Skip to content

Commit 745a0cb

Browse files
micheleRPclaude
andauthored
DOC-1871: Add client VPC and security group setup to dedicated Privat… (#504)
* DOC-1871: Add client VPC and security group setup to dedicated PrivateLink UI doc The dedicated-cluster AWS PrivateLink Cloud UI doc was missing the entire client-side VPC and security group setup section, including the critical per-broker port ranges (32000-32500 for Kafka API, 35000-35500 for HTTP Proxy). - Create shared partial for VPC setup steps used by both UI and API docs - Add "Configure PrivateLink connection" section to the dedicated UI doc - Replace inline VPC setup in the API doc with the shared partial Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * DOC-1871: Fix AZ ID example to use AZ name format for --availability-zone flag The create-subnet examples showed an AZ ID (usw2-az1) but used the --availability-zone flag, which expects an AZ name (us-west-2a). Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * DOC-1871: Apply review fixes across PrivateLink docs Address review feedback: remove redundant partial intro, add transition sentence in UI page, fix heading consistency, rename partial section to "Set up the client VPC", update anchor references, standardize on "Redpanda Cloud Console" and "client VPC" terminology, add (350000 ms) to TIP admonitions, promote CIDR warning to CAUTION, integrate port range NOTE into prose, differentiate broker port comments in serverless files, fix missing ^ on external link, and fix AZ example format. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * incorporate review feedback --------- Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
1 parent 948049d commit 745a0cb

File tree

5 files changed

+183
-141
lines changed

5 files changed

+183
-141
lines changed

modules/networking/pages/aws-privatelink.adoc

Lines changed: 12 additions & 125 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
:page-aliases: deploy:deployment-option/cloud/aws-privatelink.adoc
44

55

6-
NOTE: This guide is for configuring AWS PrivateLink using the Redpanda Cloud API. To configure and manage PrivateLink on an existing public cluster, you must use the Cloud API. See xref:networking:configure-privatelink-in-cloud-ui.adoc[Configure PrivateLink in the Cloud UI] if you want to set up the endpoint service using the Redpanda Cloud UI.
6+
NOTE: This guide is for configuring AWS PrivateLink using the Redpanda Cloud API. To configure and manage PrivateLink on an existing public cluster, you must use the Cloud API. See xref:networking:configure-privatelink-in-cloud-ui.adoc[Configure PrivateLink in the Cloud UI] if you want to set up the endpoint service using the Redpanda Cloud Console.
77

88
The Redpanda AWS PrivateLink endpoint service provides secure access to Redpanda Cloud from your own VPC. Traffic over PrivateLink does not go through the public internet because a PrivateLink connection is treated as its own private AWS service. While your VPC has access to the Redpanda VPC, Redpanda cannot access your VPC.
99

@@ -22,11 +22,11 @@ After <<get-a-cloud-api-access-token,getting an access token>>, you can <<create
2222
== Prerequisites
2323

2424
* Install `rpk`.
25-
* Your Redpanda cluster and <<create-client-vpc,VPC>> must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
25+
* Your Redpanda cluster and <<set-up-the-client-vpc,VPC>> must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
2626
* In this guide, you use the link:/api/doc/cloud-controlplane/topic/topic-cloud-api-overview[Redpanda Cloud API] to enable the Redpanda endpoint service for your clusters. Follow the steps below to <<get-an-access-token,get an access token>>.
2727
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI^] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
2828

29-
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds.
29+
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds (350000 ms).
3030

3131
NOTE: Enabling PrivateLink changes private DNS behavior for your cluster. Before configuring connections, review <<dns-resolution-with-privatelink>>.
3232

@@ -36,7 +36,7 @@ include::networking:partial$private-links-api-access-token.adoc[]
3636

3737
== Create new cluster with PrivateLink endpoint service enabled
3838

39-
. In the https://cloud.redpanda.com/[Redpanda Cloud UI^], go to **Resource groups** and select the resource group in which you want to create a cluster.
39+
. In the https://cloud.redpanda.com/[Redpanda Cloud Console^], go to **Resource groups** and select the resource group in which you want to create a cluster.
4040
+
4141
Copy and store the resource group ID (UUID) from the URL in the browser.
4242
+
@@ -87,7 +87,7 @@ Wait for the network to be ready before creating the cluster in the next step. Y
8787
In the example below, make sure to set your own values for the following fields:
8888
+
8989
--
90-
- `zones`: for example, `"usw2-az1","usw2-az2","usw2-az3"`
90+
- `zones`: for example, `"us-west-2a","us-west-2b","us-west-2c"`
9191
- `type`: `"TYPE_BYOC"` or `"TYPE_DEDICATED"`
9292
- `tier`: for example, `"tier-1-aws-v2-arm"`
9393
- `name`
@@ -146,7 +146,7 @@ Enabling PrivateLink on your VPC interrupts all communication on existing Redpan
146146
To avoid disruption, consider using a staged approach to enable PrivateLink. See: xref:networking:byoc/aws/vpc-peering-aws.adoc#switch-from-vpc-peering-to-privatelink[Switch from VPC peering to PrivateLink].
147147
====
148148

149-
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
149+
. In the Redpanda Cloud Console, go to the cluster overview and copy the cluster ID from the **Details** section.
150150
+
151151
[,bash]
152152
----
@@ -204,7 +204,7 @@ When you have a PrivateLink-enabled cluster, you can create an endpoint to conne
204204

205205
=== Get cluster domain
206206

207-
Get the domain (`cluster_domain`) of the cluster from the cluster details in the Redpanda Cloud UI.
207+
Get the domain (`cluster_domain`) of the cluster from the cluster details in the Redpanda Cloud Console.
208208

209209
For example, if the bootstrap server URL is: `seed-3da65a4a.cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com:9092`, then `cluster_domain` is: `cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com`.
210210

@@ -227,126 +227,13 @@ PL_SERVICE_NAME=`curl -X GET \
227227
$PUBLIC_API_ENDPOINT/v1/clusters/$CLUSTER_ID | jq -r .cluster.aws_private_link.status.service_name`
228228
----
229229

230-
=== Create client VPC
230+
With the service name stored, set up your client VPC to connect to the endpoint service.
231231

232-
If you are not using an existing VPC, you must create a new one.
233-
234-
[CAUTION]
235-
====
236-
xref:networking:byoc/aws/vpc-peering-aws.adoc[VPC peering] and PrivateLink will not work at the same time if you set them up on the same VPC where your Kafka clients run. PrivateLink endpoints take priority.
237-
238-
VPC peering and PrivateLink can both be used at the same time if Kafka clients are connecting from distinct VPCs. For example, in a private Redpanda cluster, you can connect your internal Kafka clients over VPC peering, and enable PrivateLink for external services.
239-
====
240-
241-
The client VPC must be in the same region as your Redpanda cluster, unless you have configured <<cross-region-privatelink,cross-region PrivateLink>>. To create the VPC, run:
242-
243-
[,bash]
244-
----
245-
# See https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html for
246-
# information on profiles and credential files
247-
PROFILE=<specific-profile-from-credential-file>
248-
249-
aws ec2 create-vpc --region $REGION --profile $PROFILE --cidr-block 10.0.0.0/20
250-
251-
# Store the client VPC ID from the command output
252-
CLIENT_VPC_ID=<client_vpc_id>
253-
----
254-
255-
You can also use an existing VPC. You need the VPC ID to <<modify-vpc-dns-attributes,modify its DNS attributes>>.
256-
257-
=== Modify VPC DNS attributes
258-
259-
To modify the VPC attributes, run:
260-
261-
[,bash]
262-
----
263-
aws ec2 modify-vpc-attribute --region $REGION --profile $PROFILE --vpc-id $CLIENT_VPC_ID \
264-
--enable-dns-hostnames "{\"Value\":true}"
265-
266-
aws ec2 modify-vpc-attribute --region $REGION --profile $PROFILE --vpc-id $CLIENT_VPC_ID \
267-
--enable-dns-support "{\"Value\":true}"
268-
----
269-
270-
These commands enable DNS hostnames and resolution for instances in the VPC.
271-
272-
=== Create security group
273-
274-
You need the security group ID `security_group_id` from the command output to <<add-security-group-rules,add security group rules>>. To create a security group, run:
275-
276-
[,bash]
277-
----
278-
aws ec2 create-security-group --region $REGION --profile $PROFILE --vpc-id $CLIENT_VPC_ID \
279-
--description "Redpanda endpoint service client security group" \
280-
--group-name "${CLUSTER_ID}-sg"
281-
SECURITY_GROUP_ID=<security_group_id>
282-
----
283-
284-
=== Add security group rules
285-
286-
The following example adds security group rules that work for any broker count by opening the documented per-broker port ranges.
287-
288-
NOTE: For PrivateLink, clients connect to individual ports for each broker in ranges 32000-32500 (Kafka API) and 35000-35500 (HTTP Proxy). Opening only a few ports by broker count can break producers/consumers for topics with many partitions. See xref:networking:cloud-security-network.adoc#private-service-connectivity-network-ports[Private service connectivity network ports].
289-
290-
[,bash]
291-
----
292-
# Allow Kafka API bootstrap (seed)
293-
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
294-
--group-id $SECURITY_GROUP_ID --protocol tcp --port 30292 --cidr 0.0.0.0/0
295-
296-
# Allow Schema Registry
297-
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
298-
--group-id $SECURITY_GROUP_ID --protocol tcp --port 30081 --cidr 0.0.0.0/0
299-
300-
# Allow HTTP Proxy bootstrap
301-
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
302-
--group-id $SECURITY_GROUP_ID --protocol tcp --port 30282 --cidr 0.0.0.0/0
303-
304-
# Allow Redpanda Cloud Data Plane API / Prometheus (if needed)
305-
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
306-
--group-id $SECURITY_GROUP_ID --protocol tcp --port 443 --cidr 0.0.0.0/0
307-
308-
# Private service connectivity broker port pools
309-
# Kafka API per-broker ports
310-
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
311-
--group-id $SECURITY_GROUP_ID \
312-
--ip-permissions 'IpProtocol=tcp,FromPort=32000,ToPort=32500,IpRanges=[{CidrIp=0.0.0.0/0}]'
313-
314-
# HTTP Proxy per-broker ports
315-
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
316-
--group-id $SECURITY_GROUP_ID \
317-
--ip-permissions 'IpProtocol=tcp,FromPort=35000,ToPort=35500,IpRanges=[{CidrIp=0.0.0.0/0}]'
318-
----
319-
320-
=== Create VPC subnet
321-
322-
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet availability zone (for example, `usw2-az1`):
323-
324-
[,bash]
325-
----
326-
aws ec2 create-subnet --region $REGION --profile $PROFILE --vpc-id $CLIENT_VPC_ID \
327-
--availability-zone <zone> \
328-
--cidr-block 10.0.1.0/24
329-
SUBNET_ID=<subnet_id>
330-
----
331-
332-
=== Create VPC endpoint
333-
334-
[,bash]
335-
----
336-
aws ec2 create-vpc-endpoint \
337-
--region $REGION --profile $PROFILE \
338-
--vpc-id $CLIENT_VPC_ID \
339-
--vpc-endpoint-type "Interface" \
340-
--ip-address-type "ipv4" \
341-
--service-name $PL_SERVICE_NAME \
342-
--subnet-ids $SUBNET_ID \
343-
--security-group-ids $SECURITY_GROUP_ID \
344-
--private-dns-enabled
345-
----
232+
include::networking:partial$private-links-aws-client-vpc-setup.adoc[]
346233

347234
== Access Redpanda services through VPC endpoint
348235

349-
After you have enabled PrivateLink for your cluster, your connection URLs are available in the *How to Connect* section of the cluster overview in the Redpanda Cloud UI.
236+
After you have enabled PrivateLink for your cluster, your connection URLs are available in the *How to Connect* section of the cluster overview in the Redpanda Cloud Console.
350237

351238
include::networking:partial$private-links-access-rp-services-through-vpc.adoc[]
352239

@@ -358,7 +245,7 @@ For more information about AWS cross-region PrivateLink support, see the https:/
358245

359246
=== Requirements
360247

361-
* The Redpanda cluster must be deployed across multiple availability zones (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
248+
* The Redpanda cluster must be deployed across multiple glossterm:availability zones[] (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
362249
* Cross-region PrivateLink is configured through the `supported_regions` field in the `aws_private_link` configuration. This field only appears in the API response for multi-AZ clusters.
363250
* For BYOC clusters, the Redpanda agent IAM role must have `vpce:AllowMultiRegion` and `elasticloadbalancing:DescribeListenerAttributes` permissions.
364251

@@ -407,7 +294,7 @@ aws ec2 create-vpc-endpoint \
407294

408295
== Test the connection
409296

410-
You can test the PrivateLink connection from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
297+
You can test the PrivateLink connection from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
411298

412299
include::networking:partial$private-links-test-connection.adoc[]
413300

modules/networking/pages/configure-privatelink-in-cloud-ui.adoc

Lines changed: 34 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Consider using the endpoint service if you have multiple VPCs and could benefit
2121
* Your Redpanda cluster and VPC must be in the same region, unless you configure <<cross-region-privatelink,cross-region PrivateLink>>.
2222
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
2323

24-
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds.
24+
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds (350000 ms).
2525

2626
== DNS resolution with PrivateLink
2727

@@ -38,6 +38,36 @@ include::networking:partial$dns_resolution.adoc[]
3838

3939
NOTE: For help with issues when enabling PrivateLink, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda support^].
4040

41+
== Configure PrivateLink connection to Redpanda Cloud
42+
43+
When you have a PrivateLink-enabled cluster, create a VPC endpoint to connect your client VPC to your cluster.
44+
45+
=== Get cluster domain
46+
47+
Get the domain (`cluster_domain`) of the cluster from the bootstrap server URL in the *How to Connect* section of the cluster overview in the Redpanda Cloud Console.
48+
49+
For example, if the bootstrap server URL is: `seed-3da65a4a.cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com:9092`, then `cluster_domain` is: `cki01qgth38kk81ard3g.fmc.dev.cloud.redpanda.com`.
50+
51+
[,bash]
52+
----
53+
CLUSTER_DOMAIN=<cluster_domain>
54+
----
55+
56+
NOTE: Use `<cluster_domain>` as the domain you target with your DNS conditional forward (optionally also `*.<cluster_domain>` if your DNS platform requires a wildcard).
57+
58+
=== Get name of PrivateLink endpoint service
59+
60+
You need the service name to <<create-vpc-endpoint,create a VPC endpoint>>. You can find the service name on the *Cluster settings* page after PrivateLink is enabled, or in the *How to Connect* section of the cluster overview.
61+
62+
[,bash]
63+
----
64+
PL_SERVICE_NAME=<vpc_endpoint_service_name>
65+
----
66+
67+
With the service name stored, set up your client VPC to connect to the endpoint service.
68+
69+
include::networking:partial$private-links-aws-client-vpc-setup.adoc[]
70+
4171
== Access Redpanda services through VPC endpoint
4272

4373
After you have enabled PrivateLink for your cluster, your connection URLs are available in the *How to Connect* section of the cluster overview in the Redpanda Cloud Console.
@@ -46,7 +76,7 @@ include::networking:partial$private-links-access-rp-services-through-vpc.adoc[]
4676

4777
== Test the connection
4878

49-
You can test the connection to the endpoint service from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
79+
You can test the connection to the endpoint service from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
5080

5181
include::networking:partial$private-links-test-connection.adoc[]
5282

@@ -58,13 +88,13 @@ For more information about AWS cross-region PrivateLink support, see the https:/
5888

5989
=== Prerequisites
6090

61-
* The Redpanda cluster must be deployed across multiple availability zones (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
91+
* The Redpanda cluster must be deployed across multiple glossterm:availability zones[] (multi-AZ). This is an AWS limitation for cross-region PrivateLink.
6292

6393
=== Configure supported regions
6494

6595
NOTE: The *Supported regions* option only appears in the UI for multi-AZ clusters.
6696

67-
. In the Redpanda Cloud UI, select your https://cloud.redpanda.com/clusters[cluster^], and go to the cluster settings page.
97+
. In the Redpanda Cloud Console, select your https://cloud.redpanda.com/clusters[cluster^], and go to the cluster settings page.
6898
. In the AWS PrivateLink section, click *Edit* (or *Enable* if PrivateLink is not yet enabled).
6999
. In the *Supported regions* section, click *Add* to add a region from which PrivateLink endpoints can connect to your cluster.
70100
. Select an AWS region from the dropdown. The cluster's home region is automatically included and not shown in the list.

modules/networking/pages/serverless/aws/privatelink-api.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -288,15 +288,15 @@ The following example shows how to add security group rules to allow access to R
288288
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
289289
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9092 --cidr 0.0.0.0/0
290290
291-
# Allow Kafka API bootstrap (broker)
291+
# Allow Kafka API broker 1
292292
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
293293
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9093 --cidr 0.0.0.0/0
294294
295-
# Allow Kafka API bootstrap (broker)
295+
# Allow Kafka API broker 2
296296
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
297297
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9094 --cidr 0.0.0.0/0
298298
299-
# Allow Kafka API bootstrap (broker)
299+
# Allow Kafka API broker 3
300300
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
301301
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9095 --cidr 0.0.0.0/0
302302
@@ -311,7 +311,7 @@ aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
311311

312312
=== Create VPC subnet
313313

314-
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet availability zone (for example, `usw2-az1`):
314+
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet Availability Zone name (for example, `us-west-2a`):
315315

316316
[,bash]
317317
----
@@ -344,7 +344,7 @@ include::networking:partial$private-links-access-rp-service-serverless.adoc[]
344344

345345
== Test the connection
346346

347-
You can test the PrivateLink connection from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
347+
You can test the PrivateLink connection from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
348348

349349
include::networking:partial$private-links-test-connection-serverless.adoc[]
350350

modules/networking/pages/serverless/aws/privatelink-ui.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ Consider using the PrivateLink endpoint service if you have multiple VPCs and co
1717
== Requirements
1818

1919
* Your Redpanda Serverless cluster and VPC must be in the same region.
20-
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
20+
* Use the https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html[AWS CLI^] to create a new client VPC or modify an existing one to use the PrivateLink endpoint.
2121

22-
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds.
22+
TIP: In Kafka clients, set `connections.max.idle.ms` to a value less than 350 seconds (350000 ms).
2323

2424
== DNS resolution with PrivateLink
2525

@@ -134,15 +134,15 @@ The following example shows how to add security group rules to allow access to R
134134
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
135135
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9092 --cidr 0.0.0.0/0
136136
137-
# Allow Kafka API bootstrap (broker)
137+
# Allow Kafka API broker 1
138138
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
139139
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9093 --cidr 0.0.0.0/0
140140
141-
# Allow Kafka API bootstrap (broker)
141+
# Allow Kafka API broker 2
142142
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
143143
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9094 --cidr 0.0.0.0/0
144144
145-
# Allow Kafka API bootstrap (broker)
145+
# Allow Kafka API broker 3
146146
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
147147
--group-id $SECURITY_GROUP_ID --protocol tcp --port 9095 --cidr 0.0.0.0/0
148148
@@ -157,7 +157,7 @@ aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
157157

158158
=== Create VPC subnet
159159

160-
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet availability zone (for example, `usw2-az1`):
160+
You need the subnet ID `subnet_id` from the command output to <<create-vpc-endpoint,create a VPC endpoint>>. Run the following command, specifying the subnet Availability Zone name (for example, `us-west-2a`):
161161

162162
[,bash]
163163
----
@@ -192,7 +192,7 @@ include::networking:partial$private-links-access-rp-service-serverless.adoc[]
192192

193193
== Test the connection
194194

195-
You can test the connection to the endpoint service from any VM or container in the consumer VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
195+
You can test the connection to the endpoint service from any VM or container in the client VPC. If configuring a client isn't possible right away, you can do these checks using `rpk` or cURL:
196196

197197
include::networking:partial$private-links-test-connection-serverless.adoc[]
198198

0 commit comments

Comments
 (0)