docs/quick-start.md
After you've installed RESP.app, the first thing you need to do in order to get going is to create a connection to your Redis server. On the main window, press the button labelled Connect to Redis Server.
On the first tab (Connection Settings), put in general information regarding the connection that you are creating.
If you want to connect to a redis-server instance with SSL you need to enable SSL on the second tab and provide a public key in PEM format. Instructions for certain cloud services are below:
AWS ElastiCache is not accessible outside of your VPC. In order to connect to your ElastiCache remotely, you need to use one of the following options:
Enable SSL/TLS checkbox and connect to your AWS ElastiCache with In-Transit Encryption.
Click on "Enable TLS-over-SSH" checkbox in the the SSH connection settings and connect to your AWS ElastiCache with In-Transit Encryption.
Create a connection with all requested information.
Make sure that the "Use SSL Protocol" checkbox is enabled.
Your Azure Redis connection is ready to use.
To connect to a Redis Labs instance with SSL/TLS encryption, follow the steps below:
garantia_credentials.zip from the Redis Labs dashboard.garantia_user.crt in the "Public key" field.garantia_user_private.key in the "Private key" field.garantia_ca.pem in the "Authority" field.Digital Ocean connection settings is a bit confusing. To connect to a Digital Ocean Managed Redis you need to follow steps bellow:
Or using Quick Connect tab for new connections:
heroku config -a YOUR-APP-NAME | grep REDIS
or get it from Heroku website.
Example output:
rediss://user:password@host:port
rediss enable SSL/TLS checkbox and uncheck "Enable strict mode" checkboxuser to "Username" fieldpassword to "Password" fieldhost and port to "Address" field in RESP.appSSH tab is supposed to allow you to use a SSH tunnel. It's useful if your redis-server is not publicly accessible. To use a SSH tunnel select checkbox "SSH Tunnel". There are different security options; you can use a plain password or OpenSSH private key.
!!! note "for Windows users:" Your private key must be in .pem format.
Starting from version 2022.3 RESP.app supports SSH Agents. This allows using password managers like 1Password to securely store your SSH keys with 2FA.
!!! note "for Windows users:" On Windows RESP.app supports only Microsoft OpenSSH that's why "Custom SSH Agent Path" option is not available.
It's possible to set default SSH Agent for all connections in RESP.app by overriding environment variable SSH_AUTH_SOCK.
If you need to use custom ssh agent only for specific connections follow steps above:
mkdir -p ~/.1password && ln -s ~/Library/Group\ Containers/2BUA8C4S2C.com.1password/t/agent.sock ~/.1password/agent.sock
⌘ + Shift + . to show hidden files and folders in the dialog~/.1password/agent.sockDue to AppStore sandboxing RESP.app cannot access default or custom SSH Agents defined by SSH_AUTH_SOCK variable.
To overcome this limitation you need to create proxy unix socket inside RESP.app sandbox container:
brew install socat
socat UNIX-LISTEN:$HOME/Library/Containers/com.redisdesktop.rdm/Data/agent.sock UNIX-CONNECT:"$HOME/Library/Group Containers/2BUA8C4S2C.com.1password/t/agent.sock"
If you need advanced SSH tunneling you should setup a SSH tunnel manually and connect via localhost:
ssh SSH_HOST -L 7000:localhost:6379
RESP.app doesn't support UNIX sockets directly, but you can use redirecting of the local socket to the UNIX domain socket, for instance with socat:
socat -v tcp-l:6379,reuseaddr,fork unix:/tmp/redis.sock
The Advanced settings tab allows you to customise the namespace separator and other advanced settings.
Now you can test a connection or create a connection right away.
Congratulations, you've successfully connected to your Redis Server. You should see something similar to what we show below.
Click on the connection and expand keys. By clicking the right button, you can see console menu and manage your connection from there.