Skip to content

Commit 79d6d11

Browse files
authored
DOC-1652 change from VPC peering to PSC (#408)
* DOC-1652 change from VPC peering to PSC * coderabbit suggestions * separate links for byoc/dedicated * doc review feedback * doc review feedback * Add similar sections for AWS * add fixes for other peering issues
1 parent a99723a commit 79d6d11

File tree

9 files changed

+77
-29
lines changed

9 files changed

+77
-29
lines changed

modules/networking/pages/aws-privatelink.adoc

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,12 @@ rpk cloud byoc aws apply --redpanda-id=$CLUSTER_ID
135135

136136
== Enable PrivateLink endpoint service for existing clusters
137137

138-
CAUTION: As soon as PrivateLink is available on your VPC, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your VPC are ready to start using the corresponding PrivateLink ports.
138+
[CAUTION]
139+
====
140+
Enabling PrivateLink on your VPC interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution.
141+
142+
To avoid disruption, consider using a staged approach to enable PrivateLink. See: xref:networking:byoc/aws/vpc-peering-aws.adoc#switch-from-vpc-peering-to-privatelink[Switch from VPC peering to PrivateLink].
143+
====
139144

140145
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
141146
+
@@ -342,5 +347,5 @@ include::networking:partial$private-links-test-connection.adoc[]
342347
include::shared:partial$suggested-reading.adoc[]
343348

344349
* link:/api/doc/cloud-controlplane/topic/topic-cloud-api-overview[Cloud API Overview]
345-
* xref:networking:byoc/aws/vpc-peering-aws.adoc[]
346-
* xref:networking:dedicated/vpc-peering.adoc[]
350+
* xref:networking:byoc/aws/vpc-peering-aws.adoc[Add a BYOC VPC Peering Connection]
351+
* xref:networking:dedicated/vpc-peering.adoc[Add a Dedicated VPC Peering Connection]

modules/networking/pages/azure-private-link.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ rpk cloud byoc azure apply --redpanda-id=$CLUSTER_ID --subscription-id=$REDPANDA
156156

157157
=== Enable Private Link service for existing clusters
158158

159-
CAUTION: As soon as Private Link is available on your virtual network, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your virtual network are ready to start using the corresponding Private Link ports.
159+
CAUTION: Enabling Private Link on your VNet interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution. Make sure all applications running in your virtual network are ready to start using the corresponding Private Link ports.
160160

161161
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
162162
+

modules/networking/pages/byoc/aws/vpc-peering-aws.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
:description: Use the Redpanda UI and AWS CLI to create a VPC peering connection for a BYOC cluster.
33
:page-aliases: deploy:deployment-option/cloud/vpc-peering-aws.adoc
44

5+
A VPC peering connection is a networking connection between two VPCs. This connection allows the VPCs to communicate with each other as if they were within the same network. A route table routes traffic between the two VPCs using private IPv4 addresses.
6+
57
To start sending data to the Redpanda cluster, you must configure the VPC network connection by connecting your Redpanda VPC to your existing AWS VPC.
68

79
== Prerequisites
@@ -56,3 +58,12 @@ There are two ways to test your connection:
5658

5759
* Return to your cluster overview, and follow the directions in the *How to connect* panel.
5860
* Use the AWS https://docs.aws.amazon.com/vpc/latest/reachability/what-is-reachability-analyzer.html[Reachability Analyzer^]. Select your VM instance and a Redpanda instance as the source and destination, and test the connection between them.
61+
62+
== Switch from VPC peering to PrivateLink
63+
64+
VPC peering and PrivateLink use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the PrivateLink DNS, those hostnames resolve to PrivateLink endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
65+
66+
To enable PrivateLink without disrupting VPC peering connections, do a controlled DNS switchover:
67+
68+
. Enable PrivateLink on the existing cluster and configure the PrivateLink connection to Redpanda Cloud, but *do not modify VPC DNS attributes yet*. See: xref:networking:aws-privatelink.adoc#enable-privatelink-endpoint-service-for-existing-clusters[Enable PrivateLink on an existing cluster].
69+
. During a planned window, modify the VPC DNS attributes to switch the shared hostnames over to PrivateLink.

modules/networking/pages/byoc/gcp/vpc-peering-gcp.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
:description: Use the Redpanda and GCP UIs to create a VPC peering connection for a BYOC cluster.
33
:page-aliases: deploy:deployment-option/cloud/vpc-peering-gcp.adoc
44

5+
A VPC peering connection is a networking connection between two VPCs. This connection allows the VPCs to communicate with each other as if they were within the same network. A route table routes traffic between the two VPCs using private IPv4 addresses.
6+
57
To start sending data to the Redpanda cluster, you must configure the VPC network connection by connecting your Redpanda VPC to your existing GCP VPC.
68

79
== Prerequisites
@@ -39,3 +41,12 @@ To quickly test this quickly in GCP:
3941
* Create a virtual machine on your GCP network that has a firewall rule allowing ingress traffic from your IP (for example, `<your-ip>/32`)
4042
* Activate the Cloud Shell in your project, install `rpk` in the Cloud Shell, and run `rpk cluster info`.
4143
* If there is output from Redpanda, your connection is successful.
44+
45+
== Switch from VPC peering to Private Service Connect
46+
47+
VPC peering and Private Service Connect use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the Private Service Connect DNS, those hostnames resolve to Private Service Connect endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
48+
49+
To enable Private Service Connect without disrupting VPC peering connections, do a controlled DNS switchover:
50+
51+
. Enable Private Service Connect on the existing cluster and deploy consumer-side resources, but *do not create private DNS yet*. See: xref:networking:gcp-private-service-connect.adoc#enable-private-service-connect-on-an-existing-byoc-or-byovpc-cluster[Enable Private Service Connect on an existing cluster].
52+
. During a planned window, create the private DNS zone and records in your VPC to switch the shared hostnames over to Private Service Connect.

modules/networking/pages/dedicated/aws/vpc-peering.adoc

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,10 @@ To create a peering connection between your VPC and Redpanda's VPC:
2222

2323
. In the Redpanda Cloud UI, go to the *Overview* page for your cluster.
2424
. In the Details section, click the name of the Redpanda network.
25-
. On the *Network* page, click *+ Add peering connection*.
26-
. In *Connection name*, enter a name. For example, the name might refer to the VPC ID of the VPC you created in AWS.
27-
. In *AWS account number*, enter the account number associated with the VPC you want to connect to.
28-
. In *AWS VPC ID*, enter the VPC ID by copying it from the AWS VPC Console.
25+
. On the Networks page, click *VPC peering walkthrough*.
26+
. For *Connection name*, enter a name. For example, the name might refer to the VPC ID of the VPC you created in AWS.
27+
. For *AWS account number*, enter the account number associated with the VPC you want to connect to.
28+
. For *AWS VPC ID*, enter the VPC ID by copying it from the AWS VPC Console.
2929
. Click *Create peering connection*.
3030

3131
== Accept the peering connection request
@@ -42,3 +42,14 @@ The status should say "Pending acceptance".
4242
. Open the *Actions* menu and select *Accept Request*.
4343
. In the confirmation dialog box, verify that the requester owner ID corresponds to the Redpanda account, and select *Yes, Accept*.
4444
. In the next confirmation dialog box, select *Modify my route tables now*.
45+
+
46+
Follow the steps in the dialog box to add routes to your route tables in the AWS console. This enables traffic to flow between the two VPCs.
47+
48+
== Switch from VPC peering to PrivateLink
49+
50+
VPC peering and PrivateLink use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the PrivateLink DNS, those hostnames resolve to PrivateLink endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
51+
52+
To enable PrivateLink without disrupting VPC peering connections, do a controlled DNS switchover:
53+
54+
. Enable PrivateLink on the existing cluster and configure the PrivateLink connection to Redpanda Cloud, but *do not modify VPC DNS attributes yet*. See: xref:networking:aws-privatelink.adoc#enable-privatelink-endpoint-service-for-existing-clusters[Enable PrivateLink on an existing cluster].
55+
. During a planned window, modify the VPC DNS attributes to switch the shared hostnames over to PrivateLink.

modules/networking/pages/dedicated/gcp/configure-psc-in-api.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,12 @@ curl -vv -X POST \
9797

9898
== Enable Private Service Connect on an existing cluster
9999

100-
CAUTION: As soon as Private Service Connect is available on your VPC, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your VPC are ready to start using the corresponding Private Service Connect ports.
100+
[CAUTION]
101+
====
102+
Enabling Private Service Connect on your VPC interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution.
103+
104+
To avoid disruption, consider using a staged approach. See: xref:networking:dedicated/gcp/vpc-peering-gcp.adoc#switch-from-vpc-peering-to-private-service-connect[Switch from VPC peering to Private Service Connect].
105+
====
101106

102107
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
103108
+

modules/networking/pages/dedicated/gcp/vpc-peering-gcp.adoc

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -17,30 +17,31 @@ TIP: Consider adding `rp` at the beginning of the VPC name to indicate that this
1717

1818
== Create a peering connection
1919

20-
To create a peering connection between your VPC and Redpanda's VPC:
20+
A peering becomes active after both Redpanda and GCP create a peering that targets the other project/network.
2121

2222
. In the Redpanda Cloud UI, go to the *Overview* page for your cluster.
2323
. In the Details section, click the name of the Redpanda network.
24-
. On the *Network* page, click *+ Add peering connection*.
25-
. In *Connection name*, enter a name for the connection.
24+
. On the Networks page for your cluster, click *VPC peering walkthrough*.
25+
. For *Connection name*, enter a name for the connection.
2626
+
2727
For example, the name might refer to the VPC ID of the VPC you created in GCP.
2828

29-
. In *GCP account number*, enter the account number associated with the VPC you want to connect to.
30-
. In *GCP VPC ID*, enter the VPC ID.
29+
. For *GCP project ID*, enter the ID of the project that contains the VPC network you want to connect to.
30+
. For *VPC network name*, enter the name of the VPC network.
3131
. Click *Create peering connection*.
3232

33-
== Accept the peering connection request
33+
== Create the reciprocal peering connection
3434

35-
Redpanda sends a peering request to the GCP. You must accept the request from the Redpanda VPC to set up the peering connection.
35+
. In the Google Cloud console, go to VPC network peering - Create peering connection.
36+
. For *Name*, enter a name for the connection (for example, `rp-peering`).
37+
. Select your VPC network, project, and VPC network name.
38+
. Click *Create*.
3639

37-
. Log in to GCP.
38-
. Select the region where the VPC was created.
39-
. From the navigation menu, select *Peering Connections*.
40-
. Under *Requester VPC*, select the VPC you created for use with Redpanda.
41-
+
42-
The status should say "Pending acceptance".
40+
== Switch from VPC peering to Private Service Connect
41+
42+
VPC peering and Private Service Connect use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the Private Service Connect DNS, those hostnames resolve to Private Service Connect endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
43+
44+
To enable Private Service Connect without disrupting VPC peering connections, do a controlled DNS switchover:
4345

44-
. Open the *Actions* menu and select *Accept Request*.
45-
. In the confirmation dialog box, verify that the requester owner ID corresponds to the Redpanda account, and select *Yes, Accept*.
46-
. In the next confirmation dialog box, select *Modify my route tables now*.
46+
. Enable Private Service Connect on the existing cluster and deploy consumer-side resources, but *do not create private DNS yet*. See: xref:networking:dedicated/gcp/configure-psc-in-api.adoc#enable-private-service-connect-on-an-existing-cluster[Enable Private Service Connect on an existing cluster].
47+
. During a planned window, create the private DNS zone and records in your VPC to switch the shared hostnames over to Private Service Connect.

modules/networking/pages/gcp-private-service-connect.adoc

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,12 @@ Replace the following placeholders for the request body. Variables with a `byovp
191191

192192
== Enable Private Service Connect on an existing BYOC or BYOVPC cluster
193193

194-
CAUTION: As soon as Private Service Connect is available on your VPC, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your VPC are ready to start using the corresponding Private Service Connect ports.
194+
[CAUTION]
195+
====
196+
Enabling Private Service Connect on your VPC interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution.
197+
198+
To avoid disruption, consider using a staged approach to enable Private Service Connect. See: xref:networking:byoc/gcp/vpc-peering-gcp.adoc#switch-from-vpc-peering-to-private-service-connect[Switch from VPC peering to Private Service Connect].
199+
====
195200

196201
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
197202
+
@@ -296,5 +301,4 @@ curl -v -X PATCH \
296301
-H "Content-Type: application/json" \
297302
-H "Authorization: Bearer $AUTH_TOKEN" \
298303
-d "$CLUSTER_PATCH_BODY" $PUBLIC_API_ENDPOINT/v1/clusters/$CLUSTER_ID
299-
----
300-
304+
----

modules/networking/partials/vnet-peering.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To create a peering connection between your Azure VNet and Redpanda VPC:
2727

2828
. In the Redpanda Cloud UI, go to the *Overview* page for your cluster.
2929
. In the Details section, click the name of the *Redpanda network*.
30-
. On the *Network* page for your cluster, click *+ Add peering connection*.
30+
. On the Networks page for your cluster, click *VPC peering walkthrough*.
3131
. For *Connection name*, enter a name. For example, the name could refer to your Azure VNet ID.
3232
. For *Azure account number*, enter the account number associated with the VNet you want to connect to.
3333
. For *Azure VNet ID*, enter the VNet ID.

0 commit comments

Comments
 (0)