You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: tidb-cloud/set-up-private-endpoint-connections-on-azure.md
+61-12Lines changed: 61 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,23 +77,72 @@ If you have multiple clusters, you need to repeat these steps for each cluster t
77
77
>
78
78
> For each TiDB Cloud Dedicated cluster, the corresponding endpoint service is automatically created 3 to 4 minutes after the cluster creation.
79
79
80
-
2.Log in to the [Azure portal](https://portal.azure.com/), and then create a private endpoint for your cluster using the copied TiDB Cloud resource ID as follows:
80
+
2.Create the private endpoint by using either the Azure portal or Azure CLI.
81
81
82
-
1. In the Azure portal, search for **Private endpoints**, and then select **Private endpoints** in the result.
83
-
2. On the **Private endpoint** page, click **+ Create**.
84
-
3. In the **Basics** tab, fill in the project and instance information, and then click **Next: Resource**.
85
-
4. In the **Resource** tab, choose **Connect to an Azure resource by resource ID or alias** as the **connection method**, and paste the TiDB Cloud resource ID to the **Resource ID or alias** field.
86
-
5. Continue clicking **Next** to go through the remaining configuration tabs and complete the required settings. Then, click **Create** to create and deploy the private endpoint. It might take a few seconds for Azure to complete the deployment. For more information, see [Create a private endpoint](https://learn.microsoft.com/en-us/azure/private-link/create-private-endpoint-portal?tabs=dynamic-ip#create-a-private-endpoint) in Azure documentation.
82
+
<SimpleTab>
83
+
<divlabel="Use Azure portal">
87
84
88
-
3. After the private endpoint is created and deployed, click **Go to resource**, and then do the following:
85
+
1. Log in to the [Azure portal](https://portal.azure.com/).
86
+
2. Search for **Private endpoints**, and then select **Private endpoints** in the result.
87
+
3. On the **Private endpoint** page, click **+ Create**.
88
+
4. In the **Basics** tab, fill in the project and instance information, and then click **Next: Resource**.
89
+
5. In the **Resource** tab, choose **Connect to an Azure resource by resource ID or alias** as the **connection method**, and paste the copied TiDB Cloud resource ID to the **Resource ID or alias** field.
90
+
6. Continue clicking **Next** to go through the remaining configuration tabs and complete the required settings. Then, click **Create** to create and deploy the private endpoint. It might take a few seconds for Azure to complete the deployment. For more information, see [Create a private endpoint](https://learn.microsoft.com/en-us/azure/private-link/create-private-endpoint-portal?tabs=dynamic-ip#create-a-private-endpoint) in Azure documentation.
91
+
7. After the private endpoint is created and deployed, click **Go to resource**, and then do the following:
89
92
90
-
- Click **Settings** > **Properties** in the left navigation pane, and copy its **Resource ID** for later use.
93
+
- Click **Settings** > **Properties** in the left navigation pane, and copy its **Resource ID** for later use.
4. Get the private endpoint **IP address** from DNS configuration:
135
+
136
+
```bash
137
+
az network private-endpoint show \
138
+
--name ${your_private_endpoint_name} \
139
+
--resource-group ${your_resource_group_name} \
140
+
--query "customDnsConfigs[0].ipAddresses[0]" \
141
+
--output tsv
142
+
```
143
+
144
+
</div>
145
+
</SimpleTab>
97
146
98
147
### Step 3. Accept the endpoint
99
148
@@ -136,4 +185,4 @@ The endpoint service is created automatically after you open the **Create Azure
136
185
137
186
The Azure private endpoint connection feature can automatically detect your private endpoints. This means that after [creating an Azure private endpoint](#step-2-create-an-azure-private-endpoint) in the Azure portal, if you click **Cancel** in the **Create Azure Private Endpoint Connection** dialog in the TiDB Cloud console, you can still view the created endpoint on the **Networking** page. If the cancellation is unintentional, you can continue to configure the endpoint to complete the setup. If the cancellation is intentional, you can delete the endpoint directly in the TiDB Cloud console.
138
187
139
-
[^1]: The diagram of the Azure Private Link architecture is from the [What is Azure Private Link service](https://learn.microsoft.com/en-us/azure/private-link/private-link-service-overview) document ([source file on GitHub](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/private-link/private-link-service-overview.md)) in Azure documentation, licensed under the Creative Commons Attribution 4.0 International.
188
+
[^1]: The diagram of the Azure Private Link architecture is from the [What is Azure Private Link service](https://learn.microsoft.com/en-us/azure/private-link/private-link-service-overview) document ([source file on GitHub](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/private-link/private-link-service-overview.md)) in Azure documentation, licensed under the Creative Commons Attribution 4.0 International.
Copy file name to clipboardExpand all lines: tidb-cloud/set-up-private-endpoint-connections-on-google-cloud.md
+26-4Lines changed: 26 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,14 +117,36 @@ Before you begin to create an endpoint:
117
117
-**Google Cloud Subnet Name**: the name of the subnet in the specified VPC. You can find it on the **VPC network details** page.
118
118
-**Private Service Connect Endpoint Name**: enter a unique name for the private endpoint that will be created.
119
119
2. After entering the information, click **Generate Command**.
120
-
3. Copy the generated command.
121
-
4. Open [Google Cloud Shell](https://console.cloud.google.com/home/dashboard) and execute the command to create the private endpoint.
120
+
3. Create the private endpoint by using either the Google Cloud CLI or the Google Cloud console.
121
+
122
+
<SimpleTab>
123
+
<divlabel="Use Google Cloud CLI">
124
+
125
+
1. Copy the generated command.
126
+
2. Open [Google Cloud Shell](https://console.cloud.google.com/home/dashboard) and execute the command to create the private endpoint.
127
+
128
+
</div>
129
+
<divlabel="Use Google Cloud console">
130
+
131
+
1. In the [Google Cloud console](https://console.cloud.google.com/), make sure the current project is the same as the **Google Cloud Project ID** you entered in TiDB Cloud.
132
+
2. Go to **VPC network** > **Private Service Connect** > **Connected endpoints**, and then click **Connect endpoint**.
133
+
3. Configure the endpoint by using the values from the generated command in TiDB Cloud:
134
+
-**Endpoint name**: use the forwarding rule name from the command.
135
+
-**Target**: select **Published service**, and then enter the service attachment URI from `--target-service-attachment`.
136
+
-**Region**: select the region from the command.
137
+
-**Network**: select your VPC network from `--network`.
138
+
-**Subnetwork**: select your subnet from `--subnet`.
139
+
4. Click **Add endpoint** to create the endpoint.
140
+
5. In **Connected endpoints**, verify that the new endpoint is created and record its endpoint name.
141
+
142
+
</div>
143
+
</SimpleTab>
122
144
123
145
### Step 3. Accept endpoint access
124
146
125
-
After executing the command in Google Cloud Shell successfully, go back to the TiDB Cloud console and then click **Accept Endpoint Access**.
147
+
After creating the endpoint in Google Cloud successfully, go back to the TiDB Cloud console, and then click **Accept Endpoint Access**.
126
148
127
-
If you see an error `not received connection request from endpoint`, make sure that you have copied the command correctly and successfully executed it in your Google Cloud Shell.
149
+
If you see an error `not received connection request from endpoint`, make sure that you have successfully created the endpoint in your Google Cloud project and that its configuration matches the generated command.
0 commit comments