You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/cloud/security/azure-privatelink.md
+40-29Lines changed: 40 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,7 @@ import azure_pe_create_tags from '@site/static/images/cloud/security/azure-pe-cr
19
19
import azure_pe_create_review from '@site/static/images/cloud/security/azure-pe-create-review.png';
20
20
import azure_pe_ip from '@site/static/images/cloud/security/azure-pe-ip.png';
21
21
import azure_pe_view from '@site/static/images/cloud/security/azure-pe-view.png';
22
+
import azure_pe_resource_id from '@site/static/images/cloud/security/azure-pe-resource-id.png';
22
23
import azure_pe_resource_guid from '@site/static/images/cloud/security/azure-pe-resource-guid.png';
23
24
import azure_pl_dns_wildcard from '@site/static/images/cloud/security/azure-pl-dns-wildcard.png';
24
25
import azure_pe_remove_private_endpoint from '@site/static/images/cloud/security/azure-pe-remove-private-endpoint.png';
@@ -33,35 +34,39 @@ This guide shows how to use Azure Private Link to provide private connectivity v
33
34
34
35
<Imageimg={azure_pe}size="lg"alt="Overview of PrivateLink"background='white' />
35
36
36
-
Unlike AWS and GCP, Azure supports cross-region connectivity via Private Link. This enables you to establish connections between VNets located in different regions where you have ClickHouse services deployed.
37
+
Azure supports cross-region connectivity via Private Link. This enables you to establish connections between VNets located in different regions where you have ClickHouse services deployed.
37
38
38
39
:::note
39
-
Additional charges may be applied to inter-region traffic. Please check latest Azure documentation.
40
+
Additional charges may be applied to inter-region traffic. Please check the latest Azure documentation.
40
41
:::
41
42
42
43
**Please complete the following steps to enable Azure Private Link:**
43
44
44
45
1. Obtain Azure connection alias for Private Link
45
46
1. Create a Private Endpoint in Azure
46
-
1. Add the Private Endpoint GUID to your ClickHouse Cloud organization
47
-
1. Add the Private Endpoint GUID to your service(s) allow list
47
+
1. Add the Private Endpoint Resource ID to your ClickHouse Cloud organization
48
+
1. Add the Private Endpoint Resource ID to your service(s) allow list
48
49
1. Access your ClickHouse Cloud service using Private Link
49
50
51
+
:::note
52
+
ClickHouse Cloud Azure PrivateLink has switched from using resourceGUID to Resource ID filters. You can still use resourceGUID, as it is backward-compatible, but we recommend switching to Resource ID filters. To migrate, simply create a new endpoint using the Resource ID, attach it to the service, and remove the old resourceGUID-based one.
53
+
:::
54
+
50
55
## Attention {#attention}
51
56
ClickHouse attempts to group your services to reuse the same published [Private Link service](https://learn.microsoft.com/en-us/azure/private-link/private-link-service-overview) within the Azure region. However, this grouping is not guaranteed, especially if you spread your services across multiple ClickHouse organizations.
52
-
If you already have Private Link configured for other services in your ClickHouse organization, you can often skip most of the steps because of that grouping and proceed directly to the final step: [Add the Private Endpoint GUID to your service(s) allow list](#add-private-endpoint-guid-to-services-allow-list).
57
+
If you already have Private Link configured for other services in your ClickHouse organization, you can often skip most of the steps because of that grouping and proceed directly to the final step: [Add the Private Endpoint Resource ID to your service(s) allow list](#add-private-endpoint-id-to-services-allow-list).
53
58
54
59
Find Terraform examples at the ClickHouse [Terraform Provider repository](https://github.com/ClickHouse/terraform-provider-clickhouse/tree/main/examples/).
55
60
56
61
## Obtain Azure connection alias for Private Link {#obtain-azure-connection-alias-for-private-link}
In the ClickHouse Cloud console, open the service that you would like to connect via PrivateLink, then open the **Settings** menu. Click on the **Set up private endpoint** button. Make a note of the `Service name` and `DNS name`which will be used for setting up Private Link.
65
+
In the ClickHouse Cloud console, open the service that you would like to connect via PrivateLink, then open the **Settings** menu. Click on the **Set up private endpoint** button. Make a note of the `Service name` and `DNS name` which will be used for setting up Private Link.
Make a note of the `Service name` and `DNS name`, it will be needed in the next steps.
69
+
Make a note of the `Service name` and `DNS name`, they will be needed in the next steps.
65
70
66
71
### Option 2: API {#option-2-api}
67
72
@@ -103,7 +108,7 @@ Make a note of the `endpointServiceId`. You'll use it in the next step.
103
108
:::important
104
109
This section covers ClickHouse-specific details for configuring ClickHouse via Azure Private Link. Azure-specific steps are provided as a reference to guide you on where to look, but they may change over time without notice from the Azure cloud provider. Please consider Azure configuration based on your specific use case.
105
110
106
-
Please note that ClickHouse is not responsible for configuring the required Azure private endpoints, DNS records.
111
+
Please note that ClickHouse is not responsible for configuring the required Azure private endpoints and DNS records.
107
112
108
113
For any issues related to Azure configuration tasks, contact Azure Support directly.
109
114
:::
@@ -126,7 +131,7 @@ In the following screen, specify the following options:
126
131
127
132
-**Subscription** / **Resource Group**: Please choose the Azure subscription and resource group for the Private Endpoint.
128
133
-**Name**: Set a name for the **Private Endpoint**.
129
-
-**Region**: Choose region where the deployed VNet that will be connected to ClickHouse Cloud via Private Link.
134
+
-**Region**: Choose a region where the deployed VNet that will be connected to ClickHouse Cloud via Private Link.
130
135
131
136
After you have completed the above steps, click the **Next: Resource** button.
## Setting up DNS for Private Link {#setting-up-dns-for-private-link}
214
225
215
-
You need will need to create a Private DNS zone (`${location_code}.privatelink.azure.clickhouse.cloud`) and attach it to your VNet to access resources via Private Link.
226
+
You will need to create a Private DNS zone (`${location_code}.privatelink.azure.clickhouse.cloud`) and attach it to your VNet to access resources via Private Link.
216
227
217
228
### Create Private DNS zone {#create-private-dns-zone}
218
229
219
230
**Option 1: Using Azure portal**
220
231
221
-
Please follow the following guide to [create an Azure private DNS zone using the Azure Portal](https://learn.microsoft.com/en-us/azure/dns/private-dns-getstarted-portal).
232
+
Please follow this guide to [create an Azure private DNS zone using the Azure Portal](https://learn.microsoft.com/en-us/azure/dns/private-dns-getstarted-portal).
### Create a virtual network link {#create-a-virtual-network-link}
263
274
264
-
To link the private DNS zone to a virtual network, you'll need create a virtual network link.
275
+
To link the private DNS zone to a virtual network, you'll need to create a virtual network link.
265
276
266
277
**Option 1: Using Azure Portal**
267
278
268
-
Please follow the following guide to [link the virtual network to your private DNS zone](https://learn.microsoft.com/en-us/azure/dns/private-dns-getstarted-portal#link-the-virtual-network).
279
+
Please follow this guide to [link the virtual network to your private DNS zone](https://learn.microsoft.com/en-us/azure/dns/private-dns-getstarted-portal#link-the-virtual-network).
To add an endpoint to organization, proceed to the [Add the Private Endpoint GUID to your service(s) allow list](#add-private-endpoint-guid-to-services-allow-list) step. Adding the `Private Endpoint GUID` using the ClickHouse Cloud console to the services allow list automatically adds it to organization.
307
+
To add an endpoint to the organization, proceed to the [Add the Private Endpoint Resource ID to your service(s) allow list](#add-private-endpoint-id-to-services-allow-list) step. Adding the Private Endpoint Resource ID using the ClickHouse Cloud console to the services allow list automatically adds it to organization.
297
308
298
309
To remove an endpoint, open **Organization details -> Private Endpoints** and click the delete button to remove the endpoint.
299
310
@@ -308,11 +319,11 @@ PROVIDER=azure
308
319
KEY_ID=<Key ID>
309
320
KEY_SECRET=<Key secret>
310
321
ORG_ID=<set ClickHouse organization ID>
311
-
ENDPOINT_ID=<Private Endpoint resourceGuid>
322
+
ENDPOINT_ID=<Private Endpoint Resource ID>
312
323
REGION=<region code, use Azure format>
313
324
```
314
325
315
-
Set the `ENDPOINT_ID` environment variable using data from the [Obtaining the Private Endpoint `resourceGuid`](#obtaining-private-endpoint-resourceguid) step.
326
+
Set the `ENDPOINT_ID` environment variable using data from the [Obtaining the Private Endpoint Resource ID](#obtaining-private-endpoint-resourceid) step.
316
327
317
328
Run the following command to add the Private Endpoint:
318
329
@@ -357,13 +368,13 @@ After adding or removing a Private Endpoint, run the following command to apply
## Add the Private Endpoint GUID to your service(s) allow list {#add-private-endpoint-guid-to-services-allow-list}
371
+
## Add the Private Endpoint Resource ID to your service(s) allow list {#add-private-endpoint-id-to-services-allow-list}
361
372
362
-
By default, a ClickHouse Cloud service is not available over a Private Link connection even if the Private Link connection is approved and established. You need to explicitly add the Private Endpoint GUID for each service that should be available using Private Link.
373
+
By default, a ClickHouse Cloud service is not available over a Private Link connection even if the Private Link connection is approved and established. You need to explicitly add the Private Endpoint Resource ID for each service that should be available using Private Link.
In the ClickHouse Cloud console, open the service that you would like to connect via PrivateLink then navigate to **Settings**. Enter the `Endpoint ID` obtained from the [previous](#obtaining-private-endpoint-resourceguid) step.
377
+
In the ClickHouse Cloud console, open the service that you would like to connect via PrivateLink then navigate to **Settings**. Enter the `Resource ID` obtained from the [previous](#obtaining-private-endpoint-resourceid) step.
367
378
368
379
:::note
369
380
If you want to allow access from an existing PrivateLink connection, use the existing endpoint drop-down menu.
@@ -380,7 +391,7 @@ PROVIDER=azure
380
391
KEY_ID=<Key ID>
381
392
KEY_SECRET=<Key secret>
382
393
ORG_ID=<set ClickHouse organization ID>
383
-
ENDPOINT_ID=<Private Endpoint resourceGuid>
394
+
ENDPOINT_ID=<Private Endpoint Resource ID>
384
395
INSTANCE_ID=<Instance ID>
385
396
```
386
397
@@ -471,7 +482,7 @@ Run the following command:
471
482
```bash
472
483
nslookup <dns name>
473
484
```
474
-
where "dns name" `privateDnsHostname`<sup>API</sup> or `DNS name`<sup>console</sup> from [Obtain Azure connection alias for Private Link](#obtain-azure-connection-alias-for-private-link)
485
+
where "dns name" is the `privateDnsHostname`<sup>API</sup> or `DNS name`<sup>console</sup> from [Obtain Azure connection alias for Private Link](#obtain-azure-connection-alias-for-private-link)
475
486
476
487
You should receive the following response:
477
488
@@ -483,11 +494,11 @@ Address: 10.0.0.4
483
494
484
495
### Connection reset by peer {#connection-reset-by-peer}
485
496
486
-
Most likely, the Private Endpoint GUID was not added to the service allow-list. Revisit the [_Add Private Endpoint GUID to your services allow-list_ step](#add-private-endpoint-guid-to-services-allow-list).
497
+
Most likely, the Private Endpoint Resource ID was not added to the service allow-list. Revisit the [_Add Private Endpoint Resource ID to your services allow-list_ step](#add-private-endpoint-id-to-services-allow-list).
487
498
488
499
### Private Endpoint is in pending state {#private-endpoint-is-in-pending-state}
489
500
490
-
Most likely, the Private Endpoint GUID was not added to the service allow-list. Revisit the [_Add Private Endpoint GUID to your services allow-list_ step](#add-private-endpoint-guid-to-services-allow-list).
501
+
Most likely, the Private Endpoint Resource ID was not added to the service allow-list. Revisit the [_Add Private Endpoint Resource ID to your services allow-list_ step](#add-private-endpoint-id-to-services-allow-list).
491
502
492
503
### Test connectivity {#test-connectivity}
493
504
@@ -496,7 +507,7 @@ If you have problems with connecting using Private Link, check your connectivity
496
507
OpenSSL should be able to connect (see CONNECTED in the output). `errno=104` is expected.
0 commit comments