You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DOC-1871: Add client VPC and security group setup to dedicated Privat… (#504)
* DOC-1871: Add client VPC and security group setup to dedicated PrivateLink UI doc
The dedicated-cluster AWS PrivateLink Cloud UI doc was missing the entire
client-side VPC and security group setup section, including the critical
per-broker port ranges (32000-32500 for Kafka API, 35000-35500 for HTTP Proxy).
- Create shared partial for VPC setup steps used by both UI and API docs
- Add "Configure PrivateLink connection" section to the dedicated UI doc
- Replace inline VPC setup in the API doc with the shared partial
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* DOC-1871: Fix AZ ID example to use AZ name format for --availability-zone flag
The create-subnet examples showed an AZ ID (usw2-az1) but used the
--availability-zone flag, which expects an AZ name (us-west-2a).
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* DOC-1871: Apply review fixes across PrivateLink docs
Address review feedback: remove redundant partial intro, add transition
sentence in UI page, fix heading consistency, rename partial section to
"Set up the client VPC", update anchor references, standardize on
"Redpanda Cloud Console" and "client VPC" terminology, add (350000 ms)
to TIP admonitions, promote CIDR warning to CAUTION, integrate port
range NOTE into prose, differentiate broker port comments in serverless
files, fix missing ^ on external link, and fix AZ example format.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* incorporate review feedback
---------
Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
NOTE: This guide is for configuring AWS PrivateLink using the Redpanda Cloud API. To configure and manage PrivateLink on an existing public cluster, you must use the Cloud API. See xref:networking:configure-privatelink-in-cloud-ui.adoc[Configure PrivateLink in the Cloud UI] if you want to set up the endpoint service using the Redpanda Cloud UI.
6
+
NOTE: This guide is for configuring AWS PrivateLink using the Redpanda Cloud API. To configure and manage PrivateLink on an existing public cluster, you must use the Cloud API. See xref:networking:configure-privatelink-in-cloud-ui.adoc[Configure PrivateLink in the Cloud UI] if you want to set up the endpoint service using the Redpanda Cloud Console.
7
7
8
8
The Redpanda AWS PrivateLink endpoint service provides secure access to Redpanda Cloud from your own VPC. Traffic over PrivateLink does not go through the public internet because a PrivateLink connection is treated as its own private AWS service. While your VPC has access to the Redpanda VPC, Redpanda cannot access your VPC.
9
9
@@ -22,11 +22,11 @@ After <<get-a-cloud-api-access-token,getting an access token>>, you can <<create
22
22
== Prerequisites
23
23
24
24
* Install `rpk`.
25
-
* Your Redpanda cluster and <<create-client-vpc,VPC>> must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
25
+
* Your Redpanda cluster and <<set-up-the-client-vpc,VPC>> must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
26
26
* In this guide, you use the link:/api/doc/cloud-controlplane/topic/topic-cloud-api-overview[Redpanda Cloud API] to enable the Redpanda endpoint service for your clusters. Follow the steps below to <<get-an-access-token,get an access token>>.
27
27
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI^] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
28
28
29
-
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds.
29
+
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds (350000 ms).
30
30
31
31
NOTE: Enabling PrivateLink changes private DNS behavior for your cluster. Before configuring connections, review <<dns-resolution-with-privatelink>>.
== Create new cluster with PrivateLink endpoint service enabled
38
38
39
-
. In the https://cloud.redpanda.com/[Redpanda Cloud UI^], go to **Resource groups** and select the resource group in which you want to create a cluster.
39
+
. In the https://cloud.redpanda.com/[Redpanda Cloud Console^], go to **Resource groups** and select the resource group in which you want to create a cluster.
40
40
+
41
41
Copy and store the resource group ID (UUID) from the URL in the browser.
42
42
+
@@ -87,7 +87,7 @@ Wait for the network to be ready before creating the cluster in the next step. Y
87
87
In the example below, make sure to set your own values for the following fields:
88
88
+
89
89
--
90
-
- `zones`: for example, `"usw2-az1","usw2-az2","usw2-az3"`
90
+
- `zones`: for example, `"us-west-2a","us-west-2b","us-west-2c"`
91
91
- `type`: `"TYPE_BYOC"` or `"TYPE_DEDICATED"`
92
92
- `tier`: for example, `"tier-1-aws-v2-arm"`
93
93
- `name`
@@ -146,7 +146,7 @@ Enabling PrivateLink on your VPC interrupts all communication on existing Redpan
146
146
To avoid disruption, consider using a staged approach to enable PrivateLink. See: xref:networking:byoc/aws/vpc-peering-aws.adoc#switch-from-vpc-peering-to-privatelink[Switch from VPC peering to PrivateLink].
147
147
====
148
148
149
-
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
149
+
. In the Redpanda Cloud Console, go to the cluster overview and copy the cluster ID from the **Details** section.
150
150
+
151
151
[,bash]
152
152
----
@@ -204,7 +204,7 @@ When you have a PrivateLink-enabled cluster, you can create an endpoint to conne
204
204
205
205
=== Get cluster domain
206
206
207
-
Get the domain (`cluster_domain`) of the cluster from the cluster details in the Redpanda Cloud UI.
207
+
Get the domain (`cluster_domain`) of the cluster from the cluster details in the Redpanda Cloud Console.
208
208
209
209
For example, if the bootstrap server URL is: `seed-3da65a4a.cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com:9092`, then `cluster_domain` is: `cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com`.
210
210
@@ -227,126 +227,13 @@ PL_SERVICE_NAME=`curl -X GET \
With the service name stored, set up your client VPC to connect to the endpoint service.
231
231
232
-
If you are not using an existing VPC, you must create a new one.
233
-
234
-
[CAUTION]
235
-
====
236
-
xref:networking:byoc/aws/vpc-peering-aws.adoc[VPC peering] and PrivateLink will not work at the same time if you set them up on the same VPC where your Kafka clients run. PrivateLink endpoints take priority.
237
-
238
-
VPC peering and PrivateLink can both be used at the same time if Kafka clients are connecting from distinct VPCs. For example, in a private Redpanda cluster, you can connect your internal Kafka clients over VPC peering, and enable PrivateLink for external services.
239
-
====
240
-
241
-
The client VPC must be in the same region as your Redpanda cluster, unless you have configured <<cross-region-privatelink,cross-region PrivateLink>>. To create the VPC, run:
242
-
243
-
[,bash]
244
-
----
245
-
# See https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html for
These commands enable DNS hostnames and resolution for instances in the VPC.
271
-
272
-
=== Create security group
273
-
274
-
You need the security group ID `security_group_id` from the command output to <<add-security-group-rules,add security group rules>>. To create a security group, run:
--description "Redpanda endpoint service client security group" \
280
-
--group-name "${CLUSTER_ID}-sg"
281
-
SECURITY_GROUP_ID=<security_group_id>
282
-
----
283
-
284
-
=== Add security group rules
285
-
286
-
The following example adds security group rules that work for any broker count by opening the documented per-broker port ranges.
287
-
288
-
NOTE: For PrivateLink, clients connect to individual ports for each broker in ranges 32000-32500 (Kafka API) and 35000-35500 (HTTP Proxy). Opening only a few ports by broker count can break producers/consumers for topics with many partitions. See xref:networking:cloud-security-network.adoc#private-service-connectivity-network-ports[Private service connectivity network ports].
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet availability zone (for example, `usw2-az1`):
After you have enabled PrivateLink for your cluster, your connection URLs are available in the *How to Connect* section of the cluster overview in the Redpanda Cloud UI.
236
+
After you have enabled PrivateLink for your cluster, your connection URLs are available in the *How to Connect* section of the cluster overview in the Redpanda Cloud Console.
@@ -358,7 +245,7 @@ For more information about AWS cross-region PrivateLink support, see the https:/
358
245
359
246
=== Requirements
360
247
361
-
* The Redpanda cluster must be deployed across multiple availability zones (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
248
+
* The Redpanda cluster must be deployed across multiple glossterm:availability zones[] (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
362
249
* Cross-region PrivateLink is configured through the `supported_regions` field in the `aws_private_link` configuration. This field only appears in the API response for multi-AZ clusters.
363
250
* For BYOC clusters, the Redpanda agent IAM role must have `vpce:AllowMultiRegion` and `elasticloadbalancing:DescribeListenerAttributes` permissions.
364
251
@@ -407,7 +294,7 @@ aws ec2 create-vpc-endpoint \
407
294
408
295
== Test the connection
409
296
410
-
You can test the PrivateLink connection from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
297
+
You can test the PrivateLink connection from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
Copy file name to clipboardExpand all lines: modules/networking/pages/configure-privatelink-in-cloud-ui.adoc
+34-4Lines changed: 34 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Consider using the endpoint service if you have multiple VPCs and could benefit
21
21
* Your Redpanda cluster and VPC must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
22
22
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
23
23
24
-
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds.
24
+
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds (350000 ms).
NOTE: For help with issues when enabling PrivateLink, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda support^].
40
40
41
+
== Configure PrivateLink connection to Redpanda Cloud
42
+
43
+
When you have a PrivateLink-enabled cluster, create a VPC endpoint to connect your client VPC to your cluster.
44
+
45
+
=== Get cluster domain
46
+
47
+
Get the domain (`cluster_domain`) of the cluster from the bootstrap server URL in the *How to Connect* section of the cluster overview in the Redpanda Cloud Console.
48
+
49
+
For example, if the bootstrap server URL is: `seed-3da65a4a.cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com:9092`, then `cluster_domain` is: `cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com`.
50
+
51
+
[,bash]
52
+
----
53
+
CLUSTER_DOMAIN=<cluster_domain>
54
+
----
55
+
56
+
NOTE: Use `<cluster_domain>` as the domain you target with your DNS conditional forward (optionally also `*.<cluster_domain>` if your DNS platform requires a wildcard).
57
+
58
+
=== Get name of PrivateLink endpoint service
59
+
60
+
You need the service name to <<create-vpc-endpoint,create a VPC endpoint>>. You can find the service name on the *Cluster settings* page after PrivateLink is enabled, or in the *How to Connect* section of the cluster overview.
61
+
62
+
[,bash]
63
+
----
64
+
PL_SERVICE_NAME=<vpc_endpoint_service_name>
65
+
----
66
+
67
+
With the service name stored, set up your client VPC to connect to the endpoint service.
After you have enabled PrivateLink for your cluster, your connection URLs are available in the *How to Connect* section of the cluster overview in the Redpanda Cloud Console.
You can test the connection to the endpoint service from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
79
+
You can test the connection to the endpoint service from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
@@ -58,13 +88,13 @@ For more information about AWS cross-region PrivateLink support, see the https:/
58
88
59
89
=== Prerequisites
60
90
61
-
* The Redpanda cluster must be deployed across multiple availability zones (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
91
+
* The Redpanda cluster must be deployed across multiple glossterm:availability zones[] (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
62
92
63
93
=== Configure supported regions
64
94
65
95
NOTE: The *Supported regions* option only appears in the UI for multi-AZ clusters.
66
96
67
-
. In the Redpanda Cloud UI, select your https://cloud.redpanda.com/clusters[cluster^], and go to the cluster settings page.
97
+
. In the Redpanda Cloud Console, select your https://cloud.redpanda.com/clusters[cluster^], and go to the cluster settings page.
68
98
. In the AWS PrivateLink section, click *Edit* (or *Enable* if PrivateLink is not yet enabled).
69
99
. In the *Supported regions* section, click *Add* to add a region from which PrivateLink endpoints can connect to your cluster.
70
100
. Select an AWS region from the dropdown. The cluster's home region is automatically included and not shown in the list.
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet availability zone (for example, `usw2-az1`):
314
+
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet Availability Zone name (for example, `us-west-2a`):
You can test the PrivateLink connection from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
347
+
You can test the PrivateLink connection from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
Copy file name to clipboardExpand all lines: modules/networking/pages/serverless/aws/privatelink-ui.adoc
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,9 +17,9 @@ Consider using the PrivateLink endpoint service if you have multiple VPCs and co
17
17
== Requirements
18
18
19
19
* Your Redpanda Serverless cluster and VPC must be in the same region.
20
-
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
20
+
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI^] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
21
21
22
-
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds.
22
+
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds (350000 ms).
23
23
24
24
== DNS resolution with PrivateLink
25
25
@@ -134,15 +134,15 @@ The following example shows how to add security group rules to allow access to R
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet availability zone (for example, `usw2-az1`):
160
+
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet Availability Zone name (for example, `us-west-2a`):
You can test the connection to the endpoint service from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
195
+
You can test the connection to the endpoint service from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
0 commit comments