Migrating from ElastiCache to Redis Cloud via S3 Bucket
Last updated 26, Mar 2025
Goal
This article instructs you to migrate to Redis Cloud from ElastiCache using an S3 bucket.
Solution
Step 1. Create S3 bucket and grant ElastiCache access
- Follow AWS' Exporting a backup tutorial, with special attention to enabling ACLs and adding the Canonical Id for the ElastiCache grantee
- Choose the Permissions tab, and under Permissions, choose Access Control List (ACL) and then choose Edit.
- Add grantee Canonical ID
540804c33a284a299d2547575ce1010f2312ef3da9b3a053c8bc45bf233e4353
with the following options:- Objects: List, Write
- Bucket ACL: Read, Write
This will ensure that ElastiCache has access to export backups to your bucket
Resulting backup objects will be created with a unique external AWS account Owner: aws-scs-s3-readonly
Step 2. Export all ElastiCache backups to S3
I found this easiest to do by using the AWS Console as directed in the "Exporting an ElastiCache backup (Console)" dropdown of Export an ElastiCache backup
You can use the AWS Console or CLI with an IAM caller that has sufficient permissions
Example required IAM permissions provided by AWS
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:ListAllMyBuckets",
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObject",
"s3:ListBucket"
],
"Resource": "arn:aws:s3:::*"
}]
}
As you might notice, for ElastiCache backup objects, the object Owner will always be
aws-scs-s3-readonly
and theCanonical ID
for the ElastiCache grantee refers to an external account
Step 3. Add Redis Cloud bucket policy to grant Redis Cloud access to your bucket
- Use the Services menu to locate and select Storage > S3. This takes you to the Amazon S3 admin panel.
- Use the Buckets list to locate and select your bucket. When the settings appear, select the Permissions tab, locate the Bucket policy section, and click Edit.
- If there is no existing bucket policy, add the following JSON bucket policy. Replace
<UNIQUE-BUCKET-NAME>
with the name of your bucket.
{
"Version": "2012-10-17",
"Id": "MyBucketPolicy",
"Statement": [
{
"Sid": "RedisCloudBackupsAccess",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::168085023892:root"
},
"Action": [
"s3:PutObject",
"s3:getObject",
"s3:DeleteObject"
],
"Resource": "arn:aws:s3:::UNIQUE-BUCKET-NAME/*"
}
]
}
If a bucket policy already exists, add the following JSON policy statement to the list of statements. Replace
UNIQUE-BUCKET-NAME
with the name of your bucket.
{
"Sid": "RedisCloudBackupsAccess",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::168085023892:root"
},
"Action": [
"s3:PutObject",
"s3:getObject",
"s3:DeleteObject"
],
"Resource": "arn:aws:s3:::UNIQUE-BUCKET-NAME/*"
}
Be sure to also account for the key policy requirements if the bucket is encrypted using SSE-KMS
If the bucket is encrypted using SSE-KMS, add the following statement to your key policy. If you do not have a key policy, see Creating a key policy. Replace
<UNIQUE-BUCKET-NAME>
with the name of your bucket and<KMS-KEY-ARN>
with your key's Amazon Resource Name (ARN).
{
"Sid": "Allow use of the key",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::168085023892:root"
},
"Action": [
"kms:Encrypt",
"kms:Decrypt",
"kms:ReEncrypt*",
"kms:GenerateDataKey*",
"kms:DescribeKey"
],
"Resource": [
"arn:aws:s3:::<UNIQUE-BUCKET-NAME>/*",
"<KMS-KEY-ARN"
]
}
Step 4. Remove ElastiCache grantee and disable ACLs on the bucket
Our bucket policy will NOT APPLY to the ElastiCache backup objects as long as ACLs are enabled and the objects are owned by aws-scs-s3-readonly
The bucket policy, written in JSON, provides access to the objects stored in the bucket. Bucket policies don't apply to objects owned by other accounts.
By disabling ACLs, ownership of all objects will revert to the bucket owner and ensure our bucket policy applies
Step 5. Import objects to Redis Cloud DB as usual
- In the Redis Cloud console, select the target database from the database list.
- In the Danger Zone, select Import.
- Enter the details for the RDB file:
- Source type - Select AWS S3.
- Source path - Enter the URL for the RDB file:
s3://bucketname/[path/]filename.rdb[.gz]
bucketname
- Name of the S3 bucketpath
- Path to the file\, if necessaryfilename
- Filename of the RDB file\, including the .gz suffix if the file is compressed
- Select Add source to add another RDB file for sharded databases with multiple RDB files.
- Select Import.