You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/operate/rs/databases/import-export/import-data.md
+135Lines changed: 135 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,8 @@ Importing data erases all existing content in the database.
23
23
24
24
## Import data into a database
25
25
26
+
### Cluster Manager UI method
27
+
26
28
To import data into a database using the Cluster Manager UI:
27
29
28
30
1. On the **Databases** screen, select the database from the list, then select **Configuration**.
@@ -33,6 +35,41 @@ To import data into a database using the Cluster Manager UI:
33
35
See [Supported storage locations](#supported-storage-locations) for more information about each storage location type.
34
36
1. Select **Import**.
35
37
38
+
### REST API method
39
+
40
+
To import data into a database using the REST API, send an [import database request]({{<relref "/operate/rs/references/rest-api/requests/bdbs/actions/import">}}):
41
+
42
+
```sh
43
+
POST /v1/bdbs/<database-id>/actions/import
44
+
{
45
+
"dataset_import_sources": [
46
+
{
47
+
"type": "<location-type>",
48
+
// additional fields, depending on location_type
49
+
},
50
+
{
51
+
"type": "<location-type>",
52
+
// additional fields, depending on location_type
53
+
}
54
+
]
55
+
}
56
+
```
57
+
58
+
- Replace `<database-id>` with the destination database's ID.
59
+
60
+
- Replace the data source's `<location-type>` with the relevant value from the following options:
61
+
62
+
| Location type | "type" value |
63
+
|---------------|--------------|
64
+
| FTPS | "url" |
65
+
| SFTP | "sftp" |
66
+
| Amazon S3 | "s3" |
67
+
| Google Cloud Storage | "gs" |
68
+
| Microsoft Azure Storage | "abs" |
69
+
| NAS/Local Storage | "mount_point" |
70
+
71
+
See the following storage location sections for REST API request examples for each location type.
Data can be imported from a local mount point, transferred to [a URI](https://en.wikipedia.org/wiki/Uniform_Resource_Identifier) using FTP/SFTP, or stored on cloud provider storage.
Copy file name to clipboardExpand all lines: content/operate/rs/installing-upgrading/install/customize-user-and-group.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,22 +10,26 @@ linkTitle: Customize user and group
10
10
weight: 40
11
11
---
12
12
13
-
By default, Redis Enterprise Software is installed with the user:group`redislabs:redislabs`. See [Access control]({{< relref "/operate/rs/security/access-control" >}}) for user and group security information.
13
+
By default, Redis Enterprise Software is installed with the user:group`redislabs:redislabs`.
14
14
15
15
During installation, you can specify the user and group that own all Redis Enterprise Software processes.
16
16
17
-
If you specify the user only, then installation is run with the primary group that the user belongs to.
17
+
## Considerations
18
18
19
-
{{< note >}}
20
19
- Custom installation user is supported on Red Hat Enterprise Linux.
21
-
- When you install with custom directories, the installation does not run as an RPM file.
22
-
- You must create the user and group before attempting to install Redis Software.
20
+
21
+
- You must create the user and group before installing Redis Enterprise Software.
22
+
23
+
- You must install Redis Enterprise Software on all nodes in the cluster with the same user and group.
24
+
23
25
- You can specify an LDAP user as the installation user.
24
-
{{< /note >}}
25
26
26
-
To customize the user or group during [installation]({{< relref "/operate/rs/installing-upgrading/install/install-on-linux" >}}), include the `--os-user` or `--os-group`[command-line options]({{< relref "/operate/rs/installing-upgrading/install/install-script" >}}) when you run the `install.sh` script. For example:
27
+
- If you specify the user only, then installation is run with the primary group that the user belongs to.
28
+
29
+
## Install with custom user or group
30
+
31
+
To customize the user or group during [installation]({{< relref "/operate/rs/installing-upgrading/install/install-on-linux" >}}), include the `--os-user` or `--os-group`[command-line options]({{< relref "/operate/rs/installing-upgrading/install/install-script" >}}) when you run the `install.sh` script.
Copy file name to clipboardExpand all lines: content/operate/rs/references/rest-api/requests/users/authorize.md
+18-17Lines changed: 18 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,13 +13,13 @@ weight: $weight
13
13
14
14
| Method | Path | Description |
15
15
|--------|------|-------------|
16
-
|[POST](#post-authorize)|`/v1/users/authorize`|Authorize a user |
16
+
|[POST](#post-authorize)|`/v1/users/authorize`|Generate a token to authorize an authenticated user |
17
17
18
18
## Authorize user {#post-authorize}
19
19
20
20
POST /v1/users/authorize
21
21
22
-
Generate a JSON Web Token (JWT) for a user to use as authorization to access the REST API.
22
+
Generates a JSON Web Token (JWT) for a user to use as authorization to access the REST API. The request authentication header must include the relevant username and password.
23
23
24
24
### Request {#post-request}
25
25
@@ -29,12 +29,13 @@ Generate a JSON Web Token (JWT) for a user to use as authorization to access the
The request body is optional unless you want to specify the token's time to live:
33
+
34
+
```json
35
+
{
36
+
"ttl": <time_in_seconds>
37
+
}
38
+
```
38
39
39
40
#### Request headers
40
41
| Key | Value | Description |
@@ -44,19 +45,19 @@ Generate a JSON Web Token (JWT) for a user to use as authorization to access the
44
45
45
46
#### Request body
46
47
47
-
Include a [JWT authorize object]({{< relref "/operate/rs/references/rest-api/objects/jwt_authorize" >}}) with a valid username and password in the request body.
48
+
Optionally include a JSON object in the request body to specify the time to live (`ttl`), which determines the amount of time in seconds the token will be valid. The default `ttl` is `300` seconds. The minimum `ttl` is `1` second and the maximum `ttl` is `86400` seconds.
48
49
49
50
### Response {#post-response}
50
51
51
52
Returns a JSON object that contains the generated access token.
@@ -72,6 +73,6 @@ The following are possible `error_code` values:
72
73
73
74
| Code | Description |
74
75
|------|-------------|
75
-
|[200 OK](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.1)| The user is authorized. |
76
-
|[400 Bad Request](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.4.1)| The request could not be understood by the server due to malformed syntax. |
77
-
|[401 Unauthorized](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.4.2)| The user is unauthorized. |
76
+
|[200 OK](https://www.rfc-editor.org/rfc/rfc9110.html#name-200-ok)| The user is authorized. |
77
+
|[400 Bad Request](https://www.rfc-editor.org/rfc/rfc9110.html#name-400-bad-request)| The request could not be understood by the server due to malformed syntax. |
78
+
|[401 Unauthorized](https://www.rfc-editor.org/rfc/rfc9110.html#name-401-unauthorized)| The user is unauthorized. |
0 commit comments