As a student, I often find myself in search of free database options, and my go-to choices have always been those that offer a free tier. Many projects, in addition to a primary database, require Redis for streaming fast data. While cloud providers like Redis offer a free tier suitable for small projects or testing purposes, I've always desired more storage and power. This led me to the decision to host my own Redis server.
Hosting Your Own Redis Server
Assuming you already have a VPS account, if not, you can consider providers such as:
Personally, I use Oracle Cloud with a VPS boasting 2GB RAM and 1 vCPU, running Ubuntu 20.04 LTS. You can choose any VPS provider and OS that suits your preferences.
Installing Redis
To begin, we need to install Redis on our VPS. Execute the following commands:
sudo apt update
sudo apt install redis-server
Configuring Redis
Next, we must configure Redis by editing the Redis config file. Run:
sudo nano /etc/redis/redis.conf
Within the file, locate the supervised
directive, and change it to systemd
:
. . .
# If you run Redis from upstart or systemd, Redis can interact with your
# supervision tree. Options:
# supervised no - no supervision interaction
# supervised upstart - signal upstart by putting Redis into SIGSTOP mode
# supervised systemd - signal systemd by writing READY=1 to $NOTIFY_SOCKET
# supervised auto - detect upstart or systemd method based on
# UPSTART_JOB or NOTIFY_SOCKET environment variables
# Note: these supervision methods only signal "process is ready."
# They do not enable continuous liveness pings back to your supervisor.
supervised systemd
. . .
Save and close the file, then restart the Redis service:
sudo systemctl restart redis.service
Allowing Remote Connections
By default, Redis is only accessible from the localhost. To permit remote connections, bind Redis to your server’s public IP address by editing the Redis configuration file again:
sudo nano /etc/redis/redis.conf
Comment out the bind
directive:
. . .
# ~~~ WARNING ~~~ If the computer running Redis is directly exposed to the
# internet, binding to all the interfaces is dangerous and will expose the
# instance to everybody on the internet. So by default we uncomment the
# following bind directive, that will force Redis to listen only on the
# IPv4 loopback interface address (this means Redis will only be able to
# accept client connections from the same host that it is running on).
#
# IF YOU ARE SURE YOU WANT YOUR INSTANCE TO LISTEN TO ALL THE INTERFACES
# JUST COMMENT OUT THE FOLLOWING LINE.
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# bind 127.0.0.1 ::1
. . .
Additionally, change the protected-mode
directive to no
:
. . .
# The server only accepts connections from clients connecting from the
# IPv4 and IPv6 loopback addresses 127.0.0.1 and ::1, and from Unix domain
# sockets.
#
# By default protected mode is enabled. You should disable it only if
# you are sure you want clients from other hosts to connect to Redis
# even if no authentication is configured, nor a specific set of interfaces
# are explicitly listed using the "bind" directive.
protected-mode no
. . .
Restart the Redis server:
sudo systemctl restart redis.service
Adjusting the Firewall
Now, configure the firewall to allow traffic on port 6379, the default Redis port:
sudo firewall-cmd --zone=public --permanent --add-port=6379/tcp
sudo firewall-cmd --reload
Testing Redis
With Redis configured, test it by connecting to your application. For instance, using mini-redis, a Rust-based Redis client. The URL for the Redis server is redis://<ip>:6379
, where <ip>
is your VPS's IP.
Wow, it works but what about the security?
Although the Redis server is up, it lacks security. Anyone can connect and use it. To enhance security, follow these steps:
Securing Redis
Connect to the Redis server using the CLI:
redis-cli
Change protected-mode
from no
to yes
:
127.0.0.1:6379> CONFIG SET protected-mode yes
127.0.0.1:6379> CONFIG REWRITE
Now if we try to connect to the Redis server from our application.
cargo run
Finished dev [unoptimized + debuginfo] target(s) in 0.10s
Running `target/debug/tiny_redis`
thread 'main' panicked at src/main.rs:11:9:
Failed to set key: DENIED: Redis is running in protected mode because protected mode is enabled and no password is set for the default user. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Set up an authentication password for the default user. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
Well, it is throwing an error. Let's add a user and password to the Redis server.
To add a user and password, run:
127.0.0.1:6379> ACL SETUSER blog on >mypassword +@all -@dangerous ~*
127.0.0.1:6379> CONFIG REWRITE
This creates a user blog
with the password mypassword
and permissions, excluding dangerous commands. Update your URL to redis://blog:mypassword@<ip>:6379
.
To know more about the permissions of Redis give it a read here.
Now, attempt to connect to the Redis server:
cargo run
Finished dev [unoptimized + debuginfo] target(s) in 0.10s
Running `target/debug/tiny_redis`
thread 'main' panicked at src/main.rs:11:9:
Failed to set key: DENIED: Redis is running in protected mode because protected mode is enabled and no password is set for the default user. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Set up an authentication password for the default user. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
Well it is still throwing an error. And it is because we still have the default user unprotected. So we need to protect the default user.
Let's protect the default user by running:
127.0.0.1:6379> ACL SETUSER default on >redis +@all ~*
127.0.0.1:6379> CONFIG REWRITE
Now, attempt to connect to the Redis server:
cargo run
Finished dev [unoptimized + debuginfo] target(s) in 0.03s
Running `target/debug/tiny_redis`
Value: 42
Yay, it works. Now we have a secure Redis server running on our VPS. Now we can use it in our application.
Top comments (0)