You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/embeds/rc-rdi-secrets-permissions.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,4 +14,6 @@
14
14
}
15
15
} ]
16
16
}
17
-
```
17
+
```
18
+
19
+
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page. Save the secret ARN to use when you [define your source database]({{<relref "/operate/rc/databases/rdi/define">}}).
Copy file name to clipboardExpand all lines: content/operate/rc/databases/rdi/setup.md
+20-15Lines changed: 20 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
80
80
-**Scheme**: Select **Internal**.
81
81
-**Load balancer IP address type**: Select **IPv4**.
82
82
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
83
-
1. In **Security groups**, select the security group associated with your source database.
83
+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
84
84
1. In **Listeners and routing**:
85
85
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
86
86
1. In **Specify group details**:
@@ -93,7 +93,11 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
93
93
-**Port**: Enter your source database's port.
94
94
-**Default action**: Select the target group you created in the previous step.
95
95
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
96
-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
96
+
1. After the network load balancer is active, select **Security**.
97
+
98
+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
99
+
100
+
1. Select the security group ID to open the Security group settings.
97
101
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
98
102
-**Type**: Select **HTTP**.
99
103
-**Source**: Select **Anywhere - IPv4**.
@@ -146,7 +150,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
146
150
-**Scheme**: Select **Internal**.
147
151
-**Load balancer IP address type**: Select **IPv4**.
148
152
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
149
-
1. In **Security groups**, select the security group associated with your source database.
153
+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
150
154
1. In **Listeners and routing**:
151
155
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
152
156
1. In **Specify group details**:
@@ -164,7 +168,12 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
164
168
- **Port**: Enter your source database's port.
165
169
- **Default action**: Select the target group you created in the previous step.
166
170
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
167
-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
171
+
1. After the network load balancer is active, select **Security**.
172
+
173
+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
174
+
175
+
1. Select the security group ID to open the Security group settings.
176
+
168
177
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
169
178
- **Type**: Select **HTTP**.
170
179
- **Source**: Select **Anywhere - IPv4**.
@@ -224,10 +233,10 @@ The required secrets depend on your source database's security configuration. Th
224
233
225
234
| Security configuration | Required secrets |
226
235
| :-- | :-- |
227
-
| Username and password only | <ul><li>Credentials secret (username and password)</li></ul> |
@@ -285,12 +294,10 @@ After you create the secret, you need to add permissions to allow the data pipel
285
294
286
295
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. Select the private key secret you just created and then select **Edit permissions**.
287
296
288
-
Add the following permissions to your secret:
297
+
Add the following permissions to your secret. Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
289
298
290
299
{{< embed-md "rc-rdi-secrets-permissions.md" >}}
291
300
292
-
Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
293
-
294
301
--tab-sep--
295
302
296
303
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. [Create a secret](https://docs.aws.amazon.com/secretsmanager/latest/userguide/create_secret.html) of type **Other type of secret** with the following settings:
@@ -301,8 +308,6 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
301
308
302
309
{{< /multitabs >}}
303
310
304
-
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page.
305
-
306
311
## Next steps
307
312
308
313
After you have set up your source database and prepared connectivity and credentials, select **Define source database** to [define your source connection and data pipeline]({{<relref "/operate/rc/databases/rdi/define">}}).
0 commit comments