Manage Private Networking for Cluster Linking on Confluent Cloud

The following sections describe supported cluster combinations, commands, configurations, use cases, and walkthroughs for private networking on Confluent Cloud.

Supported cluster combinations

Cluster Linking is fundamentally a networking feature: it copies data over the network. As such, Cluster Linking requires that at least one of the clusters involved has connectivity to the other cluster. Therefore, the networking situation of each cluster determines whether the two clusters can be linked, and whether the destination cluster or the source cluster must initiate the connection. By default, the destination cluster will initiate the connection. A special mode called “source-initiated links” allows the source cluster to initiate the connection of the cluster link.

Quick view of supported and non-supported scenarios for cross-cloud and cross-organization

The matrices of supported and non-supported cluster combinations that follow are a bit complex. To simplify at a high level first, keep in mind these more generalized, shorthand tips.

The following cluster combinations are supported for cross-organization and cross-cloud scenarios; that is, clusters can be in different Confluent Cloud organizations and cloud providers:

  • “Public to Public” using destination-initiated, source-initiated, or bidirectional links is supported across organizations and cloud providers.
  • “Public to Private” using destination-initiated, source-initiated, or bidirectional links is supported across organizations and cloud providers.
  • “Private to Public” using source-initiated or bidirectional links is supported across organizations and cloud providers. (This is not supported with destination-initiated links.)

Conversely, the following combinations are not supported for cross-organzation or cross-cloud scenarios:

  • Private to Private clusters are not supported; that is, for any Cluster Linking scenario where both clusters use private networking, both clusters must be in the same Confluent Cloud organization and on the same cloud provider.
  • “Private to Public” with destination-initiated links is not supported across organizations or cloud providers. For this scenario, clusters must be in the same organization and on the same cloud provider.

Next, review the following tables, which show in full detail which networking combinations are possible, and whether a source-initiated link is required.

Tip

When using the Confluent Cloud Console to create cluster links, only linkable clusters are shown in the drop-down options. Clusters that cannot be linked are filtered out.

Confluent Cloud source and destination clusters

Source cluster Destination cluster Possible? Notes
Confluent Cloud - Basic or Standard cluster, or a Dedicated cluster with secure public endpoints [1] Confluent Cloud - Any Dedicated cluster cluster with secure public endpoints Yes
  • Source and destination clusters can be on the same or different cloud providers
  • Source and destination clusters can be on the same or different Confluent Cloud Organization
Confluent Cloud - Public Dedicated cluster on any supported cloud provider Confluent Cloud - Public Dedicated cluster on any supported cloud provider Yes
  • Source and destination clusters can be on the same or different cloud providers
  • Source and destination clusters can be on the same or different Confluent Cloud Organization
Confluent Cloud - Dedicated cluster with AWS PrivateLink Confluent Cloud - Dedicated cluster with AWS PrivateLink Yes
  • Requires Network and Link Endpoint as shown here
  • Clusters must be in the same Confluent Cloud Organization and cloud provider
Confluent Cloud - Dedicated cluster with private networking on Azure [2] Confluent Cloud - Dedicated cluster with private networking on Azure Yes
Confluent Cloud - Dedicated cluster with private networking on Google Cloud Confluent Cloud - Dedicated cluster with private networking on Google Cloud No
  • Clusters must be in the same Confluent Cloud Organization and cloud provider
Confluent Cloud - Dedicated cluster with AWS Transit Gateway networking [3] Confluent Cloud - Dedicated cluster with AWS Transit Gateway networking Yes
Confluent Cloud - Dedicated cluster with private networking Confluent Cloud - Dedicated cluster with public networking Yes
  • Must use a source-initiated link as described in Private to public Cluster Linking
  • Not available to create in Confluent Cloud Console
  • Source and destination clusters can be on the same or different Confluent Cloud Organization
Confluent Cloud - Non-Dedicated cluster Confluent Cloud - Non-Dedicated cluster No
  • Cluster Linking across non-Dedicated clusters is currently not supported
Confluent Cloud - Cluster with private networking on different cloud provider than destination Confluent Cloud - Cluster with private networking on different cloud provider than source No
  • Cross cloud Cluster Linking with private networking is currently not supported. For Cluster Linking with private networking, source and destination clusters must use the same cloud provider and be in the same Confluent Cloud organization
[1]Basic, Standard, and Dedicated cluster types are described in Supported cluster types.
[2]Currently available in a subset of Azure regions only: centralus, southcentralus, eastus, eastus2, westus2, westus3, westeurope, northeurope, southeastasia, canadacentral, centralindia, brazilsouth.
[3]Dedicated clusters with Transit Gateway networking is currently only available on AWS.
[4]Classless Inter-Domain Routing (CIDR) is explained in the AWS documentation.

Note

To learn more about all available Confluent Cloud cluster types, see Kafka Cluster Types in Confluent Cloud. The above table shows supported cluster types for this particular Cluster Linking scenario (private networking). For a more general overview of supported cluster types for Cluster Linking, see Supported cluster types.

Confluent Platform and Confluent Cloud

Source cluster Destination cluster Possible? Notes
Confluent Platform 7.1.0 or later Confluent Cloud - Any Dedicated cluster Yes
  • Must use a source-initiated link
  • Source Confluent Platform cluster must have connectivity to the destination cluster
  • Brokers must be Confluent Server
Confluent Platform 5.4+ with public endpoints on all brokers Confluent Cloud - Any Dedicated cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Confluent Platform 5.4+ without public endpoints Confluent Cloud - A Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Confluent Cloud cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster
Confluent Cloud - A Basic or Standard cluster, or a Dedicated cluster with secure public endpoints Confluent Platform 7.0.0 or later Yes  
Confluent Cloud - A cluster with private networking Confluent Platform 7.0.0 or later Yes
  • Destination Confluent Platform cluster must have connectivity to the source Confluent Cloud cluster

Confluent Cloud and Apache Kafka®

Source cluster Destination cluster Possible? Notes
Kafka 2.4 or later with public endpoints on all brokers Confluent Cloud - Any Dedicated cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Kafka 2.4 or later without public endpoints Confluent Cloud - A Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Kafka cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster

Diagrams of Supported Combinations for Private Networking

Confluent Cloud to Confluent Cloud

../../_images/cluster-link-private-net-cloud-to-cloud.png

Confluent Cloud to Confluent Platform/Apache Kafka®

../../_images/cluster-link-private-net-cloud-to-cp-kafka.png

Confluent Cloud billing considerations

There are cost differences associated with private vs. public networking. These are detailed under Cluster Linking in the Billing documentation. Examples are provided there for public networking.

Here is further detail specifically related to the private-public-private pattern outlined for Cluster Linking.

Private-Public-Private pattern cost considerations and security

When adding the jump cluster architecture to an existing Origin and Target cluster, new Confluent Cloud cost will be introduced by:

  • The Jump cluster (an hourly cost)
  • The two cluster links: one from origin to Jump, and one from Jump to Target (an hourly cost)
  • The data throughput (ClusterLinkRead and ClusterLinkWrite charged twice), once on each cluster link (a per GB cost).

How to keep costs as low as possible and maintain security

Consider these suggestions and recommendations for keeping costs as low as possible while still achieving the desired level of security on the cluster links.

Use a single zone for the jump cluster

Using a “single zone” cluster for the Jump cluster will reduce the hourly cost of the jump cluster, if the replication use case can tolerate the “single zone” service level agreement (SLA). Here are points to consider for this strategy:

  • “Multi-zone” clusters are always recommended for clusters that run “production” traffic–which the Origin and Target clusters likely do–as they come with a higher SLA. However, the “single zone” Jump cluster’s SLA may be sufficient if the use case is data sharing, data aggregation, or even disaster recovery.
  • If there is a disruption in the availability zone used by a “single zone” jump cluster, it will only impact the replication flow from Origin to Target. Producers and consumers on both Origin and Target clusters will be unaffected. When the disruption ends, if the Jump cluster returns to healthy status, the cluster links will automatically resume and catch the Target cluster up with any data that it missed.
  • For a Data Sharing or Data Aggregation architecture, replication is used to send a copy of data from the Origin to the Target, so the Target’s consumers can read the data. An outage of the availability zone of a single zone Jump cluster would stop the cluster links from replicating new data to the Target cluster. During this time, the Target’s consumers can still read any data that was already replicated to the Target. When the outage is over, if the Jump cluster recovers in good health, the Target’s replicated topics will automatically catch up and the consumers will be able to read data. Topics on the Target cluster that do not use replication will be unaffected. Therefore, the only effect of an availability zone outage on a single zone Jump cluster is a delay in some replicated data. A multi-zone Jump cluster would avoid this case, but for an added cost.
  • For a Disaster Recovery (DR) architecture, replication is used to keep topics on the Target cluster up-to-date and ready for failover, should an outage hit the Origin cluster. If the availability zone of a single zone Jump cluster has an outage, this would temporarily halt replication, thereby increasing the RPO at the moment. Hypothetically, if some time after this outage began and before it resolved, the Origin cluster’s region (a different cloud region from the Jump cluster) also experienced an outage, then its applications would fail over to the Target cluster without access to recent data produced since the Jump cluster’s zone outage. The net effect is that, in this corner case, a multi-zone Jump cluster would yield a lower RPO than a single zone jump cluster, for an added cost. However, as of this writing, there are no documented cases of a cloud provider experiencing a regional outage and an availability zone outage in a different region at the same time. Because this hypothetical corner case is exceedingly rare, most enterprise companies require disaster recovery for only a single cloud region outage at a time, and therefore would be served by a single zone Jump cluster.

Next steps

Try Confluent Cloud on AWS Marketplace with $1000 of free usage for 30 days, and pay as you go. No credit card is required.