You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* DOC-1652 change from VPC peering to PSC
* coderabbit suggestions
* separate links for byoc/dedicated
* doc review feedback
* doc review feedback
* Add similar sections for AWS
* add fixes for other peering issues
== Enable PrivateLink endpoint service for existing clusters
137
137
138
-
CAUTION: As soon as PrivateLink is available on your VPC, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your VPC are ready to start using the corresponding PrivateLink ports.
138
+
[CAUTION]
139
+
====
140
+
Enabling PrivateLink on your VPC interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution.
141
+
142
+
To avoid disruption, consider using a staged approach to enable PrivateLink. See: xref:networking:byoc/aws/vpc-peering-aws.adoc#switch-from-vpc-peering-to-privatelink[Switch from VPC peering to PrivateLink].
143
+
====
139
144
140
145
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
=== Enable Private Link service for existing clusters
158
158
159
-
CAUTION: As soon as Private Link is available on your virtual network, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your virtual network are ready to start using the corresponding Private Link ports.
159
+
CAUTION: Enabling Private Link on your VNet interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution. Make sure all applications running in your virtual network are ready to start using the corresponding Private Link ports.
160
160
161
161
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
A VPC peering connection is a networking connection between two VPCs. This connection allows the VPCs to communicate with each other as if they were within the same network. A route table routes traffic between the two VPCs using private IPv4 addresses.
6
+
5
7
To start sending data to the Redpanda cluster, you must configure the VPC network connection by connecting your Redpanda VPC to your existing AWS VPC.
6
8
7
9
== Prerequisites
@@ -56,3 +58,12 @@ There are two ways to test your connection:
56
58
57
59
* Return to your cluster overview, and follow the directions in the *How to connect* panel.
58
60
* Use the AWS https://docs.aws.amazon.com/vpc/latest/reachability/what-is-reachability-analyzer.html[Reachability Analyzer^]. Select your VM instance and a Redpanda instance as the source and destination, and test the connection between them.
61
+
62
+
== Switch from VPC peering to PrivateLink
63
+
64
+
VPC peering and PrivateLink use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the PrivateLink DNS, those hostnames resolve to PrivateLink endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
65
+
66
+
To enable PrivateLink without disrupting VPC peering connections, do a controlled DNS switchover:
67
+
68
+
. Enable PrivateLink on the existing cluster and configure the PrivateLink connection to Redpanda Cloud, but *do not modify VPC DNS attributes yet*. See: xref:networking:aws-privatelink.adoc#enable-privatelink-endpoint-service-for-existing-clusters[Enable PrivateLink on an existing cluster].
69
+
. During a planned window, modify the VPC DNS attributes to switch the shared hostnames over to PrivateLink.
A VPC peering connection is a networking connection between two VPCs. This connection allows the VPCs to communicate with each other as if they were within the same network. A route table routes traffic between the two VPCs using private IPv4 addresses.
6
+
5
7
To start sending data to the Redpanda cluster, you must configure the VPC network connection by connecting your Redpanda VPC to your existing GCP VPC.
6
8
7
9
== Prerequisites
@@ -39,3 +41,12 @@ To quickly test this quickly in GCP:
39
41
* Create a virtual machine on your GCP network that has a firewall rule allowing ingress traffic from your IP (for example, `<your-ip>/32`)
40
42
* Activate the Cloud Shell in your project, install `rpk` in the Cloud Shell, and run `rpk cluster info`.
41
43
* If there is output from Redpanda, your connection is successful.
44
+
45
+
== Switch from VPC peering to Private Service Connect
46
+
47
+
VPC peering and Private Service Connect use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the Private Service Connect DNS, those hostnames resolve to Private Service Connect endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
48
+
49
+
To enable Private Service Connect without disrupting VPC peering connections, do a controlled DNS switchover:
50
+
51
+
. Enable Private Service Connect on the existing cluster and deploy consumer-side resources, but *do not create private DNS yet*. See: xref:networking:gcp-private-service-connect.adoc#enable-private-service-connect-on-an-existing-byoc-or-byovpc-cluster[Enable Private Service Connect on an existing cluster].
52
+
. During a planned window, create the private DNS zone and records in your VPC to switch the shared hostnames over to Private Service Connect.
Copy file name to clipboardExpand all lines: modules/networking/pages/dedicated/aws/vpc-peering.adoc
+15-4Lines changed: 15 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,10 +22,10 @@ To create a peering connection between your VPC and Redpanda's VPC:
22
22
23
23
. In the Redpanda Cloud UI, go to the *Overview* page for your cluster.
24
24
. In the Details section, click the name of the Redpanda network.
25
-
. On the *Network* page, click *+ Add peering connection*.
26
-
. In *Connection name*, enter a name. For example, the name might refer to the VPC ID of the VPC you created in AWS.
27
-
. In *AWS account number*, enter the account number associated with the VPC you want to connect to.
28
-
. In *AWS VPC ID*, enter the VPC ID by copying it from the AWS VPC Console.
25
+
. On the Networks page, click *VPC peering walkthrough*.
26
+
. For *Connection name*, enter a name. For example, the name might refer to the VPC ID of the VPC you created in AWS.
27
+
. For *AWS account number*, enter the account number associated with the VPC you want to connect to.
28
+
. For *AWS VPC ID*, enter the VPC ID by copying it from the AWS VPC Console.
29
29
. Click *Create peering connection*.
30
30
31
31
== Accept the peering connection request
@@ -42,3 +42,14 @@ The status should say "Pending acceptance".
42
42
. Open the *Actions* menu and select *Accept Request*.
43
43
. In the confirmation dialog box, verify that the requester owner ID corresponds to the Redpanda account, and select *Yes, Accept*.
44
44
. In the next confirmation dialog box, select *Modify my route tables now*.
45
+
+
46
+
Follow the steps in the dialog box to add routes to your route tables in the AWS console. This enables traffic to flow between the two VPCs.
47
+
48
+
== Switch from VPC peering to PrivateLink
49
+
50
+
VPC peering and PrivateLink use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the PrivateLink DNS, those hostnames resolve to PrivateLink endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
51
+
52
+
To enable PrivateLink without disrupting VPC peering connections, do a controlled DNS switchover:
53
+
54
+
. Enable PrivateLink on the existing cluster and configure the PrivateLink connection to Redpanda Cloud, but *do not modify VPC DNS attributes yet*. See: xref:networking:aws-privatelink.adoc#enable-privatelink-endpoint-service-for-existing-clusters[Enable PrivateLink on an existing cluster].
55
+
. During a planned window, modify the VPC DNS attributes to switch the shared hostnames over to PrivateLink.
Copy file name to clipboardExpand all lines: modules/networking/pages/dedicated/gcp/configure-psc-in-api.adoc
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,7 +97,12 @@ curl -vv -X POST \
97
97
98
98
== Enable Private Service Connect on an existing cluster
99
99
100
-
CAUTION: As soon as Private Service Connect is available on your VPC, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your VPC are ready to start using the corresponding Private Service Connect ports.
100
+
[CAUTION]
101
+
====
102
+
Enabling Private Service Connect on your VPC interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution.
103
+
104
+
To avoid disruption, consider using a staged approach. See: xref:networking:dedicated/gcp/vpc-peering-gcp.adoc#switch-from-vpc-peering-to-private-service-connect[Switch from VPC peering to Private Service Connect].
105
+
====
101
106
102
107
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
Copy file name to clipboardExpand all lines: modules/networking/pages/dedicated/gcp/vpc-peering-gcp.adoc
+17-16Lines changed: 17 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,30 +17,31 @@ TIP: Consider adding `rp` at the beginning of the VPC name to indicate that this
17
17
18
18
== Create a peering connection
19
19
20
-
To create a peering connection between your VPC and Redpanda's VPC:
20
+
A peering becomes active after both Redpanda and GCP create a peering that targets the other project/network.
21
21
22
22
. In the Redpanda Cloud UI, go to the *Overview* page for your cluster.
23
23
. In the Details section, click the name of the Redpanda network.
24
-
. On the *Network* page, click *+ Add peering connection*.
25
-
. In *Connection name*, enter a name for the connection.
24
+
. On the Networks page for your cluster, click *VPC peering walkthrough*.
25
+
. For *Connection name*, enter a name for the connection.
26
26
+
27
27
For example, the name might refer to the VPC ID of the VPC you created in GCP.
28
28
29
-
. In *GCP account number*, enter the account number associated with the VPC you want to connect to.
30
-
. In *GCP VPC ID*, enter the VPC ID.
29
+
. For *GCP project ID*, enter the ID of the project that contains the VPC network you want to connect to.
30
+
. For *VPC network name*, enter the name of the VPC network.
31
31
. Click *Create peering connection*.
32
32
33
-
== Accept the peering connection request
33
+
== Create the reciprocal peering connection
34
34
35
-
Redpanda sends a peering request to the GCP. You must accept the request from the Redpanda VPC to set up the peering connection.
35
+
. In the Google Cloud console, go to VPC network peering - Create peering connection.
36
+
. For *Name*, enter a name for the connection (for example, `rp-peering`).
37
+
. Select your VPC network, project, and VPC network name.
38
+
. Click *Create*.
36
39
37
-
. Log in to GCP.
38
-
. Select the region where the VPC was created.
39
-
. From the navigation menu, select *Peering Connections*.
40
-
. Under *Requester VPC*, select the VPC you created for use with Redpanda.
41
-
+
42
-
The status should say "Pending acceptance".
40
+
== Switch from VPC peering to Private Service Connect
41
+
42
+
VPC peering and Private Service Connect use the same DNS hostnames (connection URLs) to connect to the Redpanda cluster. When you configure the Private Service Connect DNS, those hostnames resolve to Private Service Connect endpoints, which can interrupt existing VPC peering-based connections if clients aren't ready.
43
+
44
+
To enable Private Service Connect without disrupting VPC peering connections, do a controlled DNS switchover:
43
45
44
-
. Open the *Actions* menu and select *Accept Request*.
45
-
. In the confirmation dialog box, verify that the requester owner ID corresponds to the Redpanda account, and select *Yes, Accept*.
46
-
. In the next confirmation dialog box, select *Modify my route tables now*.
46
+
. Enable Private Service Connect on the existing cluster and deploy consumer-side resources, but *do not create private DNS yet*. See: xref:networking:dedicated/gcp/configure-psc-in-api.adoc#enable-private-service-connect-on-an-existing-cluster[Enable Private Service Connect on an existing cluster].
47
+
. During a planned window, create the private DNS zone and records in your VPC to switch the shared hostnames over to Private Service Connect.
Copy file name to clipboardExpand all lines: modules/networking/pages/gcp-private-service-connect.adoc
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -191,7 +191,12 @@ Replace the following placeholders for the request body. Variables with a `byovp
191
191
192
192
== Enable Private Service Connect on an existing BYOC or BYOVPC cluster
193
193
194
-
CAUTION: As soon as Private Service Connect is available on your VPC, all communication on existing Redpanda bootstrap server and broker ports is interrupted due to the change on the private DNS resolution. Make sure all applications running in your VPC are ready to start using the corresponding Private Service Connect ports.
194
+
[CAUTION]
195
+
====
196
+
Enabling Private Service Connect on your VPC interrupts all communication on existing Redpanda bootstrap server and broker ports due to the change of private DNS resolution.
197
+
198
+
To avoid disruption, consider using a staged approach to enable Private Service Connect. See: xref:networking:byoc/gcp/vpc-peering-gcp.adoc#switch-from-vpc-peering-to-private-service-connect[Switch from VPC peering to Private Service Connect].
199
+
====
195
200
196
201
. In the Redpanda Cloud UI, go to the cluster overview and copy the cluster ID from the **Details** section.
0 commit comments