You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/operate/rc/databases/rdi/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ RDI encrypts all network connections with TLS. The pipeline will process data fr
42
42
Before you can create a data pipeline, you must have:
43
43
44
44
- A [Redis Cloud Pro database]({{< relref "/operate/rc/databases/create-database/create-pro-database-new" >}}) hosted on Amazon Web Services (AWS). This will be the target database.
45
-
- One supported source database, also hosted on AWS and connected to [AWS PrivateLink](https://aws.amazon.com/privatelink/):
45
+
- One supported source database, hosted on an AWS EC2 instance:
Copy file name to clipboardExpand all lines: content/operate/rc/databases/rdi/setup.md
+42-15Lines changed: 42 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,12 @@ See [Prepare source databases]({{<relref "/integrate/redis-data-integration/data
42
42
43
43
See the [RDI architecture overview]({{< relref "/integrate/redis-data-integration/architecture#overview" >}}) for more information about CDC.
44
44
45
-
## Set up service provider
45
+
## Set up connectivity
46
+
47
+
To ensure that you can connect your Redis Cloud database to the source database hosted an AWS EC2 instance, you need to set up an endpoint service through AWS PrivateLink. To do this:
48
+
49
+
1.[Create a network load balancer](#create-network-load-balancer) that will route incoming HTTP requests to your database.
50
+
1.[Create an endpoint service](#create-endpoint-service) through AWS PrivateLink.
46
51
47
52
### Create network load balancer
48
53
@@ -53,9 +58,43 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
53
58
-**Load balancer IP address type**: Select **IPv4**.
54
59
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
55
60
1. In **Security groups**, select the security group associated with your source database.
56
-
1. In **Listeners and routing**, select **Create target group**
57
-
61
+
1. In **Listeners and routing**:
62
+
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
63
+
1. In **Specify group details**:
64
+
-**Target type**: Select **Instances**.
65
+
-**Protocol : Port**: Select **TCP**, and then enter the port number where your database is exposed.
66
+
- The **IP address type** and **VPC** should be selected already and match the VPC you selected earlier.
67
+
1. In **Register targets**, select the EC2 instance that runs your source database, enter the port, and select **Include as pending below**. Then, select **Create target group** to create your target group. Return **Listeners and routing** in the Network Load Balancer setup.
68
+
1. Set the following **Listener** properties:
69
+
-**Protocol**: Select **TCP**.
70
+
-**Port**: Enter **80**.
71
+
-**Default action**: Select the target group you created in the previous step.
72
+
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
73
+
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
74
+
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
75
+
-**Type**: Select **HTTP**.
76
+
-**Source**: Select **Anywhere - IPv4**.
77
+
Select **Save rules** to save your changes.
78
+
79
+
### Create endpoint service
80
+
81
+
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Networking & Content Delivery** > **VPC**. There, select **PrivateLink and Lattice** > **Endpoint services**. [Create an endpoint service](https://docs.aws.amazon.com/vpc/latest/privatelink/create-endpoint-service.html) with the following settings:
82
+
83
+
1. In **Available load balancers**, select the [network load balancer](#create-network-load-balancer) you created.
84
+
1. In **Additional settings**, choose the following settings:
85
+
-**Require acceptance for endpoint**: Select **Acceptance required**.
86
+
-**Supported IP address types**: Select **IPv4**.
87
+
1. Select **Create** to create the endpoint service.
88
+
89
+
After you create the endpoint service, you need to add Redis Cloud as an Allowed Principal on your [endpoint service VPC permissions](https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permissions).
90
+
91
+
1. In the Redis Cloud Console, copy the Amazon Resource Name (ARN) provided in the **Setup connectivity** section.
92
+
1. Return to the endpoint service list on the [Amazon VPC console](https://console.aws.amazon.com/vpc/). Select the endpoint service you just created.
93
+
1. Navigate to **Allow principals** tab.
94
+
1. Add the Redis Cloud ARN you copied and choose **Allow principals**.
95
+
1. Save the service name for later.
58
96
97
+
For more details on AWS PrivateLink, see [Share your services through AWS PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-share-your-services.html).
59
98
60
99
## Share source database credentials
61
100
@@ -120,18 +159,6 @@ If your source database has TLS or mTLS enabled, we recommend that you enter the
120
159
121
160
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page.
122
161
123
-
## Set up connectivity
124
-
125
-
To expose your source database to Redis, you need to add Redis Cloud as an Allowed Principal on the [AWS PrivateLink VPC permissions](https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permissions) for the PrivateLink connected to your source database.
126
-
127
-
1. Copy the Amazon Resource Name (ARN) provided in the **Setup connectivity** section.
128
-
1. Open the [Amazon VPC console](https://console.aws.amazon.com/vpc/) and select **Endpoint services**.
129
-
1. Navigate to **Allow principals** tab.
130
-
1. Add the Redis Cloud ARN and choose **Allow principals**.
131
-
1. Copy your PrivateLink service name for later.
132
-
133
-
For more details on AWS PrivateLink, see [Share your services through AWS PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-share-your-services.html).
0 commit comments