You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/operate/rc/security/aws-privatelink.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ categories:
7
7
- rc
8
8
description: null
9
9
linkTitle: AWS PrivateLink
10
-
weight: 90
10
+
weight: 80
11
11
bannerText: AWS PrivateLink is currently in preview. Features and behavior are subject to change. Redis does not recommend using AWS PrivateLink in production environments.
12
12
---
13
13
@@ -17,9 +17,9 @@ bannerText: AWS PrivateLink is currently in preview. Features and behavior are s
17
17
Connecting to Redis Cloud with an AWS PrivateLink is available only with Redis Cloud Pro. It is not supported for Redis Cloud Essentials.
18
18
{{< /note >}}
19
19
20
-
You can use PrivateLink as an alternative to IP-based private connectivity options like [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}) and [Transit Gateway]({{< relref "/operate/rc/security/aws-transit-gateway" >}}).
20
+
You can use PrivateLink as an alternative to Layer 3 connectivity options like [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}) and [Transit Gateway]({{< relref "/operate/rc/security/aws-transit-gateway" >}}).
21
21
22
-
AWS PrivateLink provides the following benefits over VPC Peering:
22
+
AWS PrivateLink provides the following benefits:
23
23
24
24
-**Improved Security**: PrivateLink exposes the Redis cluster and database(s) as a unidirectional endpoint inside your consumer VPC, thereby avoiding exposing entire VPC subnets to each other and eliminating some possible attack vectors.
25
25
-**Network Flexibility**: PrivateLink enables cross-account and cross-VPC connectivity and can be configured even when the Redis Cloud VPC and your consumer VPC have overlapping CIDR/IP ranges.
@@ -29,11 +29,11 @@ AWS PrivateLink provides the following benefits over VPC Peering:
29
29
30
30
Be aware of the following limitations when using PrivateLink with Redis Cloud:
31
31
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/create-database#oss-cluster-api" >}}) with PrivateLink during preview.
32
-
-Redis Cloud [Bring your Own Cloud]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud" >}}) subscriptions are not supported with PrivateLink.
32
+
-You cannot use Layer 3 connectivity options like VPC peering or Transit Gateway with PrivateLink during private preview.
33
33
- Redis Cloud subscriptions with AWS PrivateLink are limited to a maximum of 55 databases. [Contact support](https://redis.com/company/support/) if you need more than 55 databases in one subscription with AWS PrivateLink.
34
34
- Your subnets must have at least 16 available IP addresses for the resource endpoint.
35
-
- Some AWS regions do not support PrivateLink. See [AWS VPC Lattice Pricing](https://aws.amazon.com/vpc/lattice/pricing/) for a list of regions that support AWS PrivateLink.
36
-
- Redis Cloud's PrivateLink implementation is based on Amazon VPC Lattice, so the [VPC Lattice quotas](https://docs.aws.amazon.com/vpc-lattice/latest/ug/quotas.html) apply. Currently, the following availability zones are not supported with Amazon VPC Lattice:
35
+
- Some AWS regions do not support PrivateLink Resource Endpoints. See [AWS VPC Lattice Pricing](https://aws.amazon.com/vpc/lattice/pricing/) for a list of regions that support AWS PrivateLink Resource Endpoints.
36
+
- Redis Cloud's PrivateLink implementation uses PrivateLink Resource Endpoints, which is based on Amazon VPC Lattice, so the [VPC Lattice quotas](https://docs.aws.amazon.com/vpc-lattice/latest/ug/quotas.html) apply. Currently, the following availability zones are not supported with Amazon VPC Lattice:
37
37
-`use1-az3`
38
38
-`usw1-az2`
39
39
-`apne1-az3`
@@ -44,6 +44,7 @@ Be aware of the following limitations when using PrivateLink with Redis Cloud:
44
44
-`ilc1-az2`
45
45
46
46
We recommend avoiding these availability zones when creating your Redis Cloud database if you plan to use AWS PrivateLink.
47
+
- Redis Cloud [Bring your Own Cloud]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud" >}}) subscriptions are not supported with PrivateLink.
47
48
48
49
## Prerequisites
49
50
@@ -129,6 +130,7 @@ Follow the guide to [create a VPC resource endpoint in the AWS console](https://
129
130
-**Type**: Select **Resources**.
130
131
-**Resource configurations**: Select the configuration with the same Resource Configuration ID as the one shown in the Redis Cloud console.
131
132
-**VPC**: Select your VPC from the list.
133
+
-**Addtional settings**: Select **Enable private DNS name** and set **Private DNS Preference** to **Verified domains only** or **Verified domains and specified domains**.
132
134
-**Subnets**: Select the subnets to create endpoint network resources in.
133
135
-**Security groups**: Select any security groups you want to associate with the resource endpoint, including the security group that allows access to the necessary ports, as described in the [prerequisites](#prerequisites)
134
136
@@ -154,11 +156,11 @@ To use the AWS CLI to connect to an already existing service network, select **C
154
156
155
157
{{< /multitabs >}}
156
158
157
-
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, download the **Discovery script** and run it in your consumer VPC to discover the database endpoints.
158
-
159
159
## Connect to your database with PrivateLink
160
160
161
-
The downloaded Discovery Script returns a list of database endpoints that you can connect to from your consumer VPC.
161
+
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, download the **Discovery script** and run it in your consumer VPC to discover the database endpoints.
162
+
163
+
The script returns a list of database endpoints that you can connect to from your consumer VPC.
162
164
163
165
```json
164
166
[
@@ -180,5 +182,5 @@ The downloaded Discovery Script returns a list of database endpoints that you ca
180
182
181
183
You can connect to your database by using the database `private-dns-entry` and `port` from your consumer VPC.
182
184
183
-
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab or by going to the [connection wizard]({{< relref "/operate/rc/databases/connect" >}}) for your database.
185
+
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab or by going to the [connection wizard]({{< relref "/operate/rc/databases/connect" >}}) for your database. The private endpoint will point to the PrivateLink VPC resource endpoint or service network that you created.
Copy file name to clipboardExpand all lines: content/operate/rc/security/private-service-connect.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
Title: Enable Private Service Connect
2
+
Title: Enable Google Cloud Private Service Connect
3
3
alwaysopen: false
4
4
categories:
5
5
- docs
@@ -9,7 +9,7 @@ description: Private Service Connect creates a private endpoint that allows secu
9
9
connections to Redis Cloud databases without exposing your application VPC.
10
10
linkTitle: Private Service Connect
11
11
toc: 'true'
12
-
weight: 50
12
+
weight: 80
13
13
---
14
14
15
15
[Private Service Connect](https://cloud.google.com/vpc/docs/private-service-connect) (PSC) creates a private endpoint that allows secure connections to Redis Cloud databases without exposing your application's [virtual private cloud](https://en.wikipedia.org/wiki/Virtual_private_cloud) (VPC).
0 commit comments