Skip to content

Commit 21af1ff

Browse files
committed
Additional fixes and organization changes
1 parent bf475b4 commit 21af1ff

File tree

3 files changed

+15
-13
lines changed

3 files changed

+15
-13
lines changed

content/operate/rc/security/aws-privatelink.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ categories:
77
- rc
88
description: null
99
linkTitle: AWS PrivateLink
10-
weight: 90
10+
weight: 80
1111
bannerText: AWS PrivateLink is currently in preview. Features and behavior are subject to change. Redis does not recommend using AWS PrivateLink in production environments.
1212
---
1313

@@ -17,9 +17,9 @@ bannerText: AWS PrivateLink is currently in preview. Features and behavior are s
1717
Connecting to Redis Cloud with an AWS PrivateLink is available only with Redis Cloud Pro. It is not supported for Redis Cloud Essentials.
1818
{{< /note >}}
1919

20-
You can use PrivateLink as an alternative to IP-based private connectivity options like [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}) and [Transit Gateway]({{< relref "/operate/rc/security/aws-transit-gateway" >}}).
20+
You can use PrivateLink as an alternative to Layer 3 connectivity options like [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}) and [Transit Gateway]({{< relref "/operate/rc/security/aws-transit-gateway" >}}).
2121

22-
AWS PrivateLink provides the following benefits over VPC Peering:
22+
AWS PrivateLink provides the following benefits:
2323

2424
- **Improved Security**: PrivateLink exposes the Redis cluster and database(s) as a unidirectional endpoint inside your consumer VPC, thereby avoiding exposing entire VPC subnets to each other and eliminating some possible attack vectors.
2525
- **Network Flexibility**: PrivateLink enables cross-account and cross-VPC connectivity and can be configured even when the Redis Cloud VPC and your consumer VPC have overlapping CIDR/IP ranges.
@@ -29,11 +29,11 @@ AWS PrivateLink provides the following benefits over VPC Peering:
2929

3030
Be aware of the following limitations when using PrivateLink with Redis Cloud:
3131
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/create-database#oss-cluster-api" >}}) with PrivateLink during preview.
32-
- Redis Cloud [Bring your Own Cloud]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud" >}}) subscriptions are not supported with PrivateLink.
32+
- You cannot use Layer 3 connectivity options like VPC peering or Transit Gateway with PrivateLink during private preview.
3333
- Redis Cloud subscriptions with AWS PrivateLink are limited to a maximum of 55 databases. [Contact support](https://redis.com/company/support/) if you need more than 55 databases in one subscription with AWS PrivateLink.
3434
- Your subnets must have at least 16 available IP addresses for the resource endpoint.
35-
- Some AWS regions do not support PrivateLink. See [AWS VPC Lattice Pricing](https://aws.amazon.com/vpc/lattice/pricing/) for a list of regions that support AWS PrivateLink.
36-
- Redis Cloud's PrivateLink implementation is based on Amazon VPC Lattice, so the [VPC Lattice quotas](https://docs.aws.amazon.com/vpc-lattice/latest/ug/quotas.html) apply. Currently, the following availability zones are not supported with Amazon VPC Lattice:
35+
- Some AWS regions do not support PrivateLink Resource Endpoints. See [AWS VPC Lattice Pricing](https://aws.amazon.com/vpc/lattice/pricing/) for a list of regions that support AWS PrivateLink Resource Endpoints.
36+
- Redis Cloud's PrivateLink implementation uses PrivateLink Resource Endpoints, which is based on Amazon VPC Lattice, so the [VPC Lattice quotas](https://docs.aws.amazon.com/vpc-lattice/latest/ug/quotas.html) apply. Currently, the following availability zones are not supported with Amazon VPC Lattice:
3737
- `use1-az3`
3838
- `usw1-az2`
3939
- `apne1-az3`
@@ -44,6 +44,7 @@ Be aware of the following limitations when using PrivateLink with Redis Cloud:
4444
- `ilc1-az2`
4545

4646
We recommend avoiding these availability zones when creating your Redis Cloud database if you plan to use AWS PrivateLink.
47+
- Redis Cloud [Bring your Own Cloud]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud" >}}) subscriptions are not supported with PrivateLink.
4748

4849
## Prerequisites
4950

@@ -129,6 +130,7 @@ Follow the guide to [create a VPC resource endpoint in the AWS console](https://
129130
- **Type**: Select **Resources**.
130131
- **Resource configurations**: Select the configuration with the same Resource Configuration ID as the one shown in the Redis Cloud console.
131132
- **VPC**: Select your VPC from the list.
133+
- **Addtional settings**: Select **Enable private DNS name** and set **Private DNS Preference** to **Verified domains only** or **Verified domains and specified domains**.
132134
- **Subnets**: Select the subnets to create endpoint network resources in.
133135
- **Security groups**: Select any security groups you want to associate with the resource endpoint, including the security group that allows access to the necessary ports, as described in the [prerequisites](#prerequisites)
134136

@@ -154,11 +156,11 @@ To use the AWS CLI to connect to an already existing service network, select **C
154156

155157
{{< /multitabs >}}
156158

157-
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, download the **Discovery script** and run it in your consumer VPC to discover the database endpoints.
158-
159159
## Connect to your database with PrivateLink
160160

161-
The downloaded Discovery Script returns a list of database endpoints that you can connect to from your consumer VPC.
161+
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, download the **Discovery script** and run it in your consumer VPC to discover the database endpoints.
162+
163+
The script returns a list of database endpoints that you can connect to from your consumer VPC.
162164

163165
```json
164166
[
@@ -180,5 +182,5 @@ The downloaded Discovery Script returns a list of database endpoints that you ca
180182

181183
You can connect to your database by using the database `private-dns-entry` and `port` from your consumer VPC.
182184

183-
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab or by going to the [connection wizard]({{< relref "/operate/rc/databases/connect" >}}) for your database.
185+
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab or by going to the [connection wizard]({{< relref "/operate/rc/databases/connect" >}}) for your database. The private endpoint will point to the PrivateLink VPC resource endpoint or service network that you created.
184186

content/operate/rc/security/aws-transit-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ categories:
66
- operate
77
- rc
88
description: null
9-
linkTitle: Transit Gateway
9+
linkTitle: AWSTransit Gateway
1010
weight: 80
1111
---
1212

content/operate/rc/security/private-service-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
Title: Enable Private Service Connect
2+
Title: Enable Google Cloud Private Service Connect
33
alwaysopen: false
44
categories:
55
- docs
@@ -9,7 +9,7 @@ description: Private Service Connect creates a private endpoint that allows secu
99
connections to Redis Cloud databases without exposing your application VPC.
1010
linkTitle: Private Service Connect
1111
toc: 'true'
12-
weight: 50
12+
weight: 80
1313
---
1414

1515
[Private Service Connect](https://cloud.google.com/vpc/docs/private-service-connect) (PSC) creates a private endpoint that allows secure connections to Redis Cloud databases without exposing your application's [virtual private cloud](https://en.wikipedia.org/wiki/Virtual_private_cloud) (VPC).

0 commit comments

Comments
 (0)