You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/integrate/prometheus-with-redis-cloud/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ You can use Prometheus and Grafana to collect and visualize your Redis Cloud met
23
23
24
24
Redis Cloud exposes its metrics through a Prometheus endpoint. You can configure your Prometheus server to scrape metrics from your Redis Cloud subscription on port 8070.
25
25
26
-
The Redis Cloud Prometheus endpoint is exposed on Redis Cloud's internal network. To access this network, enable [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}) or [Private Service Connect]({{< relref "/operate/rc/security/private-service-connect" >}}). Both options are only available with Redis Cloud Pro. You cannot use Prometheus and Grafana with Redis Cloud Essentials.
26
+
The Redis Cloud Prometheus endpoint is exposed on Redis Cloud's internal network. To access this network, enable [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}), [Private Service Connect]({{< relref "/operate/rc/security/private-service-connect" >}}), [AWS Transit Gateway]({{< relref "/operate/rc/security/aws-transit-gateway" >}}), or [AWS PrivateLink]({{< relref "/operate/rc/security/aws-privatelink" >}}). Private connectivity options are only available with Redis Cloud Pro. You cannot use Prometheus and Grafana with Redis Cloud Essentials.
Copy file name to clipboardExpand all lines: content/operate/rc/security/aws-privatelink.md
+21-4Lines changed: 21 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ AWS PrivateLink provides the following benefits:
28
28
## Limitations
29
29
30
30
Be aware of the following limitations when using PrivateLink with Redis Cloud:
31
-
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/create-database#oss-cluster-api" >}}) with PrivateLink during preview.
31
+
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/configuration/clustering#oss-cluster-api" >}}) with PrivateLink during preview.
32
32
- You cannot use Layer 3 connectivity options like VPC peering or Transit Gateway with PrivateLink during private preview.
33
33
- Redis Cloud subscriptions with AWS PrivateLink are limited to a maximum of 55 databases. [Contact support](https://redis.com/company/support/) if you need more than 55 databases in one subscription with AWS PrivateLink.
34
34
- Your subnets must have at least 16 available IP addresses for the resource endpoint.
@@ -97,7 +97,7 @@ In this step, you will associate the Redis Cloud resource share with an AWS prin
97
97
98
98
{{<imagefilename="images/rc/privatelink-aws-consumer-principals.png"width="80%"alt="The AWS consumer principals section with an AWS account added as a principal." >}}
99
99
100
-
1. Select **Share** to share the resource share with the principal.
100
+
1. Select **Share** to share the resource share with the principal. The first resource share may take a few minutes.
101
101
102
102
1. After sharing the resource share with the principal, [accept the resource share in the Resource Access Manager](https://docs.aws.amazon.com/ram/latest/userguide/working-with-shared-invitations.html) or copy the **Accept resource share** command and run it with the AWS CLI.
103
103
@@ -158,7 +158,11 @@ To use the AWS CLI to connect to an already existing service network, select **C
158
158
159
159
## Connect to your database with PrivateLink
160
160
161
-
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, download the **Discovery script** and run it in your consumer VPC to discover the database endpoints.
161
+
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, you can find the endpoints for your databases and cluster metrics in the AWS UI by going to the **Associations** tab for your endpoint or service network and viewing the Private DNS entries. You will have one entry for each database and one entry for the metrics endpoint.
162
+
163
+
{{<imagefilename="images/rc/privatelink-aws-endpoint-associations.png"width="80%"alt="The Associations tab for a VPC resource endpoint, showing the Private DNS entries for the databases and metrics endpoint." >}}
164
+
165
+
To view them on Redis Cloud, download the **Discovery script** from the Redis Cloud console and run it in your consumer VPC to discover the database endpoints.
162
166
163
167
The script returns a list of database endpoints that you can connect to from your consumer VPC.
164
168
@@ -180,7 +184,20 @@ The script returns a list of database endpoints that you can connect to from you
180
184
]
181
185
```
182
186
183
-
You can connect to your database by using the database `private-dns-entry` and `port` from your consumer VPC.
187
+
You can connect to your database by using the database `private-dns-entry` and `port` from your consumer VPC. You can also connect to the metrics endpoint with services like [Prometheus and Grafana]({{< relref "/integrate/prometheus-with-redis-cloud/" >}}) by using the metrics `private-dns-entry` and `port`.
184
188
185
189
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab or by going to the [connection wizard]({{< relref "/operate/rc/databases/connect" >}}) for your database. The private endpoint will point to the PrivateLink VPC resource endpoint or service network that you created.
186
190
191
+
## Disassociate connection
192
+
193
+
To disassociate a PrivateLink connection:
194
+
195
+
1. Go to the **Connectivity > PrivateLink** tab in your Redis Cloud subscription.
196
+
197
+
1. In the **Connections** section, select **Disassociate** button next to the connection you want to disassociate.
198
+
199
+
{{<imagefilename="images/rc/privatelink-disassociate-connection.png"width="80%"alt="The Disassociate button next to a VPC endpoint connection." >}}
200
+
201
+
1. Select **Disassociate VPC endpoint** or **Disassociate service network** to confirm.
202
+
203
+
After disassociating the connection, you can delete the VPC resource endpoint or service network in the AWS console.
0 commit comments