Skip to content

Commit dd25d85

Browse files
committed
Merge branch 'preview-rc-rdi' into RDSC-4040-add-note-for-RDS-proxy
2 parents 20e9d5d + ff650a3 commit dd25d85

File tree

2 files changed

+24
-17
lines changed

2 files changed

+24
-17
lines changed

content/embeds/rc-rdi-secrets-permissions.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,4 +14,6 @@
1414
}
1515
} ]
1616
}
17-
```
17+
```
18+
19+
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page. Save the secret ARN to use when you [define your source database]({{<relref "/operate/rc/databases/rdi/define">}}).

content/operate/rc/databases/rdi/setup.md

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
8080
- **Scheme**: Select **Internal**.
8181
- **Load balancer IP address type**: Select **IPv4**.
8282
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
83-
1. In **Security groups**, select the security group associated with your source database.
83+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
8484
1. In **Listeners and routing**:
8585
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
8686
1. In **Specify group details**:
@@ -93,7 +93,11 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
9393
- **Port**: Enter your source database's port.
9494
- **Default action**: Select the target group you created in the previous step.
9595
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
96-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
96+
1. After the network load balancer is active, select **Security**.
97+
98+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
99+
100+
1. Select the security group ID to open the Security group settings.
97101
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
98102
- **Type**: Select **HTTP**.
99103
- **Source**: Select **Anywhere - IPv4**.
@@ -158,8 +162,8 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
158162
- **Scheme**: Select **Internal**.
159163
- **Load balancer IP address type**: Select **IPv4**.
160164
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
161-
1. In **Security groups**, select the security group associated with your source database.
162-
1. In **Listeners and routing**:
165+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
166+
1. In **Listeners and routing**:
163167
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
164168
1. In **Specify group details**:
165169
- **Target type**: Select **IP Addresses**.
@@ -183,7 +187,12 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
183187
- **Port**: Enter your source database's port.
184188
- **Default action**: Select the target group you created in the previous step.
185189
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
186-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
190+
1. After the network load balancer is active, select **Security**.
191+
192+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
193+
194+
1. Select the security group ID to open the Security group settings.
195+
187196
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
188197
- **Type**: Select **HTTP**.
189198
- **Source**: Select **Anywhere - IPv4**.
@@ -243,10 +252,10 @@ The required secrets depend on your source database's security configuration. Th
243252
244253
| Security configuration | Required secrets |
245254
| :-- | :-- |
246-
| Username and password only | <ul><li>Credentials secret (username and password)</li></ul> |
247-
| TLS connection | <ul><li>Credentials secret (username and password)</li><li>CA Certificate secret (server certificate)</li></ul> |
248-
| mTLS connection | <ul><li>Credentials secret (username and password)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li></ul> |
249-
| mTLS connection with client key passphrase | <ul><li>Credentials secret (username and password)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li><li>Client key passphrase secret</li></ul> |
255+
| Username and password only | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li></ul> |
256+
| TLS connection | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li><li>CA Certificate secret (server certificate)</li></ul> |
257+
| mTLS connection | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li></ul> |
258+
| mTLS connection with client key passphrase | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li><li>Client key passphrase secret</li></ul> |
250259
251260
Select a tab to learn how to create the required secret.
252261
@@ -261,8 +270,8 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
261270
262271
- **Key/value pairs**: Enter the following key/value pairs.
263272
264-
- `username`: Database username
265-
- `password`: Database password
273+
- `username`: Database username for the RDI pipeline user
274+
- `password`: Database password for the RDI pipeline user
266275
267276
{{< embed-md "rc-rdi-secrets-encryption-permissions.md" >}}
268277
@@ -304,12 +313,10 @@ After you create the secret, you need to add permissions to allow the data pipel
304313
305314
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. Select the private key secret you just created and then select **Edit permissions**.
306315
307-
Add the following permissions to your secret:
316+
Add the following permissions to your secret. Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
308317
309318
{{< embed-md "rc-rdi-secrets-permissions.md" >}}
310319
311-
Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
312-
313320
--tab-sep--
314321
315322
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. [Create a secret](https://docs.aws.amazon.com/secretsmanager/latest/userguide/create_secret.html) of type **Other type of secret** with the following settings:
@@ -320,8 +327,6 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
320327
321328
{{< /multitabs >}}
322329
323-
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page.
324-
325330
## Next steps
326331
327332
After you have set up your source database and prepared connectivity and credentials, select **Define source database** to [define your source connection and data pipeline]({{<relref "/operate/rc/databases/rdi/define">}}).

0 commit comments

Comments
 (0)