How Do I Configure a Security Group?
Intra-VPC Access to DCS Redis 6.0 Enterprise Edition Instances
To prevent cross-VPC access from increasing latency and affecting DCS instance performance, you can deploy your client on an ECS that is in the same VPC and subnet as the DCS instance.
In addition, you must configure correct rules for the security groups of both the ECS and DCS instance so that you can access the instance through your client.
- If the ECS and DCS instance are configured with the same security group, network access in the group is not restricted by default.
- If the ECS and DCS instance are configured with different security groups, add security group rules to ensure that the ECS and DCS instance can access each other.
- Suppose that the ECS on which the client runs belongs to security group sg-ECS, and the DCS instance that the client will access belongs to security group sg-DCS.
- The following uses port 6379 as an example. For other instances, use the actual port.
- The remote end is a security group or an IP address.
- Configuring security group for the ECS.
Add the following outbound rule to allow the ECS to access the DCS instance. Skip this rule if there are no restrictions on the outbound traffic.

- Configuring security group for the DCS instance.
To ensure that your client can access the DCS instance, add the following inbound rule to the security group configured for the DCS instance:

For the source IP address, use the specified IP address of the DCS instance. Avoid using 0.0.0.0/0 to prevent ECSs bound with the same security group from being attacked by Redis vulnerability exploits.
Security Group of a Migration Task
- When creating an online migration task, select a security group. Its outbound rules must allow traffic over the IP addresses and ports of the source and target Redis instances. By default, all outbound traffic is allowed.
- Backup import uses the default security group. Ensure that all outbound traffic is allowed (this is the default setting.)
Figure 1 Outbound rules of the migration security group
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.