing**:
85
85
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
86
86
1. In **Specify group details**:
@@ -93,7 +93,11 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
93
93
-**Port**: Enter your source database's port.
94
94
-**Default action**: Select the target group you created in the previous step.
95
95
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
96
-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
96
+
1. After the network load balancer is active, select **Security**.
97
+
98
+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
99
+
100
+
1. Select the security group ID to open the Security group settings.
97
101
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
98
102
-**Type**: Select **HTTP**.
99
103
-**Source**: Select **Anywhere - IPv4**.
@@ -158,8 +162,8 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
158
162
-**Scheme**: Select **Internal**.
159
163
-**Load balancer IP address type**: Select **IPv4**.
160
164
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
161
-
1. In **Security groups**, select the security group associated with your source database.
162
-
1. In **Listeners and routing**:
165
+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
166
+
1. In **Listeners and routing**:
163
167
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
164
168
1. In **Specify group details**:
165
169
-**Target type**: Select **IP Addresses**.
@@ -183,7 +187,12 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
183
187
- **Port**: Enter your source database's port.
184
188
- **Default action**: Select the target group you created in the previous step.
185
189
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
186
-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
190
+
1. After the network load balancer is active, select **Security**.
191
+
192
+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
193
+
194
+
1. Select the security group ID to open the Security group settings.
195
+
187
196
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
188
197
- **Type**: Select **HTTP**.
189
198
- **Source**: Select **Anywhere - IPv4**.
@@ -243,10 +252,10 @@ The required secrets depend on your source database's security configuration. Th
243
252
244
253
| Security configuration | Required secrets |
245
254
| :-- | :-- |
246
-
| Username and password only | <ul><li>Credentials secret (username and password)</li></ul> |
@@ -304,12 +313,10 @@ After you create the secret, you need to add permissions to allow the data pipel
304
313
305
314
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. Select the private key secret you just created and then select **Edit permissions**.
306
315
307
-
Add the following permissions to your secret:
316
+
Add the following permissions to your secret. Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
308
317
309
318
{{< embed-md "rc-rdi-secrets-permissions.md" >}}
310
319
311
-
Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
312
-
313
320
--tab-sep--
314
321
315
322
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. [Create a secret](https://docs.aws.amazon.com/secretsmanager/latest/userguide/create_secret.html) of type **Other type of secret** with the following settings:
@@ -320,8 +327,6 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
320
327
321
328
{{< /multitabs >}}
322
329
323
-
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page.
324
-
325
330
## Next steps
326
331
327
332
After you have set up your source database and prepared connectivity and credentials, select **Define source database** to [define your source connection and data pipeline]({{<relref "/operate/rc/databases/rdi/define">}}).
0 commit comments