Skip to content

Commit e0b86c1

Browse files
committed
Added NLB and Endpoint service steps
1 parent 892b6d4 commit e0b86c1

File tree

2 files changed

+43
-16
lines changed

2 files changed

+43
-16
lines changed

content/operate/rc/databases/rdi/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ RDI encrypts all network connections with TLS. The pipeline will process data fr
4242
Before you can create a data pipeline, you must have:
4343

4444
- A [Redis Cloud Pro database]({{< relref "/operate/rc/databases/create-database/create-pro-database-new" >}}) hosted on Amazon Web Services (AWS). This will be the target database.
45-
- One supported source database, also hosted on AWS and connected to [AWS PrivateLink](https://aws.amazon.com/privatelink/):
45+
- One supported source database, hosted on an AWS EC2 instance:
4646
- MySQL
4747
- Oracle
4848
- SQL Server

content/operate/rc/databases/rdi/setup.md

Lines changed: 42 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,12 @@ See [Prepare source databases]({{<relref "/integrate/redis-data-integration/data
4242

4343
See the [RDI architecture overview]({{< relref "/integrate/redis-data-integration/architecture#overview" >}}) for more information about CDC.
4444

45-
## Set up service provider
45+
## Set up connectivity
46+
47+
To ensure that you can connect your Redis Cloud database to the source database hosted an AWS EC2 instance, you need to set up an endpoint service through AWS PrivateLink. To do this:
48+
49+
1. [Create a network load balancer](#create-network-load-balancer) that will route incoming HTTP requests to your database.
50+
1. [Create an endpoint service](#create-endpoint-service) through AWS PrivateLink.
4651

4752
### Create network load balancer
4853

@@ -53,9 +58,43 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
5358
- **Load balancer IP address type**: Select **IPv4**.
5459
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
5560
1. In **Security groups**, select the security group associated with your source database.
56-
1. In **Listeners and routing**, select **Create target group**
57-
61+
1. In **Listeners and routing**:
62+
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
63+
1. In **Specify group details**:
64+
- **Target type**: Select **Instances**.
65+
- **Protocol : Port**: Select **TCP**, and then enter the port number where your database is exposed.
66+
- The **IP address type** and **VPC** should be selected already and match the VPC you selected earlier.
67+
1. In **Register targets**, select the EC2 instance that runs your source database, enter the port, and select **Include as pending below**. Then, select **Create target group** to create your target group. Return **Listeners and routing** in the Network Load Balancer setup.
68+
1. Set the following **Listener** properties:
69+
- **Protocol**: Select **TCP**.
70+
- **Port**: Enter **80**.
71+
- **Default action**: Select the target group you created in the previous step.
72+
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
73+
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
74+
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
75+
- **Type**: Select **HTTP**.
76+
- **Source**: Select **Anywhere - IPv4**.
77+
Select **Save rules** to save your changes.
78+
79+
### Create endpoint service
80+
81+
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Networking & Content Delivery** > **VPC**. There, select **PrivateLink and Lattice** > **Endpoint services**. [Create an endpoint service](https://docs.aws.amazon.com/vpc/latest/privatelink/create-endpoint-service.html) with the following settings:
82+
83+
1. In **Available load balancers**, select the [network load balancer](#create-network-load-balancer) you created.
84+
1. In **Additional settings**, choose the following settings:
85+
- **Require acceptance for endpoint**: Select **Acceptance required**.
86+
- **Supported IP address types**: Select **IPv4**.
87+
1. Select **Create** to create the endpoint service.
88+
89+
After you create the endpoint service, you need to add Redis Cloud as an Allowed Principal on your [endpoint service VPC permissions](https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permissions).
90+
91+
1. In the Redis Cloud Console, copy the Amazon Resource Name (ARN) provided in the **Setup connectivity** section.
92+
1. Return to the endpoint service list on the [Amazon VPC console](https://console.aws.amazon.com/vpc/). Select the endpoint service you just created.
93+
1. Navigate to **Allow principals** tab.
94+
1. Add the Redis Cloud ARN you copied and choose **Allow principals**.
95+
1. Save the service name for later.
5896

97+
For more details on AWS PrivateLink, see [Share your services through AWS PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-share-your-services.html).
5998

6099
## Share source database credentials
61100

@@ -120,18 +159,6 @@ If your source database has TLS or mTLS enabled, we recommend that you enter the
120159

121160
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page.
122161

123-
## Set up connectivity
124-
125-
To expose your source database to Redis, you need to add Redis Cloud as an Allowed Principal on the [AWS PrivateLink VPC permissions](https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permissions) for the PrivateLink connected to your source database.
126-
127-
1. Copy the Amazon Resource Name (ARN) provided in the **Setup connectivity** section.
128-
1. Open the [Amazon VPC console](https://console.aws.amazon.com/vpc/) and select **Endpoint services**.
129-
1. Navigate to **Allow principals** tab.
130-
1. Add the Redis Cloud ARN and choose **Allow principals**.
131-
1. Copy your PrivateLink service name for later.
132-
133-
For more details on AWS PrivateLink, see [Share your services through AWS PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-share-your-services.html).
134-
135162

136163
## Next steps
137164

0 commit comments

Comments
 (0)