Add an AWS PrivateLink Connection

  • Capella Operational
  • how-to
    +
    Add an AWS PrivateLink connection that peers your Amazon Web Service (AWS) network with a Capella cluster using AWS as its cloud provider. This connection can reduce latency and egress costs for applications hosted in the same region.
    AWS PrivateLink connections do not support cross data center replication (XDCR) or Prometheus metrics. If you require XDCR or Prometheus metrics, use VPC Peering.

    Prerequisites

    To use AWS PrivateLink with Capella, you need:

    • A project in your organization.

      For more information about projects in Capella, see Projects Overview.

    • The Project Owner role assigned to your user account.

    • A cluster in your project with:

      • AWS as its cloud provider.

      • The Developer Pro or Enterprise plan.

      For more information about how to create a cluster, see Create A Paid Cluster.

    • Information about your AWS network, including:

      • The AWS VPC ID.

      • The AWS Subnet ID of each of the subnets.

    • The AWS Command Line Interface (CLI) installed and configured.

    • Access to the AWS VPC console.

    Procedure

    To add an AWS PrivateLink connection, open the Capella UI, the AWS command line interface, and the AWS VPC console.

    1. In Capella, enable Private Endpoints:

      Enabling Private Endpoints bills your account hourly for AWS PrivateLink until you turn off this option.
      1. View the cluster where you want to add an AWS PrivateLink connection.

      2. Select the Settings tab.

      3. In the navigation pane, under the Networking section, select Private Endpoints.

      4. Click Enable Private Endpoints.

        It can take several minutes for Capella to enable private endpoints. When private endpoints are available, the page shows all the controls you need to manage private endpoints in Capella.

    2. Click Add Private Endpoint.

    3. In the Provide Private Endpoint Details section, add the following information:

      Field Value

      VPC ID

      Enter your AWS VPC ID.

      Subnet IDs

      Enter each Subnet ID and separate them with a comma.

    4. Click Next.

    5. Download and run the shell script provided by Capella:

      1. In the Run the following script area, click Download Script.

      2. With AWS CLI installed and signed in, run the downloaded shell script in your terminal.

        This script contains the command to create the private endpoint in your chosen AWS VPC. When successful, the provisioning details output appears as follows:

        {
          "VpcEndpoint": {
            "VpcEndpointId": "vpce-06da68c605432752f",
            "VpcEndpointType": "Interface",
            "VpcId": "vpc-08bf9fdbf7174a563",
            "ServiceName": "com.amazonaws.vpce.us-west-2.vpce-svc-015986e75057cc4e6",
            "State": "pendingAcceptance",
            "RouteTableIds": [],
            "SubnetIds": [
              "subnet-05f92391c3bb6b0fd",
              "subnet-0b70e5c9e897f7ef0"
            ],
            "Groups": [
              {
                "GroupId": "sg-01505951c7752141d",
                "GroupName": "default"
              }
            ],
            "PrivateDnsEnabled": false,
            "RequesterManaged": false,
            "NetworkInterfaceIds": [
              "eni-08cb66b65644ac32e",
              "eni-0c824869e81a21fac"
            ],
            "DnsEntries": [
              {
                "DnsName": "vpce-06da68c605432752f-1zrggw92.vpce-svc-015986e75057cc4e6.us-west-2.vpce.amazonaws.com",
                "HostedZoneId": "Z1YSA3EXCYUU9Z"
              },
              {
                "DnsName": "vpce-06da68c605432752f-1zrggw92-us-west-2b.vpce-svc-015986e75057cc4e6.us-west-2.vpce.amazonaws.com",
                "HostedZoneId": "Z1YSA3EXCYUU9Z"
              },
              {
                "DnsName": "vpce-06da68c605432752f-1zrggw92-us-west-2a.vpce-svc-015986e75057cc4e6.us-west-2.vpce.amazonaws.com",
                "HostedZoneId": "Z1YSA3EXCYUU9Z"
              }
            ],
            "CreationTimestamp": "2022-11-15T18:50:45.062000+00:00",
            "OwnerId": "429712224361"
          }
        }
    6. In Capella, the new interface endpoint is now shown and has a Pending Acceptance status. Click its Accept button.

    7. In the AWS VPC console, enable private DNS names for the new endpoint:

      1. In the navigation pane, click Endpoints.

      2. With your endpoint selected, click Actions  Modify private DNS name.

      3. On the Modify private DNS name screen, select Enable for this endpoint:

        AWS VPC Modify private DNS name screen

      4. Click Save changes.

    8. In the AWS VPC console, edit your VPC settings:

      1. In the navigation pane, click Your VPCs.

      2. With your VPC selected, click Actions  Edit VPC settings.

      3. In the Edit VPC settings dialog, select Enable DNS resolution and Enable DNS hostnames:

        AWS VPC Enable VPC Settings
      4. Click Save.

    9. In the AWS VPC console, add an inbound rule for the private endpoint:

      1. With the Your VPCs page open, find and record the IPv4 CIDR value for your VPC. You need this for later steps. In this example, it’s 10.0.0.0/16:

        AWS VPC Dashboard

      2. In the navigation pane, click Endpoints.

      3. Select your endpoint.

      4. In the Security groups panel, click the Group ID link. This link is to your default VPC security group.

        AWS VPC Endpoints Display
      5. With the security group open to the Inbound rules panel, click Edit inbound rules.

        AWS Security Groups display
      6. In the Edit inbound rules dialog, add the VPC IPv4 CIDR you recorded earlier and use the following port ranges:

        • 18091-18203

        • 11207-11308

      7. Click Save rules.

    10. In the AWS VPC console, configure your network access control list (ACL) with an inbound rule:

      1. In the navigation pane, click Network ACLs.

      2. On the Network ACLs page, select the Network ACL associated with your VPC.

      3. Click Actions  Edit inbound rules.

      4. On the Edit inbound rules page, specify the following for a new inbound rule:

        Field Value

        Source

        Your VPC IPv4 CIDR.
        For example: 10.0.0.0/16

        Type

        All traffic

        Port range

        All

        Before selecting All traffic as an inbound rule, consult with your security team and confirm that your private link meets security standards.

        For any further questions or concerns, contact Couchbase Support.

      5. Click Save changes.

    11. In the AWS VPC console, configure your network ACL with an outbound rule:

      1. In the navigation pane, click Network ACLs.

      2. Select the Network ACL associated with your VPC.

      3. Click Actions  Edit outbound rules.

      4. On the Edit outbound rules page, specify the following for the new outbound rule:

        Field Value

        Type

        Custom TCP

        Port range

        1024-65535

        Destination

        Your VPC IPv4 CIDR.
        For example: 10.0.0.0/16

      5. Click Save Changes.

    Next Steps

    Verify the connection in Capella by opening the Private Endpoints page. The new private endpoint shows a Linked status when the connection is complete. This status change can take several minutes after completing the configuration procedure.