Use Azure Private Networking with Tableflow in Confluent Cloud

You can use Tableflow on Confluent Cloud clusters that are deployed in Azure private networks, ensuring that no data is transmitted over the public internet.

You must use private networked storage when using Tableflow with a private networked cluster. For more information, see Azure Private Link Overview.

To use Tableflow with Azure Storage Accounts that are accessible only over Azure Private endpoints, you must use a Confluent Cloud outbound networking gateway and two access points. For more information, see Use Azure Egress Private Link Endpoints for Serverless Products.

Prerequisites

  • A Confluent Cloud environment, an Apache Kafka® cluster, a topic with data, and a schema associated with the topic

  • Organization/network admin permissions to manage networking and access points in Confluent Cloud

  • A Confluent Cloud provider integration

  • An Azure Storage Account in the same region as the Kafka cluster with hierarchical namespaces enabled, and a container in the storage account

  • Permissions to create and approve Private Endpoints for your Azure Storage Account

Step 1: Get the Azure Resource ID

  1. In the Azure portal, go to your service’s overview section, and click Json View.

  2. Copy the Resource ID. This is required when you create the Egress Private Link Endpoint in Confluent Cloud.

Step 4: Add a Service Principal to the Azure Storage Account

If you haven’t provided permissions to the service principal created through the Confluent Cloud provider integration, do this now in the Azure Portal.

  1. On your Azure Storage Account resource page, select Access Control (IAM).

  2. Click Add > Add role assignment.

  3. One at a time, add the Reader and Storage Blob Data Contributor roles to the service principal managed by Confluent Cloud, which has a name that resembles cspi-xxxx.

Step 5: Create the DNS record

  1. In the Cloud Console, confirm that both access points are in the Ready state. It may take a few minutes after the connection was approved in the Azure Portal.

  2. For the blob access point, click View all, copy the DNS domain, and click Close.

  3. Click Create record and paste the DNS domain into the Domain field for the access point.

    Screenshot of the DNS record creation page in Confluent Cloud
  4. Repeat the previous steps for the dfs access point.