Skip to content

Commit 94757b2

Browse files
authored
DOC-1374 one PL per connected client VPC (#314)
* DOC-1374 one PL per connected client VPC * incorporate review feedback * how to tell if PSC v1 (deprecated) or v2 * update deprecations page for PSC v1 * return content on maintenance.adoc
1 parent a572f3a commit 94757b2

File tree

6 files changed

+36
-19
lines changed

6 files changed

+36
-19
lines changed

modules/manage/pages/maintenance.adoc

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,5 +130,11 @@ All existing Serverless Standard clusters will be migrated to the new xref:get-s
130130

131131
Retirement date: August 30, 2025
132132

133-
| February 2025 | Private Service Connect v1 | The Redpanda xref:networking:gcp-private-service-connect.adoc[GCP Private Service Connect v2] service provides the ability to allow requests from Private Service Connect endpoints to stay within the same availability zone, avoiding additional networking costs. To upgrade, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda Support^].
133+
| February 2025 | Private Service Connect v1 | The Redpanda xref:networking:gcp-private-service-connect.adoc[GCP Private Service Connect v2] service provides the ability to allow requests from Private Service Connect endpoints to stay within the same availability zone, avoiding additional networking costs.
134+
135+
To check the version of your Private Service Connect attachment, run:
136+
137+
`gcloud compute service-attachments list --filter="region:( ${GCP_REGION} )"`
138+
139+
The attachment name should show the suffix `psc2`; for example, `projects/my-gcp-project/regions/us-west1/serviceAttachments/rp-d0f0mqk5ktzznib2j9g-psc2`. If the name shows the suffix `psc`, then you have the deprecated version. To upgrade, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda Support^].
134140
|===

modules/networking/pages/aws-privatelink.adoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,10 @@ Consider using the PrivateLink endpoint service if you have multiple VPCs and co
1111

1212
[NOTE]
1313
====
14-
* PrivateLink allows overlapping CIDR ranges in VPC networks.
15-
* PrivateLink does not limit the number of VPC connections. However, VPC peering is limited to 125 connections. See https://aws.amazon.com/privatelink/faqs/[How scalable is AWS PrivateLink?^]
14+
* Each client VPC can have one endpoint connected to the PrivateLink service.
15+
* PrivateLink allows overlapping xref:networking:cidr-ranges.adoc[CIDR ranges] in VPC networks.
16+
* The number of connections is limited only by your Redpanda usage tier. PrivateLink does not add extra connection limits. However, VPC peering is limited to 125 connections. See https://aws.amazon.com/privatelink/faqs/[How scalable is AWS PrivateLink?^]
17+
* You control which AWS principals are allowed to connect to the endpoint service.
1618
====
1719

1820
After <<get-a-cloud-api-access-token,getting an access token>>, you can <<create-new-cluster-with-privatelink-endpoint-service-enabled,enable PrivateLink when creating a new cluster>>, or you can <<enable-privatelink-endpoint-service-for-existing-clusters,enable PrivateLink for existing clusters>>.

modules/networking/pages/azure-private-link.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,17 @@ include::shared:partial$feature-flag.adoc[]
55

66
The Redpanda Azure Private Link service provides secure access to Redpanda Cloud from your own virtual network. Traffic over Azure Private Link does not go through the public internet, but instead through Microsoft's backbone network. While clients can initiate connections against the Redpanda Cloud cluster endpoints, Redpanda Cloud services cannot access your virtual networks directly.
77

8-
Consider using Private Link if you have multiple virtual networks and require more secure network management.
8+
Consider using Private Link if you have multiple virtual networks and require more secure network management. To learn more, see the https://learn.microsoft.com/en-us/azure/private-link/private-link-service-overview[Azure documentation].
99

1010
[NOTE]
1111
====
12+
* Each client VNet can have one endpoint connected to the Private Link service.
1213
* Private Link allows overlapping xref:networking:cidr-ranges.adoc[CIDR ranges] in virtual networks.
13-
* Private Link does not limit the number of connections.
14+
* The number of connections is limited only by your Redpanda usage tier. Private Link does not add extra connection limits.
1415
====
1516

1617
After <<get-a-cloud-api-access-token,getting an access token>>, you can <<create-new-cluster-with-private-link-service-enabled,enable Private Link when creating a new cluster>>, or you can <<enable-private-link-service-for-existing-clusters,enable Private Link for existing clusters>>.
1718

18-
To learn more about Azure Private Link, see the https://learn.microsoft.com/en-us/azure/private-link/private-link-service-overview[Azure documentation].
19-
2019
== Requirements
2120

2221
* Install xref:manage:rpk/rpk-install.adoc[`rpk`].

modules/networking/pages/configure-private-service-connect-in-cloud-ui.adoc

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,22 +6,26 @@
66
====
77
88
* This guide is for configuring GCP Private Service Connect using the Redpanda Cloud UI. To configure and manage Private Service on an existing public cluster, you must use the xref:networking:gcp-private-service-connect.adoc[Redpanda Cloud API].
9-
* The latest version of the Redpanda GCP Private Service Connect service (available March, 2025) supports AZ affinity. This allows requests from Private Service Connect endpoints to stay within the same availability zone, avoiding additional networking costs. To upgrade, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda Support^]. NOTE: The original GCP Private Service Connect service is deprecated and will be removed in a future release.
9+
* The latest version of Redpanda GCP Private Service Connect (available March, 2025) supports AZ affinity. This allows requests from Private Service Connect endpoints to stay within the same availability zone, avoiding additional networking costs.
10+
* DEPRECATION: The original Redpanda GCP Private Service Connect is deprecated and will be removed in a future release. For more information, see xref:manage:maintenance.adoc#deprecated-features[Deprecated features].
1011
====
1112

1213

13-
1414
The Redpanda GCP Private Service Connect service provides secure access to Redpanda Cloud from your own VPC. Traffic over Private Service Connect does not go through the public internet because these connections are treated as their own private GCP service. While your VPC has access to the Redpanda VPC, Redpanda cannot access your VPC.
1515

16-
Consider using the endpoint services if you have multiple VPCs and could benefit from a more simplified approach to network management:
16+
Consider using the endpoint services if you have multiple VPCs and could benefit from a more simplified approach to network management.
1717

18+
[NOTE]
19+
====
20+
* Each client VPC can have one endpoint connected to Private Service Connect.
1821
* Private Service Connect allows overlapping xref:networking:cidr-ranges.adoc[CIDR ranges] in VPC networks.
19-
* Private Service Connect does not limit the number of connections using the service.
20-
* You control which GCP projects are allowed to connect to the service.
22+
* The number of connections is limited only by your Redpanda usage tier. Private Service Connect does not add extra connection limits.
23+
* You control from which GCP projects connections are allowed.
24+
====
2125

2226
== Requirements
2327

24-
* Use the https://cloud.google.com/sdk/docs/install[gcloud^] command-line interface (CLI) to create the consumer-side resources, such as a client VPC and forwarding rule, or to modify existing resources to use the Private Service Connect service attachment created for your cluster.
28+
* Use the https://cloud.google.com/sdk/docs/install[gcloud^] command-line interface (CLI) to create the consumer-side resources, such as a client VPC and forwarding rule, or to modify existing resources to use the Private Service Connect attachment created for your cluster.
2529
* The client VPC must be in the same region as your Redpanda cluster.
2630

2731
== Enable endpoint service for existing clusters

modules/networking/pages/configure-privatelink-in-cloud-ui.adoc

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,15 @@ NOTE: This guide is for configuring AWS PrivateLink using the Redpanda Cloud UI.
66

77
The Redpanda AWS PrivateLink endpoint service provides secure access to Redpanda Cloud from your own VPC. Traffic over PrivateLink does not go through the public internet because these connections are treated as their own private AWS service. While your VPC has access to the Redpanda VPC, Redpanda cannot access your VPC.
88

9-
Consider using the endpoint service if you have multiple VPCs and could benefit from a more simplified approach to network management:
9+
Consider using the endpoint service if you have multiple VPCs and could benefit from a more simplified approach to network management.
1010

11+
[NOTE]
12+
====
13+
* Each client VPC can have one endpoint connected to the PrivateLink service.
1114
* PrivateLink allows overlapping xref:networking:cidr-ranges.adoc[CIDR ranges] in VPC networks.
12-
* PrivateLink does not limit the number of connections that use the endpoint service.
15+
* The number of connections is limited only by your Redpanda usage tier. PrivateLink does not add extra connection limits. However, VPC peering is limited to 125 connections. See https://aws.amazon.com/privatelink/faqs/[How scalable is AWS PrivateLink?^]
1316
* You control which AWS principals are allowed to connect to the endpoint service.
17+
====
1418

1519
== Requirements
1620

modules/networking/pages/gcp-private-service-connect.adoc

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@
66
====
77
88
* This guide is for configuring GCP Private Service Connect using the Redpanda Cloud API. To configure and manage Private Service Connect on an existing public cluster, you must use the Cloud API. See xref:networking:configure-private-service-connect-in-cloud-ui.adoc[Configure Private Service Connect in the Cloud UI] to set up the endpoint service using the Redpanda Cloud UI.
9-
* The latest version of the Redpanda GCP Private Service Connect service (available March, 2025) supports AZ affinity. This allows requests from Private Service Connect endpoints to stay within the same availability zone, avoiding additional networking costs. To upgrade, contact https://support.redpanda.com/hc/en-us/requests/new[Redpanda Support^]. NOTE: The original GCP Private Service Connect service is deprecated and will be removed in a future release.
9+
* The latest version of Redpanda GCP Private Service Connect (available March, 2025) supports AZ affinity. This allows requests from Private Service Connect endpoints to stay within the same availability zone, avoiding additional networking costs.
10+
* DEPRECATION: The original Redpanda GCP Private Service Connect is deprecated and will be removed in a future release. For more information, see xref:manage:maintenance.adoc#deprecated-features[Deprecated features].
1011
====
1112

1213
The Redpanda GCP Private Service Connect service provides secure access to Redpanda Cloud from your own VPC. Traffic over Private Service Connect does not go through the public internet because a Private Service Connect connection is treated as its own private GCP service. While your VPC has access to the Redpanda VPC, Redpanda cannot access your VPC.
@@ -17,8 +18,9 @@ Consider using Private Service Connect if you have multiple VPCs and could benef
1718

1819
[NOTE]
1920
====
21+
* Each client VPC can have one endpoint connected to Private Service Connect.
2022
* Private Service Connect allows overlapping xref:networking:cidr-ranges.adoc[CIDR ranges] in VPC networks.
21-
* Private Service Connect does not limit the number of connections.
23+
* The number of connections is limited only by your Redpanda usage tier. Private Service Connect does not add extra connection limits.
2224
* You control from which GCP projects connections are allowed.
2325
====
2426

@@ -27,7 +29,7 @@ After <<get-a-cloud-api-access-token,getting an access token>>, you can <<create
2729
== Requirements
2830

2931
* In this guide, you use the xref:manage:api/cloud-api-overview.adoc[Redpanda Cloud API] to enable the Redpanda endpoint service for your clusters. Follow the steps on this page to <<get-a-cloud-api-access-token, get an access token>>.
30-
* Use the https://cloud.google.com/sdk/docs/install[gcloud^] command-line interface (CLI) to create the consumer-side resources, such as a VPC and forwarding rule, or to modify existing resources to use the Private Service Connect service attachment created for your cluster.
32+
* Use the https://cloud.google.com/sdk/docs/install[gcloud^] command-line interface (CLI) to create the consumer-side resources, such as a VPC and forwarding rule, or to modify existing resources to use the Private Service Connect attachment created for your cluster.
3133

3234
== Get a Cloud API access token
3335

@@ -279,7 +281,7 @@ Replace the following placeholder:
279281
+
280282
`<accept-list>`: a JSON list specifying the projects from which incoming connections will be accepted. All other sources. For example, `[{"source": "consumer-project-ID-1"},{"source": "consumer-project-ID-2"}]`.
281283
+
282-
Wait for the cluster to apply the new configuration (around 15 minutes). The Private Service Connect service attachment is available when the cluster update is complete. To monitor the service attachment creation, run the following `gcloud` command with the project ID:
284+
Wait for the cluster to apply the new configuration (around 15 minutes). The Private Service Connect attachment is available when the cluster update is complete. To monitor the service attachment creation, run the following `gcloud` command with the project ID:
283285
+
284286
[,bash]
285287
----

0 commit comments

Comments
 (0)