Egress PrivateLink Endpoints Setup Guide: Self-Managed Services on Azure for Confluent Cloud¶
This topic presents the steps for setting up Egress PrivateLink Endpoints for self-managed services on Azure and Confluent Cloud to enable fully managed connectors in Confluent Cloud using Azure Private Link.
Step 1. Create a gateway in Confluent Cloud (for Enterprise cluster only)¶
If using an Enterprise cluster in Confluent Cloud, you must set up a gateway in Confluent Cloud as described in Create a gateway for outbound connectivity in Confluent Cloud.
Step 2: Create a load balancer¶
In the Azure portal, browse to Virtual machines (VM), and select the applicable VM.
Browse to Networking → Load balancing.
If there’s an existing load balancer available that you’d like to use, skip to the Step 3 section.
To create a new load balancer, click Add load balancing → Create New → Load Balancer.
Specify the settings for the new load balancer.
- Load balancer name
- Type: Internal
- Protocol: TCP
- Load balancer rule
- Port: The port for the external endpoint
- Backend port: The port used to route traffic to VM
Click Create.
Wait for the load balancer to be successfully created and added. You can check your Azure notifications for status.
Step 3. Create a Private Link service¶
- In the Azure portal, browse to Private Link Center → Private link services.
- Click Create.
- Specify the Basic settings for the new private link service.
- Project details: Select the applicable subscription and resource group.
- Instance details: Provide the name and associated region of the load balancer and the VM.
- Click Next: Outbound settings.
- Specify the Outbound settings for the new private link service.
- Load balancer: Select the previously created load balancer.
- Load balancer fronted IP address: Select the associated IP address of the load balancer.
- Source NAT subnet: Select the subnet that can route to the load balancer.
- All other settings can be left as default.
- Click Next: Access security.
- You can leave the Access security settings as default, or you can select the proper level of security required.
- Click Next: Tags
- Add any required tags to the private link service.
- Click Next: Review + create
- Review that all details are correct
- Click Create.
- Wait for the deployment to be completed.
Step 4. Retrieve the Resource ID¶
Once deployment is complete, click Go to Resource.
Click JSON View.
Copy the Resource ID which is required when you create the Egress Private Link Endpoint in Confluent Cloud.
Step 5. Create an Egress PrivateLink Endpoint¶
In the Network Management tab of the desired Confluent Cloud environment, click the Confluent Cloud network you want to add the Private Link Endpoint to. The Connection Type of the network needs to be “Private Link Access”.
Click Create endpoint in the Egress connections tab.
Click the service you want to connect to. Select Other if you do not see the specific service.
Follow the guided steps to specify the field values, including:
Name: The name of the Private Link Endpoint.
Resource ID: The resource ID of the Private Link service.
The Resource ID is the one noted down above, in the last step of the Step 4 section.
Note that the resource alias is not supported.
Sub-resource name: The sub-resource name for the specific Azure service.
The applicable sub-resource name can be retrieved in Azure Private-link resource.
Click Create to create the Private Link Endpoint.
If there are additional steps for the specific target service, follow the prompt to complete the tasks, and then click Finish.
Step 6. Accept the endpoint connection request¶
In the Azure portal, When the Private Link Endpoint status becomes “Pending Accept”, go to the Private Kink service you previously created → Settings → Private endpoint connections.
Select the pending connection and click Approve.
You can check that this is the connection request by Confluent by looking at the description column which will provide the associated Confluent Cloud gateway and environment ID.
Go back to Confluent Cloud and wait until the Private Link Endpoint status transitions from “Pending accept” to “Ready”.
Step 7. (Optional) Create the DNS record¶
- When the Private Link Endpoint status transitions to “Ready”, click Create DNS record in the DNS tab, or click Create Record on the associated Private Link Endpoint tile.
- Specify the following:
- Egress Private Link Endpoint: The Egress PrivateLink Endpoint you created in the Step 5 section.
- Domain: The associated service endpoint.
Step 8. Create the Connector¶
- When the DNS Record status transitions to “Ready”, you can create the connector.
- For the steps to create the connector, refer to the connector-specific documentation that is listed for your specific connector in Supported connectors.