Skip to content

Commit 839cb15

Browse files
committed
Add more screenshots & specify metrics
1 parent 0ea5739 commit 839cb15

File tree

8 files changed

+22
-5
lines changed

8 files changed

+22
-5
lines changed

content/integrate/prometheus-with-redis-cloud/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ You can use Prometheus and Grafana to collect and visualize your Redis Cloud met
2323

2424
Redis Cloud exposes its metrics through a Prometheus endpoint. You can configure your Prometheus server to scrape metrics from your Redis Cloud subscription on port 8070.
2525

26-
The Redis Cloud Prometheus endpoint is exposed on Redis Cloud's internal network. To access this network, enable [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}) or [Private Service Connect]({{< relref "/operate/rc/security/private-service-connect" >}}). Both options are only available with Redis Cloud Pro. You cannot use Prometheus and Grafana with Redis Cloud Essentials.
26+
The Redis Cloud Prometheus endpoint is exposed on Redis Cloud's internal network. To access this network, enable [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}), [Private Service Connect]({{< relref "/operate/rc/security/private-service-connect" >}}), [AWS Transit Gateway]({{< relref "/operate/rc/security/aws-transit-gateway" >}}), or [AWS PrivateLink]({{< relref "/operate/rc/security/aws-privatelink" >}}). Private connectivity options are only available with Redis Cloud Pro. You cannot use Prometheus and Grafana with Redis Cloud Essentials.
2727

2828
{{< note >}}
2929

content/operate/rc/security/aws-privatelink.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ AWS PrivateLink provides the following benefits:
2828
## Limitations
2929

3030
Be aware of the following limitations when using PrivateLink with Redis Cloud:
31-
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/create-database#oss-cluster-api" >}}) with PrivateLink during preview.
31+
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/configuration/clustering#oss-cluster-api" >}}) with PrivateLink during preview.
3232
- You cannot use Layer 3 connectivity options like VPC peering or Transit Gateway with PrivateLink during private preview.
3333
- Redis Cloud subscriptions with AWS PrivateLink are limited to a maximum of 55 databases. [Contact support](https://redis.com/company/support/) if you need more than 55 databases in one subscription with AWS PrivateLink.
3434
- Your subnets must have at least 16 available IP addresses for the resource endpoint.
@@ -97,7 +97,7 @@ In this step, you will associate the Redis Cloud resource share with an AWS prin
9797

9898
{{<image filename="images/rc/privatelink-aws-consumer-principals.png" width="80%" alt="The AWS consumer principals section with an AWS account added as a principal." >}}
9999

100-
1. Select **Share** to share the resource share with the principal.
100+
1. Select **Share** to share the resource share with the principal. The first resource share may take a few minutes.
101101

102102
1. After sharing the resource share with the principal, [accept the resource share in the Resource Access Manager](https://docs.aws.amazon.com/ram/latest/userguide/working-with-shared-invitations.html) or copy the **Accept resource share** command and run it with the AWS CLI.
103103

@@ -158,7 +158,11 @@ To use the AWS CLI to connect to an already existing service network, select **C
158158

159159
## Connect to your database with PrivateLink
160160

161-
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, download the **Discovery script** and run it in your consumer VPC to discover the database endpoints.
161+
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, you can find the endpoints for your databases and cluster metrics in the AWS UI by going to the **Associations** tab for your endpoint or service network and viewing the Private DNS entries. You will have one entry for each database and one entry for the metrics endpoint.
162+
163+
{{<image filename="images/rc/privatelink-aws-endpoint-associations.png" width="80%" alt="The Associations tab for a VPC resource endpoint, showing the Private DNS entries for the databases and metrics endpoint." >}}
164+
165+
To view them on Redis Cloud, download the **Discovery script** from the Redis Cloud console and run it in your consumer VPC to discover the database endpoints.
162166

163167
The script returns a list of database endpoints that you can connect to from your consumer VPC.
164168

@@ -180,7 +184,20 @@ The script returns a list of database endpoints that you can connect to from you
180184
]
181185
```
182186

183-
You can connect to your database by using the database `private-dns-entry` and `port` from your consumer VPC.
187+
You can connect to your database by using the database `private-dns-entry` and `port` from your consumer VPC. You can also connect to the metrics endpoint with services like [Prometheus and Grafana]({{< relref "/integrate/prometheus-with-redis-cloud/" >}}) by using the metrics `private-dns-entry` and `port`.
184188

185189
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab or by going to the [connection wizard]({{< relref "/operate/rc/databases/connect" >}}) for your database. The private endpoint will point to the PrivateLink VPC resource endpoint or service network that you created.
186190

191+
## Disassociate connection
192+
193+
To disassociate a PrivateLink connection:
194+
195+
1. Go to the **Connectivity > PrivateLink** tab in your Redis Cloud subscription.
196+
197+
1. In the **Connections** section, select **Disassociate** button next to the connection you want to disassociate.
198+
199+
{{<image filename="images/rc/privatelink-disassociate-connection.png" width="80%" alt="The Disassociate button next to a VPC endpoint connection." >}}
200+
201+
1. Select **Disassociate VPC endpoint** or **Disassociate service network** to confirm.
202+
203+
After disassociating the connection, you can delete the VPC resource endpoint or service network in the AWS console.
2.77 KB
Loading
44.5 KB
Loading
24.8 KB
Loading
6.64 KB
Loading
2.37 KB
Loading
-4.37 KB
Loading

0 commit comments

Comments
 (0)