Skip to content

Commit 2b36ed6

Browse files
committed
Move content and fix relrefs
1 parent 5a787b6 commit 2b36ed6

File tree

12 files changed

+437
-248
lines changed

12 files changed

+437
-248
lines changed

content/operate/rc/accounts/account-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The available tabs depend on your subscription type and may include:
2020

2121
- The **Account** tab displays basic information associated with your account, including general info, address details, time zone setting, security settings, and provider integration details.
2222

23-
- The **Cloud Account** tab is displayed for Redis Cloud Pro subscriptions hosted on Amazon Web Services (AWS). To learn more, see [Manage AWS cloud accounts]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/" >}}).
23+
- The **Cloud Account** tab is displayed for Redis Cloud Pro subscriptions hosted on Amazon Web Services (AWS). To learn more, see [Manage AWS cloud accounts]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/" >}}).
2424

2525
- The **Integrations** tab lets you manage certain integrations. For more information on the Confluent Cloud integration, see [Use the Redis Sink Confluent Connector]({{< relref "/integrate/confluent-with-redis-cloud/" >}}).
2626

content/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources/aws-console.md

Lines changed: 0 additions & 217 deletions
This file was deleted.

content/operate/rc/databases/configuration/high-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ You can reduce network transfer costs and network latency by ensuring your Redis
6262

6363
To specify the availability zone for your cluster, select *Manual Selection* under **Allowed Availability Zones**.
6464

65-
For Google Cloud clusters and [self-managed AWS cloud accounts]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/" >}}), select an availability zone from the **Zone name** list.
65+
For Google Cloud clusters and [self-managed AWS cloud accounts]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/" >}}), select an availability zone from the **Zone name** list.
6666

6767
{{<image filename="images/rc/availability-zones-no-multi-az.png" width="95%" alt="Select one availability zone when Multi-AZ is turned off." >}}
6868

content/operate/rc/databases/create-database/create-pro-database-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,8 +131,8 @@ The following settings are defined in the **Advanced options** of the **Setup**
131131
|---|---|
132132
| **Multi-AZ** | Determines if replication spans multiple Availability Zones, which provides automatic failover when problems occur. See [High Availability]({{< relref "/operate/rc/databases/configuration/high-availability" >}}). |
133133
| **Allowed Availability Zones** | The availability zones for your selected region.<br/><br/>If you choose **Manual selection**, you must select at least one zone ID from the **Zone IDs** list. For more information, see [Availability zones]({{< relref "/operate/rc/databases/configuration/high-availability#availability-zones" >}}). |
134-
| **Cloud account** | To deploy these databases to an existing cloud account, select it here. Use the **Add** button to add a new cloud account.<br/><br/>(Available only if [self-managed cloud vendor accounts]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts" >}}) are enabled) |
135-
| **VPC configuration** | Select **In a new VPC** to deploy to a new [virtual private cloud](https://en.wikipedia.org/wiki/Virtual_private_cloud) (VPC).<br/><br/>To deploy these databases to an existing virtual private cloud, select **In existing VPC** and then set VPC ID to the appropriate ID value.<br/><br/>(Available only if [self-managed cloud vendor accounts]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts" >}}) are enabled) |
134+
| **Cloud account** | To deploy these databases to an existing cloud account, select it here. Use the **Add** button to add a new cloud account.<br/><br/>(Available only if [self-managed cloud vendor accounts]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts" >}}) are enabled) |
135+
| **VPC configuration** | Select **In a new VPC** to deploy to a new [virtual private cloud](https://en.wikipedia.org/wiki/Virtual_private_cloud) (VPC).<br/><br/>To deploy these databases to an existing virtual private cloud, select **In existing VPC** and then set VPC ID to the appropriate ID value.<br/><br/>(Available only if [self-managed cloud vendor accounts]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts" >}}) are enabled) |
136136
| **Deployment CIDR** | The [CIDR](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) range of IP addresses for your deployment. Redis creates a new [subnet](https://en.wikipedia.org/wiki/Subnetwork) for the **Deployment CIDR** in your [virtual private cloud](https://en.wikipedia.org/wiki/Virtual_private_cloud) (VPC). It cannot overlap with the CIDR ranges of other subnets used by your account.<br/><br/>For deployments in an existing VPC, the **Deployment CIDR** must be within your VPC's **primary** CIDR range (secondary CIDRs are not supported). |
137137
| **Auto Tiering**| Determines if your databases are stored only in memory (RAM) or are split between memory and Flash storage (RAM+Flash). See [Auto Tiering]({{< relref "/operate/rs/databases/auto-tiering/" >}})|
138138
| **Maintenance windows** | Determines when Redis can perform [maintenance]({{< relref "/operate/rc/subscriptions/maintenance" >}}) on your databases. Select **Manual** if you want to set [manual maintenance windows]({{< relref "/operate/rc/subscriptions/maintenance/set-maintenance-windows" >}}). |

content/operate/rc/security/aws-transit-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Before you can set up Transit Gateway:
5353
1. [Share the transit gateway](https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#tgw-sharing) from the [AWS resource access manager](https://console.aws.amazon.com/ram/).
5454

5555
{{< note >}}
56-
If you have a self-managed AWS account, you will need to set its IAM Instance Policy to include Transit Gateway. See [Create IAM resources using the AWS console]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources/aws-console.md" >}}) (deprecated) for more information.
56+
If you use Redis Cloud Bring your own Cloud, you will need to set its IAM Instance Policy to include Transit Gateway. See [Create IAM resources using the AWS console]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/iam-resources/aws-console.md" >}}) for more information.
5757
{{< /note >}}
5858

5959
## AWS Transit Gateway
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
LinkTitle: Bring your own Cloud
3+
Title: Redis Cloud Bring your own Cloud
4+
alwaysopen: false
5+
categories:
6+
- docs
7+
- operate
8+
- rc
9+
description: Describes how to provision your Redis Cloud subscription to use an existing
10+
cloud provider account.
11+
bannerText: This article is for Redis Cloud Bring your Own Cloud (BYOC). If you're interested in Redis Cloud BYOC, [contact sales](https://redis.io/meeting/).
12+
bannerChildren: true
13+
hidden: true
14+
hideListLinks: true
15+
weight: 80
16+
aliases:
17+
- /operate/rc/how-to/view-edit-cloud-account
18+
- /operate/rc/cloud-accounts
19+
- /operate/rc/cloud-integrations/aws-cloud-accounts
20+
---
21+
22+
Redis Cloud Bring your own Cloud (BYOC) lets organizations deploy Redis Cloud directly within their own AWS environments.
23+
24+
## Benefits
25+
26+
## Use Cases
27+
28+
## Set up Redis Cloud BYOC
29+
30+

content/operate/rc/cloud-integrations/aws-cloud-accounts/_index.md renamed to content/operate/rc/subscriptions/aws-cloud-accounts/cloud-account-settings.md

Lines changed: 7 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,23 @@
11
---
2-
LinkTitle: AWS cloud accounts
3-
Title: Manage AWS cloud accounts
4-
alwaysopen: false
5-
bannerChildren: true
6-
bannerText: Self-managed AWS accounts are deprecated, so this article has been archived.
2+
Title: Create and edit Cloud accounts
3+
LinkTitle: Create and edit Cloud accounts
74
categories:
85
- docs
96
- operate
107
- rc
11-
description: Describes how to provision your Redis Cloud subscription to use existing
12-
cloud provider accounts.
13-
hidden: true
8+
description: null
149
hideListLinks: true
15-
weight: 40
16-
aliases:
17-
- /operate/rc/how-to/view-edit-cloud-account
18-
- /operate/rc/cloud-accounts
10+
weight: 2
1911
---
2012

21-
Many customers use cloud provider accounts provisioned and maintained by Redis.
22-
23-
Customers with existing Amazon Web Services (AWS) accounts can provision their Redis Cloud Pro subscriptions to use their existing AWS accounts.
24-
2513
To do so, you associate your existing AWS account as a _cloud account_ for your subscription. This requires setting up and entering credentials that enable monitoring, maintenance, and technical support of your subscription.
2614

2715
To do this, you need:
2816

2917
1. A programmatic user with an access key and a secret access key for that user.
3018
1. A console role that allows administrative access to the cloud account.
3119

32-
These resources need to exist before adding the cloud account to your subscription. To learn more, see [Create IAM resources]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources" >}}).
20+
These resources need to exist before adding the cloud account to your subscription. To learn more, see [Create IAM resources]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/iam-resources" >}}).
3321

3422
{{<note>}}
3523
Once an AWS account has been configured as a cloud account, you must _not_:
@@ -88,7 +76,7 @@ If the **Add account** button is inactive, verify that:
8876
- The resources exist in your AWS account
8977
- Each resource provides the required level of access
9078

91-
For help, see [Create IAM resources]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources" >}}).
79+
For help, see [Create IAM resources]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/iam-resources" >}}).
9280

9381
## Edit cloud account details
9482

@@ -122,4 +110,4 @@ To remove a cloud account from your Redis cloud subscription, select the cloud a
122110

123111
We strongly recommend using dedicated identity and access management (IAM) resources to manage your AWS cloud accounts. These resources should not be shared with any other task, account, or process.
124112

125-
To learn more, see [Create IAM resources for AWS cloud accounts]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources" >}}).
113+
To learn more, see [Create IAM resources for AWS cloud accounts]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/iam-resources" >}}).

content/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources/_index.md renamed to content/operate/rc/subscriptions/aws-cloud-accounts/iam-resources/_index.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ categories:
77
description: null
88
hideListLinks: true
99
linkTitle: Create IAM resources
10-
weight: $weight
10+
weight: 1
1111
---
1212
For most Redis Cloud Pro databases deployed to Amazon Web Services (AWS), we manage the supporting infrastructure for you in dedicated AWS accounts.
1313

@@ -22,7 +22,7 @@ In the new AWS account, you need to create:
2222
- A user with an **access key**
2323
- A role that grants **AWS console access**
2424

25-
Save the access key in a secure location so that you can enter it when you [register the cloud account]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/" >}}) with your the Redis Cloud subscription.
25+
Save the access key in a secure location so that you can enter it when you [register the cloud account]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/" >}}) with your the Redis Cloud subscription.
2626

2727
{{< warning >}}
2828
We use the provided credentials to configure your AWS environment and provision required resources.
@@ -37,6 +37,6 @@ For help creating an AWS user, see the [AWS IAM documentation](https://docs.aws.
3737

3838
You can use one of the following tools to create IAM resources:
3939

40-
- [CloudFormation]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources/cloudformation.md" >}}) - The AWS automation tool
41-
- [Terraform]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources/terraform.md" >}}) - Widely supported in the Redis community for additional automation
42-
- The [AWS Console]({{< relref "/operate/rc/cloud-integrations/aws-cloud-accounts/iam-resources/aws-console.md" >}})
40+
- [CloudFormation]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/iam-resources/cloudformation" >}})
41+
- [Terraform]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/iam-resources/terraform" >}})
42+
- The [AWS Console]({{< relref "/operate/rc/subscriptions/aws-cloud-accounts/iam-resources/aws-console" >}})

0 commit comments

Comments
 (0)