You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* DOC-1348: Document cross-region AWS PrivateLink feature
- Add supported_regions field to aws_private_link configuration examples
- Add new Cross-region PrivateLink section with requirements and usage
- Update requirements to note cross-region option
- Add cross-region note to Cloud UI page with link to API docs
- Add supported_regions to Terraform provider example
- Add What's New entry for January 2026
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
# Conflicts:
# modules/get-started/pages/whats-new-cloud.adoc
# Conflicts:
# modules/get-started/pages/whats-new-cloud.adoc
# Conflicts:
# modules/get-started/pages/whats-new-cloud.adoc
* DOC-1348: Add Cloud UI documentation for cross-region PrivateLink
- Add cross-region PrivateLink section to Cloud UI docs
- Include UI steps for configuring supported regions
- Update What's New to reference both UI and API docs
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* DOC-1348: Add note that supported regions only appears for multi-AZ clusters
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* style edits
* style edit
* incorporate comments from code review
* incorporate doc review feedback
---------
Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: modules/get-started/pages/whats-new-cloud.adoc
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,10 @@ xref:get-started:cluster-types/serverless.adoc[Serverless] on AWS is now general
16
16
17
17
You can now enable xref:manage:schema-reg/schema-id-validation.adoc[schema ID validation] by xref:manage:cluster-maintenance/config-cluster.adoc[configuring the `enable_schema_id_validation` cluster property]. This controls whether or not Redpanda validates schema IDs in records and which topic properties are enforced. Use caution when enabling this property, because it could cause decompression across topics and increase CPU load.
18
18
19
+
=== Cross-region AWS PrivateLink
20
+
21
+
AWS PrivateLink now supports cross-region connectivity, allowing clients in different AWS regions to connect to your Redpanda cluster through PrivateLink. Configure supported regions in the xref:networking:configure-privatelink-in-cloud-ui.adoc#cross-region-privatelink[Cloud UI] or using the xref:networking:aws-privatelink.adoc#cross-region-privatelink[Cloud API] to specify which regions can establish PrivateLink connections. This feature requires multi-AZ cluster deployments.
Copy file name to clipboardExpand all lines: modules/networking/pages/aws-privatelink.adoc
+64-5Lines changed: 64 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,10 +19,10 @@ Consider using the PrivateLink endpoint service if you have multiple VPCs and co
19
19
20
20
After <<get-a-cloud-api-access-token,getting an access token>>, you can <<create-new-cluster-with-privatelink-endpoint-service-enabled,enable PrivateLink when creating a new cluster>>, or you can <<enable-privatelink-endpoint-service-for-existing-clusters,enable PrivateLink for existing clusters>>.
21
21
22
-
== Requirements
22
+
== Prerequisites
23
23
24
24
* Install `rpk`.
25
-
* Your Redpanda cluster and <<create-client-vpc,VPC>> must be in the same region.
25
+
* Your Redpanda cluster and <<create-client-vpc,VPC>> must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
26
26
* In this guide, you use the link:/api/doc/cloud-controlplane/topic/topic-cloud-api-overview[Redpanda Cloud API] to enable the Redpanda endpoint service for your clusters. Follow the steps below to <<get-an-access-token,get an access token>>.
27
27
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI^] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
28
28
@@ -93,6 +93,7 @@ In the example below, make sure to set your own values for the following fields:
93
93
- `name`
94
94
- `connect_console`: Whether to enable connections to Redpanda Console (boolean)
95
95
- `allowed_principals`: Amazon Resource Names (ARNs) for the AWS principals allowed to access the endpoint service. For example, for all principals in an account, use `"arn:aws:iam::account_id:root"`. See https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permission[Configure an endpoint service^] for details.
96
+
- `supported_regions`: (Optional) List of AWS regions from which PrivateLink endpoints can connect to Redpanda. Required only for <<cross-region-privatelink,cross-region PrivateLink>>. For example, `["us-east-1", "us-west-2"]`.
@@ -158,6 +160,7 @@ In the example below, make sure to set your own value for the following field:
158
160
--
159
161
- `connect_console`: Whether to enable connections to Redpanda Console (boolean)
160
162
- `allowed_principals`: Amazon Resource Names (ARNs) for the AWS principals allowed to access the endpoint service. For example, for all principals in an account, use `"arn:aws:iam::account_id:root"`. See https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permission[Configure an endpoint service^] for details.
163
+
- `supported_regions`: (Optional) List of AWS regions from which PrivateLink endpoints can connect to Redpanda. Required only for <<cross-region-privatelink,cross-region PrivateLink>>. For example, `["us-east-1", "us-west-2"]`.
@@ -234,7 +238,7 @@ xref:networking:byoc/aws/vpc-peering-aws.adoc[VPC peering] and PrivateLink will
234
238
VPC peering and PrivateLink can both be used at the same time if Kafka clients are connecting from distinct VPCs. For example, in a private Redpanda cluster, you can connect your internal Kafka clients over VPC peering, and enable PrivateLink for external services.
235
239
====
236
240
237
-
The VPC region must be the same region where the Redpanda cluster is deployed. To create the VPC, run:
241
+
The client VPC must be in the same region as your Redpanda cluster, unless you have configured <<cross-region-privatelink,cross-region PrivateLink>>. To create the VPC, run:
238
242
239
243
[,bash]
240
244
----
@@ -346,6 +350,61 @@ After you have enabled PrivateLink for your cluster, your connection URLs are av
By default, AWS PrivateLink only allows connections from VPCs in the same region as the endpoint service. Cross-region PrivateLink enables clients in different AWS regions to connect to your Redpanda cluster through PrivateLink.
356
+
357
+
For more information about AWS cross-region PrivateLink support, see the https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-share-your-services.html#endpoint-service-cross-region[AWS documentation^].
358
+
359
+
=== Requirements
360
+
361
+
* The Redpanda cluster must be deployed across multiple availability zones (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
362
+
* Cross-region PrivateLink is configured through the `supported_regions` field in the `aws_private_link` configuration. This field only appears in the API response for multi-AZ clusters.
363
+
* For BYOC clusters, the Redpanda agent IAM role must have `vpce:AllowMultiRegion` and `elasticloadbalancing:DescribeListenerAttributes` permissions.
364
+
365
+
=== Configure cross-region PrivateLink
366
+
367
+
To enable cross-region PrivateLink, add the `supported_regions` field to your `aws_private_link` configuration when <<create-new-cluster-with-privatelink-endpoint-service-enabled,creating a new cluster>> or <<enable-privatelink-endpoint-service-for-existing-clusters,enabling PrivateLink on an existing cluster>>.
368
+
369
+
The `supported_regions` field accepts a list of AWS region identifiers where you want to allow PrivateLink connections from. For example:
With this configuration, clients in VPCs located in `us-east-1`, `us-west-2`, and `eu-west-1` can create PrivateLink endpoints that connect to your Redpanda cluster, regardless of which region the cluster is deployed in.
382
+
383
+
=== Create a cross-region VPC endpoint
384
+
385
+
When creating a VPC endpoint in a different region than your Redpanda cluster, use the same process as <<create-vpc-endpoint,creating a standard VPC endpoint>>, but specify both the client VPC's region and the service region where your Redpanda cluster is deployed.
386
+
387
+
NOTE: The `--service-region` option requires AWS CLI version 2.22.0 or later. Run `aws --version` to check your version and https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html[update if necessary^].
388
+
389
+
[,bash]
390
+
----
391
+
# CLIENT_REGION is the region where your client VPC is located
392
+
# SERVICE_REGION is the region where your Redpanda cluster is deployed
393
+
CLIENT_REGION=<client_region>
394
+
SERVICE_REGION=<service_region>
395
+
396
+
aws ec2 create-vpc-endpoint \
397
+
--region $CLIENT_REGION --profile $PROFILE \
398
+
--service-region $SERVICE_REGION \
399
+
--vpc-id $CLIENT_VPC_ID \
400
+
--vpc-endpoint-type "Interface" \
401
+
--ip-address-type "ipv4" \
402
+
--service-name $PL_SERVICE_NAME \
403
+
--subnet-ids $SUBNET_ID \
404
+
--security-group-ids $SECURITY_GROUP_ID \
405
+
--private-dns-enabled
406
+
----
407
+
349
408
== Test the connection
350
409
351
410
You can test the PrivateLink connection from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
Copy file name to clipboardExpand all lines: modules/networking/pages/configure-privatelink-in-cloud-ui.adoc
+29-3Lines changed: 29 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Consider using the endpoint service if you have multiple VPCs and could benefit
18
18
19
19
== Requirements
20
20
21
-
* Your Redpanda cluster and VPC must be in the same region.
21
+
* Your Redpanda cluster and VPC must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
22
22
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
23
23
24
24
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds.
. In the Redpanda Cloud Console, select your https://cloud.redpanda.com/clusters[cluster^], and go to the *Cluster settings* page.
33
33
. For AWS PrivateLink, click *Enable*.
34
-
. On the Enable PrivateLink page, for Allowed principal ARNs, click *Add*, and enter the Amazon Resource Names (ARNs) for each AWS principal allowed to access the endpoint service. For example, for all principals in a specific account, use `arn:aws:iam::<account-id>:root`. See the AWS documentation on https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permission[configuring an endpoint service^] for details.
35
-
. Click *Add* after entering each ARN, and when finished, click *Enable*.
34
+
. On the Enable PrivateLink page, for Allowed principal ARNs, click *Add*, and enter the Amazon Resource Names (ARNs) for each AWS principal allowed to access the endpoint service. For example, for all principals in a specific account, use `arn:aws:iam::<account-id>:root`. See the AWS documentation on https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#add-remove-permission[configuring an endpoint service^] for details.
35
+
. Click *Add* after entering each ARN, and when finished, click *Enable*.
36
+
. (Optional) To enable cross-region PrivateLink, add supported regions. See <<cross-region-privatelink>>.
36
37
. It may take several minutes for your cluster to update. When the update is complete, the AWS PrivateLink status on the Cluster settings page changes from *In progress* to *Enabled*.
37
38
38
39
NOTE: For help with issues when enabling PrivateLink, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda support^].
@@ -49,6 +50,31 @@ You can test the connection to the endpoint service from any VM or container in
By default, AWS PrivateLink only allows connections from VPCs in the same region as the endpoint service. Cross-region PrivateLink enables clients in different AWS regions to connect to your Redpanda cluster through PrivateLink.
56
+
57
+
For more information about AWS cross-region PrivateLink support, see the https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-share-your-services.html#endpoint-service-cross-region[AWS documentation^].
58
+
59
+
=== Prerequisites
60
+
61
+
* The Redpanda cluster must be deployed across multiple availability zones (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
62
+
63
+
=== Configure supported regions
64
+
65
+
NOTE: The *Supported regions* option only appears in the UI for multi-AZ clusters.
66
+
67
+
. In the Redpanda Cloud UI, select your https://cloud.redpanda.com/clusters[cluster^], and go to the cluster settings page.
68
+
. In the AWS PrivateLink section, click *Edit* (or *Enable* if PrivateLink is not yet enabled).
69
+
. In the *Supported regions* section, click *Add* to add a region from which PrivateLink endpoints can connect to your cluster.
70
+
. Select an AWS region from the dropdown. The cluster's home region is automatically included and not shown in the list.
71
+
. Repeat to add additional regions as needed.
72
+
. Click *Save* (or *Enable*) to apply the changes.
73
+
74
+
After saving, the *Supported regions* row on the cluster settings page displays your configured regions.
75
+
76
+
Clients in VPCs located in the supported regions can now create PrivateLink endpoints that connect to your Redpanda cluster.
77
+
52
78
== Disable endpoint service
53
79
54
80
On the Cluster settings page for the cluster, click *Disable* for PrivateLink. Existing connections are closed after the AWS PrivateLink service is disabled. To connect using PrivateLink again, you must re-enable the service.
0 commit comments