A security group is a stateful virtual firewall capable of filtering. As an important means for network security isolation provided by Tencent Cloud, it can be used to set network access controls for one or more TencentDB instances. Instances with the same network security isolation demands in one region can be put into the same security group, which is a logical group. TencentDB and CVM share the security group list and are matched with each other within the security group based on rules. For specific rules and limitations, see Security Group Overview. You can bind a security group directly during instance purchase or bind one in the console after instance purchase.
- TencentDB for Redis security groups currently only support network access control for VPCs and public networks but not the classic network.
- As TencentDB does not have active outbound traffic, outbound rules are not applicable to TencentDB.
- TencentDB for Redis security groups support master instances, read-only instances, and disaster recovery instances.
Configuring Security Groups for TencentDB
Step 1. Create a security group
- Log in to the CVM console.
- Select Security Group on the left sidebar, select a region above the instance list on the right, and click Create.
- In the pop-up window, set the following configuration items, confirm that everything is correct, and click OK.
- Template: Select a security group template in the drop-down list.
- Open all ports: All ports are opened to the public and private networks. This may present security issues. Security group rules are added by default. You can click a security group template below to view its *Outbound Rules and Inbound Rules.
- Open ports 22, 80, 443, and 3389 and the ICMP protocol: Ports 22, 80, 443, and 3389 and the ICMP protocol are opened to the internet. All ports are opened to the private network. Security group rules are added by default. The port of TencentDB for Redis is 6379 by default. You can ignore this template.
- Custom: You can create a security group and then add custom rules.
- Name: Custom name of the security group.
- Project: Select a project for easier management. By default, Default Project is selected.
- Notes: A short description of the security group for easier management.
- Advanced Configuration: You can add tags for the security group.
- If you select Custom for Template, click Set Now in the Note window and perform the following steps.
- On the Inbound Rule tab of the Security Group Rules page, click Add Rules.
- In the Add Inbound Rules pop-up window, set the rules.
- Type: Select Custom as the default type.
- Source: Set the source for database access, i.e., the inbound source, in the following formats:
- A single IPv4 address or an IPv4 range in CIDR notation, such as
0.0.0.0/0 indicates all IPv4 addresses will be matched.
- A single IPv6 address or an IPv6 range in CIDR notation, such as
0::0/0 indicates all IPv6 addresses will be matched.
|Security group ID
||Reference a security group ID to match the IP address of the server associated with the security group.
||Reference an IP address object or IP address group object in a parameter template.|
- Protocol Port: Enter the protocol type and port for the client to access TencentDB for Redis. You can view the port information in the Private IPv4 Address in the Network Info section on the Instance Details page. The default port is 6379. If the access protocol is TCP, you can enter
- Policy: Allow or Reject. Allow is selected by default.
- Allow: Access requests of this port are allowed.
- Reject: Data packets will be discarded without any response.
- Notes: A short description of the rule for easier management.
- Click Complete.
Step 3. Bind the security group to a database instance
Currently, security groups can be configured only for TencentDB for Redis instances in VPC.
- Log in to the TencentDB for Redis console.
- Above the Instance List on the right, select the region.
- In the instance list, find the target instance.
- Click the instance ID to enter the instance management page.
- On the Security Group tab, click Configure Security Group.
- In the Configure Security Group pop-up window, select a created security group. You can filter security group by project name.
- Click OK.
- In the Associated Security Group section, you can view the list of security groups associated with the database instance.
- In the Priority column, you can view the priorities of security groups.
- You can click a security group ID to enter the Security Group Rules page and edit the rules as instructed in Modifying a Security Group Rule. For more operations, see Viewing a Security Group Rule.
- Security Group Name: The name of the security group is displayed for easier identification.
- Operation: You can click Edit above the list and click or to adjust the priority of the security group. You can also click to delete the bound security group.
- On the Preview Rules page, you can view the inbound source information of the security group on the Inbound Rules tab.