Skip to content

Commit 35eb8ce

Browse files
GCP dedicated networking docs (#129)
Co-authored-by: Maria Ines Parnisari <[email protected]>
1 parent 38936f1 commit 35eb8ce

File tree

2 files changed

+62
-1
lines changed

2 files changed

+62
-1
lines changed

app/authzed/guides/setting-up-private-networking/page.mdx

Lines changed: 62 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,68 @@ desc = No schema has been defined; please call WriteSchema to start
103103

104104
## GCP Steps
105105

106-
Coming Soon
106+
Most users of AuthZed Dedicated on GCP privately connect to SpiceDB with GCP [Private Service Connect](https://docs.cloud.google.com/vpc/docs/private-service-connect). Private Service Connect enables a private connection from your GCP Project and VPC to SpiceDB. Users of AuthZed Dedicated also have the option to configure SpiceDB to be accessed from the open internet.
107+
108+
![gcp_dedicated_diagram.png](/images/gcp_dedicated_diagram.png)
109+
110+
<Steps>
111+
112+
### Configure the VPC Endpoint
113+
114+
1. Navigate to “Private Service Connect” and make sure you are on the “Connected Endpoints” tab.
115+
1. Click “Connect Endpoint”
116+
117+
| Option | Selection |
118+
|------------------------|------------------------------------------------|
119+
| Target | “Published service” |
120+
| Target service | This will be provided to you by Authzed |
121+
| Endpoint name | Name this whatever you want |
122+
| Network and subnetwork | Select the networks you need connectivity from |
123+
| IP address | Choose whatever IP you'd like |
124+
125+
### Enable DNS
126+
127+
1. Navigate to Cloud DNS and create a zone
128+
129+
| Option | Selection |
130+
|-----------|---------------------------------------------------------------------------|
131+
| Zone type | private |
132+
| DNS Name | This will be provided to you by Authzed |
133+
| Networks | Select the network where the Private Service Connect endpoint is deployed |
134+
135+
1. Add record set
136+
137+
| Option | Selection |
138+
|------------|------------------------------------------------|
139+
| DNS name | This will be provided to you by Authzed |
140+
| IP address | Enter your Private Service Connect endpoint IP |
141+
142+
### Add Permission System
143+
144+
1. Login to your SpiceDB management console
145+
2. On the homepage, select "Add Permission System"
146+
3. Configure your permission system to your liking and create it
147+
4. If you enabled [Restricted API Access](../concepts/restricted-api-access), configure it and provision a token. Otherwise, provision a token without FGAM
148+
149+
### Verify Connectivity
150+
151+
Verify connectivity from client machine with the [Zed CLI tool](https://github.com/authzed/zed)
152+
153+
``` zed
154+
zed context set permission_system_name example.com:443 sdbst_h256_123
155+
```
156+
157+
``` zed
158+
zed schema write example.yaml
159+
```
160+
161+
``` zed
162+
zed schema read
163+
```
164+
165+
The last Zed command should display the schema to your terminal.
166+
167+
</Steps>
107168

108169
## Azure Steps
109170

63.9 KB
Loading

0 commit comments

Comments
 (0)