Skip to content

Commit 3c22f1e

Browse files
committed
Add warning section
1 parent 0f6fa6d commit 3c22f1e

File tree

6 files changed

+33
-9
lines changed

6 files changed

+33
-9
lines changed

content/operate/rc/subscriptions/bring-your-own-cloud/_index.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,15 @@ To set up Redis Cloud BYOC on Amazon Web Services (AWS):
5050

5151
1. [Set your AWS Account as a BYOC Cloud account]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud/cloud-account-settings" >}}) on Redis Cloud.
5252

53+
## Avoid Redis Cloud BYOC service disruption {#avoid-service-disruption}
54+
55+
{{< warning >}}
56+
Failing to follow the instructions in this section will cause your databases to become inaccessible, and Redis will not be able to ensure cluster and database stability. Please read them carefully.
57+
{{< /warning >}}
58+
59+
To keep your Redis Cloud BYOC service and all databases running without issues:
60+
- Do not stop, delete, or modify Redis-managed resources through the cloud provider - including VPCs, subnets, virtual machines, and other infrastructure.
61+
- Do not change roles or access policies.
62+
63+
If you make any infrastructure changes, whether or not they are listed above, it may violate our SLA commitments. See [Appendix 1 in our Terms of Service](https://redis.io/legal/cloud-tos/#Appendix-1) for more details.
5364

content/operate/rc/subscriptions/bring-your-own-cloud/cloud-account-settings.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,9 @@ To do this, you need:
2121

2222
You need to create these resources before adding the cloud account to your subscription. To learn more, see [Create IAM resources]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud/iam-resources" >}}).
2323

24-
{{<note>}}
25-
Once an AWS account has been configured as a cloud account, you must _not_:
26-
- Manually change the configuration of required resources, such as security groups<br/>
27-
- Manually suspend or stop (terminate) provisioned resources</br>
28-
{{</note>}}
24+
{{<warning>}}
25+
After an AWS account has been configured as a cloud account, you **must not** change the configurations of provisioned resources or stop or terminate provisioned instances. If you do, your databases will be inaccessible and Redis will not be able to ensure database stability. See [Avoid service disruption]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud/cloud-account-settings#avoid-service-disruption" >}}) for more details.
26+
{{</warning>}}
2927

3028
## View cloud account settings
3129

content/operate/rc/subscriptions/bring-your-own-cloud/iam-resources/_index.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,7 @@ Save the access key in a secure location so that you can enter it when you [regi
2727
{{< warning >}}
2828
We use the provided credentials to configure your AWS environment and provision required resources.
2929

30-
To make sure that we can manage your AWS resources, you must not:
31-
32-
- Manually change the configurations of provisioned resources, such as security groups
33-
- Manually stop or terminate provisioned instances
30+
You **must not** change the configurations of provisioned resources or stop or terminate provisioned instances. If you do, your databases will be inaccessible and Redis will not be able to ensure database stability. See [Avoid service disruption]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud/cloud-account-settings#avoid-service-disruption" >}}) for more details.
3431
{{< /warning >}}
3532

3633
For help creating an AWS user, see the [AWS IAM documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html).

content/operate/rc/subscriptions/bring-your-own-cloud/iam-resources/aws-console.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,12 @@ weight: $weight
1010
---
1111
Follow these steps to manually create IAM resources using the [AWS console](https://console.aws.amazon.com/).
1212

13+
{{< warning >}}
14+
We use the provided credentials to configure your AWS environment and provision required resources.
15+
16+
You **must not** change the configurations of provisioned resources or stop or terminate provisioned instances. If you do, your databases will be inaccessible and Redis will not be able to ensure database stability. See [Avoid service disruption]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud/cloud-account-settings#avoid-service-disruption" >}}) for more details.
17+
{{< /warning >}}
18+
1319
## Step 1: Create the IAM instance policy
1420

1521
First, create a policy to use for the new instance role:

content/operate/rc/subscriptions/bring-your-own-cloud/iam-resources/cloudformation.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,3 +66,9 @@ VersionStages:
6666
The JSON object is the value (less the single quotes) of the `SecretString` key. i.e. it is <nobr>`{"password":"S3cr3tP@$$w0rd"}`</nobr>.
6767

6868
The password is the value associated with that key (less the double quotes): `S3cr3tP@$$w0rd`.
69+
70+
{{< warning >}}
71+
We use the provided credentials to configure your AWS environment and provision required resources.
72+
73+
You **must not** change the configurations of provisioned resources or stop or terminate provisioned instances. If you do, your databases will be inaccessible and Redis will not be able to ensure database stability. See [Avoid service disruption]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud/cloud-account-settings#avoid-service-disruption" >}}) for more details.
74+
{{< /warning >}}

content/operate/rc/subscriptions/bring-your-own-cloud/iam-resources/terraform.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,12 @@ linkTitle: Terraform
1010
---
1111
You can use [HashiCorp Terraform](https://www.terraform.io/intro/index.html) to create identity and access management (IAM) resources to support AWS cloud account access to Redis Cloud subscriptions.
1212

13+
{{< warning >}}
14+
We use the provided credentials to configure your AWS environment and provision required resources.
15+
16+
You **must not** change the configurations of provisioned resources or stop or terminate provisioned instances. If you do, your databases will be inaccessible and Redis will not be able to ensure database stability. See [Avoid service disruption]({{< relref "/operate/rc/subscriptions/bring-your-own-cloud/cloud-account-settings#avoid-service-disruption" >}}) for more details.
17+
{{< /warning >}}
18+
1319
The following example uses the `terraform-aws-Redislabs-Cloud-Account-IAM-Resources` module, located in Amazon&nbsp;S3:
1420

1521

0 commit comments

Comments
 (0)