Skip to content

Commit ff650a3

Browse files
authored
Merge pull request #2179 from redis/DOC-5770
RC RDI: Clarify load balancer security group selection
2 parents 78c37da + 5a543d0 commit ff650a3

File tree

2 files changed

+23
-16
lines changed

2 files changed

+23
-16
lines changed

content/embeds/rc-rdi-secrets-permissions.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,4 +14,6 @@
1414
}
1515
} ]
1616
}
17-
```
17+
```
18+
19+
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page. Save the secret ARN to use when you [define your source database]({{<relref "/operate/rc/databases/rdi/define">}}).

content/operate/rc/databases/rdi/setup.md

Lines changed: 20 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
8080
- **Scheme**: Select **Internal**.
8181
- **Load balancer IP address type**: Select **IPv4**.
8282
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
83-
1. In **Security groups**, select the security group associated with your source database.
83+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
8484
1. In **Listeners and routing**:
8585
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
8686
1. In **Specify group details**:
@@ -93,7 +93,11 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
9393
- **Port**: Enter your source database's port.
9494
- **Default action**: Select the target group you created in the previous step.
9595
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
96-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
96+
1. After the network load balancer is active, select **Security**.
97+
98+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
99+
100+
1. Select the security group ID to open the Security group settings.
97101
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
98102
- **Type**: Select **HTTP**.
99103
- **Source**: Select **Anywhere - IPv4**.
@@ -146,7 +150,7 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
146150
- **Scheme**: Select **Internal**.
147151
- **Load balancer IP address type**: Select **IPv4**.
148152
1. In **Network mapping**, select the VPC and availability zone associated with your source database.
149-
1. In **Security groups**, select the security group associated with your source database.
153+
1. In **Security groups**, select the security group associated with your source database, or another security group that allows traffic from PrivateLink and allows traffic to the database.
150154
1. In **Listeners and routing**:
151155
1. Select **Create target group** to [create a target group](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-target-group.html) with the following settings:
152156
1. In **Specify group details**:
@@ -164,7 +168,12 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
164168
- **Port**: Enter your source database's port.
165169
- **Default action**: Select the target group you created in the previous step.
166170
1. Review the network load balancer settings, and then select **Create load balancer** to continue.
167-
1. After the network load balancer is active, select **Security**, and then select the security group ID to open the Security group settings.
171+
1. After the network load balancer is active, select **Security**.
172+
173+
If you selected the same security group as your source database, you must not enforce security group rules on PrivateLink traffic. Select **Edit** and then deselect **Enforce inbound rules on PrivateLink traffic**, and then select **Save changes**.
174+
175+
1. Select the security group ID to open the Security group settings.
176+
168177
1. Select **Edit inbound rules**, then **Add rule** to add a rule with the following settings:
169178
- **Type**: Select **HTTP**.
170179
- **Source**: Select **Anywhere - IPv4**.
@@ -224,10 +233,10 @@ The required secrets depend on your source database's security configuration. Th
224233
225234
| Security configuration | Required secrets |
226235
| :-- | :-- |
227-
| Username and password only | <ul><li>Credentials secret (username and password)</li></ul> |
228-
| TLS connection | <ul><li>Credentials secret (username and password)</li><li>CA Certificate secret (server certificate)</li></ul> |
229-
| mTLS connection | <ul><li>Credentials secret (username and password)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li></ul> |
230-
| mTLS connection with client key passphrase | <ul><li>Credentials secret (username and password)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li><li>Client key passphrase secret</li></ul> |
236+
| Username and password only | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li></ul> |
237+
| TLS connection | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li><li>CA Certificate secret (server certificate)</li></ul> |
238+
| mTLS connection | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li></ul> |
239+
| mTLS connection with client key passphrase | <ul><li>Credentials secret (username and password for the RDI pipeline user)</li><li>CA Certificate secret (server certificate)</li><li>Client certificate secret</li><li>Client key secret</li><li>Client key passphrase secret</li></ul> |
231240
232241
Select a tab to learn how to create the required secret.
233242
@@ -242,8 +251,8 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
242251
243252
- **Key/value pairs**: Enter the following key/value pairs.
244253
245-
- `username`: Database username
246-
- `password`: Database password
254+
- `username`: Database username for the RDI pipeline user
255+
- `password`: Database password for the RDI pipeline user
247256
248257
{{< embed-md "rc-rdi-secrets-encryption-permissions.md" >}}
249258
@@ -285,12 +294,10 @@ After you create the secret, you need to add permissions to allow the data pipel
285294
286295
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. Select the private key secret you just created and then select **Edit permissions**.
287296
288-
Add the following permissions to your secret:
297+
Add the following permissions to your secret. Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
289298
290299
{{< embed-md "rc-rdi-secrets-permissions.md" >}}
291300
292-
Replace `<AWS ACCOUNT ID>` with the AWS account ID for the Redis Cloud cluster that you saved earlier.
293-
294301
--tab-sep--
295302
296303
In the [AWS Management Console](https://console.aws.amazon.com/), use the **Services** menu to locate and select **Security, Identity, and Compliance** > **Secrets Manager**. [Create a secret](https://docs.aws.amazon.com/secretsmanager/latest/userguide/create_secret.html) of type **Other type of secret** with the following settings:
@@ -301,8 +308,6 @@ In the [AWS Management Console](https://console.aws.amazon.com/), use the **Serv
301308
302309
{{< /multitabs >}}
303310
304-
After you store this secret, you can view and copy the [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources) of your secret on the secret details page.
305-
306311
## Next steps
307312
308313
After you have set up your source database and prepared connectivity and credentials, select **Define source database** to [define your source connection and data pipeline]({{<relref "/operate/rc/databases/rdi/define">}}).

0 commit comments

Comments
 (0)