Skip to content

Aerospike Cloud Quickstart

This quickstart walks you through:

  • creating an Aerospike Cloud account.
  • provisioning a database cluster.
  • configuring VPC peering to connect from your AWS environment.

Before you begin

This quickstart assumes familiarity with AWS networking concepts (VPCs, subnets, route tables, security groups) and basic AWS CLI usage.

Before you begin, you need:

  • an Aerospike Cloud account (you can create one in the first step).
  • an AWS account.
  • AWS CLI installed and configured with credentials for your AWS account.

Connection requirements are covered in Connect to your cluster from AWS.

Create an account

To create an Aerospike Cloud account with your email address and password, go to the Cloud console, click Register now and fill out the form.

You can also:

  • Sign up with Google OIDC using an existing Google account.
  • Accept an invitation from an existing user and join their Aerospike Cloud organization.

Provision your first cluster

Follow these steps to provision and launch your first Aerospike Cloud database cluster.

  1. In the Aerospike Cloud console, click Clusters, then click Provision cluster.

  2. On the Provision a new cluster screen:

    1. Cluster name: Enter a name for your cluster.

    2. Namespace: Enter a namespace name.

    3. Cloud provider: Leave as AWS (default).

    Click Continue.

  3. On the Set deployment location and layout screen:

    1. Region: Select the region closest to your applications. For best performance and cost, deploy the cluster in the same region (and availability zone, if possible) as your application.

    2. CIDR block: Leave as auto-generated (default).

    3. Number of availability zones: Leave as 1 (default).

    4. Zone ID assignment: Leave as auto-assigned (default).

    Click Continue.

  4. On the Configure availability and storage screen:

    1. Replication factor: Select 2 (recommended minimum).

    2. Consistency mode: Leave as default.

    3. Data storage: Choose In-memory or Hybrid memory based on your use case.

    Click Continue.

  5. On the Select node size and count screen:

    1. Instance type: Select i4g.large.

    2. Cluster size: Leave as default.

    Click Continue.

  6. On the Server configuration screen, click Review cluster. No changes are needed for this quickstart.

  7. On the Review and launch cluster screen, verify your selections and click Launch cluster.

Connect to your cluster from AWS

To connect your applications to Aerospike Cloud, you must establish a VPC peering connection between your AWS VPC and the Aerospike Cloud VPC. This keeps traffic off the public internet, reducing latency and improving security.

Set up the connection

  1. Open the networking settings in the Aerospike Cloud console.

    1. Go to your cluster in the Aerospike Cloud console.

    2. Click Finish setup → Set up network access, or go to the Networking tab.

  2. Get your AWS VPC details.

    In the AWS Console:

    1. Go to VPCYour VPCs.

    2. Select your VPC, or create one if needed.

    3. Verify the IPv4 CIDR does not overlap with 10.128.0.0/19 or 10.129.0.0/24.

    4. Record these values from the VPC details page. You need them in the next step:

      ValueWhere to find it
      VPC IDVPC details page (for example vpc-0abcd1234efgh5678)
      IPv4 CIDRVPC details page (for example 10.0.0.0/16)
      AWS Account IDClick your account name (top right) → copy the 12-digit Account ID
      RegionRegion selector (top right), for example us-east-1
    5. Go to VPCSubnets and confirm at least one subnet exists for this VPC. If no subnets exist, click Create subnet, select your VPC, and choose an Availability Zone.

  3. Initiate VPC peering.

    In the Aerospike Cloud console:

    1. Navigate to your cluster and go to Network connectivityVPC peering.

    2. Click Create VPC Peering.

    3. Fill in the details of your AWS VPC:

      • AWS account ID: The 12-digit ID of your AWS account where your VPC resides.
      • VPC ID: The identifier of your VPC.
      • VPC region: Auto-filled from your cluster’s region.
      • VPC CIDR block: Your VPC’s IPv4 CIDR block.
    4. Under TLS connection, accept the default Accept only TLS connections (recommended).

    5. Click Create configuration. The Aerospike Cloud service initiates a VPC peering connection from the Aerospike VPC to your VPC.

    Aerospike’s AWS account creates a peering connection request. The connection status shows Pending Acceptance until you accept it in your AWS account.

  4. Accept the peering request.

    1. In the AWS Console: VPCPeering Connections → select the pending peering → ActionsAccept request.
      • Or use the CLI:
        Terminal window
        aws ec2 accept-vpc-peering-connection \
        --vpc-peering-connection-id pcx-1410263943e464f4a \
        --region us-east-1
  5. Update route tables.

    1. In the AWS Console, go to VPCSubnets.

    2. Select the subnet you identified earlier when getting your AWS VPC details (for example subnet-0abc1234def56789).

    3. Click the route table ID link (for example rtb-0e20f7173e8792fa0) to open the route table details page.

    4. Click your route table ID to get to the route table ID details page. Click Edit routes, then click Add route and enter:

      • Destination: 10.128.0.0/19
      • Target: Select Peering Connection, then select your peering connection (for example pcx-0577cf61346e2dd32)
      • Or use the CLI:
        Terminal window
        aws ec2 create-route \
        --region <YOUR_REGION> \
        --route-table-id <YOUR_ROUTE_TABLE_ID> \
        --destination-cidr-block 10.128.0.0/19 \
        --vpc-peering-connection-id <YOUR_PEERING_CONNECTION_ID>

      The destination CIDR 10.128.0.0/19 is the Aerospike Cloud VPC CIDR, not your VPC’s CIDR. This route directs traffic destined for Aerospike through the peering connection.

    5. Click Save changes.

    Aerospike Cloud updates its VPC routes automatically on their side.

  6. Associate private hosted zone (DNS).

    DNS association is required to resolve Aerospike cluster endpoints. Verify that Enable DNS resolution and Enable DNS hostnames are enabled in your VPC settings.

    1. After the peering connection is accepted, get the Hosted Zone ID (Zone ID, for example Z0123456789ABCDEFGHIJ) from the Networking tab in the Aerospike Cloud console.

    2. Associate your VPC with Aerospike’s private hosted zone:

      Terminal window
      aws route53 associate-vpc-with-hosted-zone \
      --hosted-zone-id <HOSTED_ZONE_ID_FROM_CLOUD_CONSOLE> \
      --vpc VPCRegion=<YOUR_VPC_REGION>,VPCId=<YOUR_VPC_ID>
  7. Configure a security group.

    1. In the AWS Console, go to VPCSecurity Groups.

    2. Select an existing security group for your VPC, or click Create security group and enter:

      • Security group name: aerospike-client-sg
      • Description: Security group for Aerospike Cloud client access
      • VPC: Select your VPC
    3. Click Create security group.

    4. With your security group selected, click the Outbound rules tab, then click Edit outbound rules.

    5. Click Add rule and enter:

      • Type: Custom TCP
      • Port range: 4000
      • Destination: 10.128.0.0/19 (Aerospike VPC CIDR)
      • Description: Aerospike Cloud
    6. Click Save rules.

    You do not need to add inbound rules. Security groups are stateful, so return traffic from Aerospike is automatically allowed.

  8. (Optional) Launch a test client in your VPC.

    If you already have an application host in your VPC, skip to step 9. Otherwise, launch a small EC2 instance to validate connectivity.

    In the AWS Console, go to EC2InstancesLaunch instances. Select Amazon Linux 2023, t2.micro, a key pair (create one if needed), your VPC, a public subnet (with the route table from step 5), the security group from step 7, and enable Auto-assign public IP. Launch the instance and connect via SSH.

  9. Test DNS resolution.

    Find the Hostname on the cluster Details tab in the Aerospike Cloud console. Run these commands from a host inside the consumer VPC (your EC2 test client or EKS pod).

    This dig command should return a list of private IPs, one for each Aerospike node:

    Terminal window
    dig +short <AEROSPIKE_HOSTNAME>
    Terminal window
    dig +short fcd8461a-49ee-42ea-ae08-7366a94e7654.aerospike.internal
    Example response
    10.128.1.8
    10.128.1.142
  10. Test TCP connectivity to port 4000 using one of the IPs from step 9.

    If nc is available:

    Terminal window
    nc -zv <IP_FROM_DIG> 4000

    If nc is not available, use bash TCP checks:

    Terminal window
    timeout 3 bash -c 'cat < /dev/null > /dev/tcp/<IP_FROM_DIG>/4000' \
    && echo "4000 open" || echo "4000 closed"

    If port 4000 is open, your VPC peering, routing, and security group configuration is complete. Your application can now connect to Aerospike Cloud.

  11. Connect to Aerospike using Aerospike Quick Look (AQL).

    1. Install Aerospike Tools on your EC2 instance.

      Follow the instructions at Install Aerospike Tools on Linux. After installation, verify with:

      Terminal window
      aql --version
    2. Create a database user in the Aerospike Cloud console.

      Go to Access managerCreate database user. Enter a username and password, and select Read-Write access. This is separate from your Cloud console login. See Database users for details on access levels.

    3. Download the TLS certificate.

      In the Cloud console, go to Access manager → click Download CA certificate. This downloads a certificate.pem file to your local machine.

    4. Upload the certificate to your EC2 instance.

      Open a new terminal on your local machine (not the EC2 SSH session) and run:

      Terminal window
      scp -i <PATH_TO_KEY_FILE> <PATH_TO_CERTIFICATE_PEM> ec2-user@<EC2_PUBLIC_IP>:~/certificate.pem

      Find your EC2 public IP in the AWS Console under EC2Instances → select your instance → copy the Public IPv4 address.

    5. Get the hostname from the cluster Details tab in the Cloud console (under ConnectionHostname).

    6. Connect with AQL.

      Terminal window
      aql --tls-enable \
      --tls-name <HOSTNAME> \
      --tls-cafile ~/certificate.pem \
      -h <HOSTNAME>:4000 \
      -U <DB_USERNAME> \
      -P

      Enter your database password when prompted. When you see the aql> prompt, you are connected to your Aerospike Cloud cluster and can run queries.

Clean up resources

If you created temporary resources to validate connectivity, clean them up when you’re done:

  • Terminate the EC2 test instance you created in step 8.
  • Delete the security group you created in step 7 (if no longer needed).
  • Remove the database user you created in step 11.
  • Delete your Aerospike Cloud cluster if you no longer need it.

Connection status reference

Throughout this process, you see status indicators for the peering connection in both the Aerospike Cloud console and the AWS Console. Here are common statuses and their meaning:

  • Pending Acceptance: The peering connection request has been created by Aerospike and is awaiting your acceptance in AWS. In this state, you need to take action to accept the request. (If not accepted within 7 days, the request will expire.)
  • Active: The peering connection is fully established. An active status on both sides means the link is ready for use (though routing/DNS may still need to be configured as described above).
  • Provisioning: (Transient state) The request was accepted and AWS is in the process of making it active. This status usually changes to Active within a short time without further action.
  • Failed: The peering request failed to establish. This can happen due to invalid parameters or network overlaps. A failed connection cannot be accepted or used. You may need to delete it and create a new request.
  • Rejected: The peering request was explicitly declined by the accepter (your side). No connection is made. Create a new request if you rejected by mistake.
  • Expired: The request wasn’t accepted within the allowed time (7 days). The connection is not made and the request must be recreated if still needed.

In the Aerospike Cloud console these statuses might be labeled slightly differently. For example, you may see “Pending” instead of “Pending Acceptance”. “Active” is the desired end state. If your connection shows “Active” but you cannot connect to the database, double-check that routes and DNS are set up correctly.

Next steps

You have now provisioned your first Aerospike Cloud database cluster and established connectivity from your own AWS VPC. Next, create a database user, set up observability, and build a client application you can connect to your new cluster.

Feedback

Was this page helpful?

What type of feedback are you giving?

What would you like us to know?

+Capture screenshot

Can we reach out to you?