Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RC: CIDR whitelist and connectivity options fix #3143

Merged
merged 1 commit into from
Mar 14, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions content/embeds/rc-vpc-peering-cidr-list.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
If you've enabled the database's [CIDR allow list]({{< relref "/rc/security/cidr-whitelist" >}}), you must also [add the VPC peered IP addresses to the CIDR allow list]({{< relref "/rc/security/cidr-whitelist#define-cidr-allow-list" >}}) to connect to the database via the private endpoint.
4 changes: 4 additions & 0 deletions content/rc/security/aws-transit-gateway.md
Original file line number Diff line number Diff line change
Expand Up @@ -156,4 +156,8 @@ To finish Transit gateway setup, [update your route tables for the peering conne

After Transit gateway is established, we recommend switching your application connection string to the private endpoint.

{{< note >}}
If you've enabled the database's [CIDR allow list]({{< relref "/rc/security/cidr-whitelist" >}}), you must also [add the Transit Gateway's IP address to the CIDR allow list]({{< relref "/rc/security/cidr-whitelist#define-cidr-allow-list" >}}) to connect to the database via the private endpoint.
{{< /note >}}


10 changes: 6 additions & 4 deletions content/rc/security/cidr-whitelist.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,21 +14,19 @@ The [CIDR](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) [allow

You can configure your database's CIDR allow list to restrict client connections to a specific range of IP addresses.


{{< note >}}
To use the CDIR allow list, you must be on either Redis Cloud Fixed, Flexible, or Annual plans. This feature is not supported on Redis Cloud Free.
{{< /note >}}


### Define CIDR allow list

To define the CIDR allow list for a database:

1. Select **Databases** from the [Redis Cloud console](https://app.redislabs.com/) menu and then select your database from the list.

1. From the database's **Configuration** screen, select the **Edit database** button:
1. From the database's **Configuration** screen, select the **Edit database** button.

1. In the **Security** section, turn on the **CIDR allow list** toggle:
1. In the **Security** section, turn on the **CIDR allow list** toggle.

1. Enter the first IP address (in CIDR format) you want to allow in the text box and then select the check mark to add it to the allow list:

Expand All @@ -44,6 +42,10 @@ To define the CIDR allow list for a database:

1. Select **Save database** to apply your changes.

{{< note >}}
The database CIDR allow list applies to both the public endpoint and the private endpoint. If you use connectivity options such as [VPC Peering]({{< relref "/rc/security/vpc-peering" >}}) and [Transit Gateway]({{<relref "/rc/security/aws-transit-gateway">}}) to connect to your database via the private endpoint, you must also add those IPs to your database's CIDR allow list.
{{< /note >}}

## Subscription allow list

If you use a [self-managed, external cloud account]({{<relref "/rc/cloud-integrations">}}) to host your Redis Cloud deployment, you can configure a subscription-wide allow list
Expand Down
8 changes: 8 additions & 0 deletions content/rc/security/vpc-peering.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,10 @@ To finish VPC peering setup, [update your route tables for the peering connectio

Once VPC peering is established, we recommend switching your application connection string to the private endpoint.

{{< note >}}
{{< embed-md "rc-vpc-peering-cidr-list.md" >}}
{{< /note >}}

## Google Cloud VPC peering {#gcp-vpc-peering}

If you want to peer a Redis Cloud VPC with a Google Cloud VPC, you need to:
Expand Down Expand Up @@ -126,3 +130,7 @@ To set up VPC peering:
To approve the VPC peering request between Redis Cloud and Google Cloud, use the [`gcloud` CLI](https://cloud.google.com/sdk/gcloud) to run the **Google cloud command** that you copied before you initiated VPC peering.

Once VPC peering is established, we recommend switching your application connection string to the private endpoint.

{{< note >}}
{{< embed-md "rc-vpc-peering-cidr-list.md" >}}
{{< /note >}}
Loading