Create IAM resources using CloudFormation

Redis Cloud

You can use AWS CloudFormation to create the IAM resources for Redis Cloud Bring your Own Cloud (BYOC).

Warning:

We use the provided credentials to configure your AWS environment and provision required resources.

You must not change the configurations of provisioned resources or stop or terminate provisioned instances. If you do, your databases will be inaccessible and Redis will not be able to ensure database stability. See Avoid service disruption for more details.

Create resources using CloudFormation on the AWS Console

The following link uses CloudFormation to create a stack using the AWS console:

Launch RedisCloud template

When the stack finishes, select the stack and then the Outputs tab. You need the following information to create a Cloud Account in the Redis Cloud console:

  • Access Key ID: The accessKeyId output.
  • Secret Access Key: Follow the link to AWS Secrets Manager in the accessSecretKey output and select Retrieve secret value.
  • IAM Role Name: The IAMRoleName output.

Create resources using CloudFormation through AWS CLI

You can also use the AWS command-line interface (CLI) to create the stack:

aws cloudformation create-stack --stack-name RedisCloud --template-url \
https://s3.amazonaws.com/iam-resource-automation-do-not-delete/RedisCloud.yaml \
--capabilities CAPABILITY_AUTO_EXPAND CAPABILITY_NAMED_IAM CAPABILITY_IAM

You can track the status of the cloud formation with the following command:

aws cloudformation describe-stacks --stack-name RedisCloud

After the stack finishes, you can retrieve the outputs from the Outputs section of the response.

You need the following information to create a Cloud Account in the Redis Cloud console:

  • Access Key ID: The accessKeyId output.

  • Secret Access Key: Extract the secret ID from the accessSecretKey output. The secret ID is the name query parameter in the accessSecretKey output.

    For example, if the accessSecretKey output is https://console.aws.amazon.com/secretsmanager/home?region=<region>/secret?name=/redislabsuser/secret_access_key, then the secret ID is /redislabsuser/secret_access_key.

    Use the secret ID to retrieve the secret value using the AWS secretsmanager CLI:

    aws secretsmanager get-secret-value --secret-id=<accessSecretKey-ID>
    

    Replace <accessSecretKey-ID> with the secret ID you extracted from the accessSecretKey output.

  • IAM Role Name: The IAMRoleName output.

RATE THIS PAGE
Back to top ↑