Manage Private Networking for Cluster Linking on Confluent Cloud

The following sections describe supported cluster combinations, commands, configurations, use cases, and walkthroughs for private networking on Confluent Cloud.

Supported cluster combinations

Cluster Linking is fundamentally a networking feature: it copies data over the network. As such, Cluster Linking requires that at least one of the clusters involved has connectivity to the other cluster. Therefore, the networking situation of each cluster determines whether the two clusters can be linked, and whether the destination cluster or the source cluster must initiate the connection. By default, the destination cluster will initiate the connection. A special mode called “source-initiated links” allows the source cluster to initiate the connection of the cluster link.

The following tables show which networking combinations are possible, and whether a source-initiated link is required.

Tip

When using the Confluent Cloud Console to create cluster links, only linkable clusters are shown in the drop-down options. Clusters that cannot be linked are filtered out.

Confluent Cloud source and destination clusters

Source cluster Destination cluster Possible? Notes
Confluent Cloud - Basic or Standard cluster, or a Dedicated [1] cluster with secure public endpoints Confluent Cloud - Any Dedicated cluster Yes  
Confluent Cloud - Dedicated Cluster with AWS PrivateLink Confluent Cloud - Dedicated cluster with AWS PrivateLink Yes
  • Requires Network and Link Endpoint as shown here
  • Clusters must be in the same Confluent Cloud Organization
Confluent Cloud - Cluster with private networking Confluent Cloud - Dedicated cluster in the same Confluent Cloud network Yes  
Confluent Cloud - Dedicated cluster with Transit Gateway networking Confluent Cloud - Dedicated cluster with Transit Gateway networking Yes
Confluent Cloud - Cluster with private networking Confluent Cloud - Cluster with private networking Only the cases noted above
Confluent Cloud - Cluster with private networking Confluent Cloud - Dedicated cluster with public networking Yes
[1]Basic, Standard, and Dedicated cluster types are described in Supported cluster types.
[2]Preview scenarios are for testing and evaluation purposes or to give feedback to Confluent. They are not suitable for production use cases and do not fall into any Confluent Support SLAs.
[3]Classless Inter-Domain Routing (CIDR) is explained in the AWS documentation.

Note

To learn more about all available Confluent Cloud cluster types, see Kafka Cluster Types in Confluent Cloud. The above table shows supported cluster types for this particular Cluster Linking scenario (private networking). For a more general overview of supported cluster types for Cluster Linking, see Supported cluster types.

Confluent Platform and Confluent Cloud

Source cluster Destination cluster Possible? Notes
Confluent Platform 7.1.0 or later Confluent Cloud - Any Dedicated cluster Yes
  • Must use a source-initiated link
  • Source Confluent Platform cluster must have connectivity to the destination cluster
  • Brokers must be Confluent Server
Confluent Platform 5.4+ with public endpoints on all brokers Confluent Cloud - Any Dedicated cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Confluent Platform 5.4+ without public endpoints Confluent Cloud - A Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Confluent Cloud cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster
Confluent Cloud - A Basic or Standard cluster, or a Dedicated cluster with secure public endpoints Confluent Platform 7.0.0 or later Yes  
Confluent Cloud - A cluster with private networking Confluent Platform 7.0.0 or later Yes
  • Destination Confluent Platform cluster must have connectivity to the source Confluent Cloud cluster

Confluent Cloud and Apache Kafka®

Source cluster Destination cluster Possible? Notes
Kafka 2.4 or later with public endpoints on all brokers Confluent Cloud - Any Dedicated cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Kafka 2.4 or later without public endpoints Confluent Cloud - A Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Kafka cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster

Diagrams of Supported Combinations for Private Networking

Confluent Cloud to Confluent Cloud

../../_images/cluster-link-private-net-cloud-to-cloud.png

Confluent Cloud to Confluent Platform/Apache Kafka®

../../_images/cluster-link-private-net-cloud-to-cp-kafka.png

Confluent Cloud billing considerations

There are cost differences associated with private vs. public networking. These are detailed under Cluster Linking in the Billing documentation. Examples are provided there for public networking.

Here is further detail specifically related to the private-public-private pattern outlined for Cluster Linking.

Private-Public-Private pattern cost considerations and security

When adding the jump cluster architecture to an existing Origin and Target cluster, new Confluent Cloud cost will be introduced by:

  • The Jump cluster (an hourly cost)
  • The two cluster links: one from origin to Jump, and one from Jump to Target (an hourly cost)
  • The data throughput (ClusterLinkRead and ClusterLinkWrite charged twice), once on each cluster link (a per GB cost).

How to keep costs as low as possible and maintain security

Consider these suggestions and recommendations for keeping costs as low as possible while still achieving the desired level of security on the cluster links.

Use a single zone for the jump cluster

Using a “single zone” cluster for the Jump cluster will reduce the hourly cost of the jump cluster, if the replication use case can tolerate the “single zone” service level agreement (SLA). Here are points to consider for this strategy:

  • “Multi-zone” clusters are always recommended for clusters that run “production” traffic–which the Origin and Target clusters likely do–as they come with a higher SLA. However, the “single zone” Jump cluster’s SLA may be sufficient if the use case is data sharing, data aggregation, or even disaster recovery.
  • If there is a disruption in the availability zone used by a “single zone” jump cluster, it will only impact the replication flow from Origin to Target. Producers and consumers on both Origin and Target clusters will be unaffected. When the disruption ends, if the Jump cluster returns to healthy status, the cluster links will automatically resume and catch the Target cluster up with any data that it missed.
  • For a Data Sharing or Data Aggregation architecture, replication is used to send a copy of data from the Origin to the Target, so the Target’s consumers can read the data. An outage of the availability zone of a single zone Jump cluster would stop the cluster links from replicating new data to the Target cluster. During this time, the Target’s consumers can still read any data that was already replicated to the Target. When the outage is over, if the Jump cluster recovers in good health, the Target’s replicated topics will automatically catch up and the consumers will be able to read data. Topics on the Target cluster that do not use replication will be unaffected. Therefore, the only effect of an availability zone outage on a single zone Jump cluster is a delay in some replicated data. A multi-zone Jump cluster would avoid this case, but for an added cost.
  • For a Disaster Recovery (DR) architecture, replication is used to keep topics on the Target cluster up-to-date and ready for failover, should an outage hit the Origin cluster. If the availability zone of a single zone Jump cluster has an outage, this would temporarily halt replication, thereby increasing the RPO at the moment. Hypothetically, if some time after this outage began and before it resolved, the Origin cluster’s region (a different cloud region from the Jump cluster) also experienced an outage, then its applications would fail over to the Target cluster without access to recent data produced since the Jump cluster’s zone outage. The net effect is that, in this corner case, a multi-zone Jump cluster would yield a lower RPO than a single zone jump cluster, for an added cost. However, as of this writing, there are no documented cases of a cloud provider experiencing a regional outage and an availability zone outage in a different region at the same time. Because this hypothetical corner case is exceedingly rare, most enterprise companies require disaster recovery for only a single cloud region outage at a time, and therefore would be served by a single zone Jump cluster.

Next steps

Try Confluent Cloud on AWS Marketplace with $1000 of free usage for 30 days, and pay as you go. No credit card is required.