Skip to content

Commit bf475b4

Browse files
committed
Addressed comments from meeting with Jonathan
1 parent a868f5a commit bf475b4

File tree

1 file changed

+36
-11
lines changed

1 file changed

+36
-11
lines changed

content/operate/rc/security/aws-privatelink.md

Lines changed: 36 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,31 +8,31 @@ categories:
88
description: null
99
linkTitle: AWS PrivateLink
1010
weight: 90
11+
bannerText: AWS PrivateLink is currently in preview. Features and behavior are subject to change. Redis does not recommend using AWS PrivateLink in production environments.
1112
---
1213

13-
[Amazon Web Services (AWS) PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-access-resources.html) allows service providers to securely expose specific services without exposing the entire service provider and consumer VPCs to each other. When you use AWS PrivateLink to connect to Redis Cloud, you can connect to your database as if it was already in your own AWS VPC.
14+
[Amazon Web Services (AWS) PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-access-resources.html) allows service providers to securely expose specific services without exposing the entire service provider and consumer VPCs to each other. With AWS PrivateLink, Redis Cloud exposes a VPC endpoint service that you connect to as a consumer from your own VPC. Traffic stays within the AWS network and is isolated from external networks.
1415

1516
{{< note >}}
1617
Connecting to Redis Cloud with an AWS PrivateLink is available only with Redis Cloud Pro. It is not supported for Redis Cloud Essentials.
1718
{{< /note >}}
1819

19-
## Considerations and limitations
20-
21-
You can use PrivateLink as an alternative to [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}), or you can enable both for your subscription.
22-
23-
With AWS PrivateLink, Redis Cloud exposes a VPC endpoint service that you connect to as a consumer from your own VPC. Traffic stays within the AWS network and is isolated from external networks.
20+
You can use PrivateLink as an alternative to IP-based private connectivity options like [VPC peering]({{< relref "/operate/rc/security/vpc-peering" >}}) and [Transit Gateway]({{< relref "/operate/rc/security/aws-transit-gateway" >}}).
2421

2522
AWS PrivateLink provides the following benefits over VPC Peering:
2623

2724
- **Improved Security**: PrivateLink exposes the Redis cluster and database(s) as a unidirectional endpoint inside your consumer VPC, thereby avoiding exposing entire VPC subnets to each other and eliminating some possible attack vectors.
2825
- **Network Flexibility**: PrivateLink enables cross-account and cross-VPC connectivity and can be configured even when the Redis Cloud VPC and your consumer VPC have overlapping CIDR/IP ranges.
2926
- **Simplified architecture and low latency**: PrivateLink does not require NAT, internet gateways, or VPNs. It provides simplified network routing, without the need for a network load balancer between the application and the Redis database.
3027

28+
## Limitations
29+
3130
Be aware of the following limitations when using PrivateLink with Redis Cloud:
32-
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/create-database#oss-cluster-api" >}}) with PrivateLink.
31+
- You cannot use the [OSS Cluster API]({{< relref "/operate/rc/databases/create-database#oss-cluster-api" >}}) with PrivateLink during preview.
3332
- Redis Cloud [Bring your Own Cloud]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud" >}}) subscriptions are not supported with PrivateLink.
34-
- Redis Cloud subscriptions with AWS PrivateLink are limited to a maximum of 55 databases. [Contact support](https://redis.com/company/support/) if you need more than 55 databases with AWS PrivateLink.
33+
- Redis Cloud subscriptions with AWS PrivateLink are limited to a maximum of 55 databases. [Contact support](https://redis.com/company/support/) if you need more than 55 databases in one subscription with AWS PrivateLink.
3534
- Your subnets must have at least 16 available IP addresses for the resource endpoint.
35+
- Some AWS regions do not support PrivateLink. See [AWS VPC Lattice Pricing](https://aws.amazon.com/vpc/lattice/pricing/) for a list of regions that support AWS PrivateLink.
3636
- Redis Cloud's PrivateLink implementation is based on Amazon VPC Lattice, so the [VPC Lattice quotas](https://docs.aws.amazon.com/vpc-lattice/latest/ug/quotas.html) apply. Currently, the following availability zones are not supported with Amazon VPC Lattice:
3737
- `use1-az3`
3838
- `usw1-az2`
@@ -49,13 +49,14 @@ Be aware of the following limitations when using PrivateLink with Redis Cloud:
4949

5050
Before you can connect to Redis Cloud with an AWS PrivateLink VPC resource endpoint, you must have:
5151

52-
- A [Redis Cloud Pro database]({{< relref "/operate/rc/databases/create-database/create-pro-database-new" >}}).
52+
- A [Redis Cloud Pro database]({{< relref "/operate/rc/databases/create-database/create-pro-database-new" >}})
5353
- An [AWS VPC](https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html) with the following:
5454
- A [security group](https://docs.aws.amazon.com/vpc/latest/userguide/creating-security-groups.html) that allows ingress traffic to the following ports:
5555
- The database port range (port 10000-19999)
5656
- The Redis Cloud metrics port (port 8070), if desired
5757
- Subnets in the same region as your Redis Cloud database.
58-
- Permission to create and manage VPC endpoints or Service networks in AWS
58+
- Settings to allow **DNS resolution** and **DNS hostnames**. See [View and update DNS attributes for your VPC](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-dns-updating.html) for more information.
59+
- Permission to create and manage VPC endpoints or Service networks in AWS.
5960

6061
## Set up PrivateLink connection
6162

@@ -155,5 +156,29 @@ To use the AWS CLI to connect to an already existing service network, select **C
155156

156157
After you've connected to Redis Cloud with a VPC resource endpoint or a VPC lattice service network, download the **Discovery script** and run it in your consumer VPC to discover the database endpoints.
157158

158-
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab.
159+
## Connect to your database with PrivateLink
160+
161+
The downloaded Discovery Script returns a list of database endpoints that you can connect to from your consumer VPC.
162+
163+
```json
164+
[
165+
{
166+
"type": "metrics",
167+
"dns-entry": "<METRICS DNS ENTRY>",
168+
"private-dns-entry": "<METRIC PRIVATE DNS ENTRY>",
169+
"port": 8070
170+
},
171+
{
172+
"type": "database",
173+
"dns-entry": "<DATABASE DNS ENTRY>",
174+
"private-dns-entry": "<PRIVATE DNS ENTRY>",
175+
"port": 12345,
176+
"database_id": 1234567890
177+
}
178+
]
179+
```
180+
181+
You can connect to your database by using the database `private-dns-entry` and `port` from your consumer VPC.
182+
183+
After you've connected to your database, you can view the connection details in the Redis Cloud console in your subscription's **Connectivity > PrivateLink** tab or by going to the [connection wizard]({{< relref "/operate/rc/databases/connect" >}}) for your database.
159184

0 commit comments

Comments
 (0)