Skip to content

Commit d405282

Browse files
Loquacityjacobprallemizero
authored
Add note about VPC details (github#567)
* Add note about VPC details * Apply suggestions from code review Co-authored-by: emizero <[email protected]> Co-authored-by: Jacob Prall <[email protected]> * Apply suggestions from code review * Update mst/vpc-peering.md Co-authored-by: emizero <[email protected]> Co-authored-by: Jacob Prall <[email protected]> Co-authored-by: emizero <[email protected]>
1 parent 9847d2c commit d405282

File tree

1 file changed

+23
-18
lines changed

1 file changed

+23
-18
lines changed

mst/vpc-peering.md

Lines changed: 23 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,19 @@
11
# VPC peering
2-
3-
Virtual Private Cloud (VPC) peering is a method of connecting separate AWS or
4-
Google Cloud private networks to each other. It makes it possible for the virtual
5-
machines in the different VPC's to talk to each other directly without going
6-
through the public internet.
2+
Virtual Private Cloud (VPC) peering is a method of connecting separate
3+
Cloud private networks to each other. It makes it possible for the
4+
virtual machines in the different VPC's to talk to each other directly without
5+
going through the public internet. VPC peering is limited to VPCs that share the same Cloud provider.
76

87
VPC peering setup is a per project and per region setting. This means that all
98
services created and running utilize the same VPC peering connection. If needed,
109
you can have multiple projects that peer with different connections.
1110

1211
<highlight type="tip">
1312
Services are only accessible via your VPC's internal network, they are not
14-
accessible from the public internet TLS certificates for VPC peered services
15-
are signed by the Timescale project CA and cannot be validated against a public
16-
CA (Let's Encrypt) You can choose service-by-service whether you want to run on
17-
VPC peered network or on public internet.
13+
accessible from the public internet. TLS certificates for VPC peered services are
14+
signed by the Timescale project CA and cannot be validated against a public CA
15+
(Let's Encrypt). You can choose service-by-service whether you want to run on VPC
16+
peered network or on public internet.
1817
</highlight>
1918

2019
## Setting it up
@@ -26,21 +25,27 @@ in a VPC or not: The list of cloud providers and regions contains options like
2625
"Belgium - Google Cloud: Belgium" and "Belgium - Google Cloud: Belgium - Project
2726
VPC". Here selecting the former would create the service to non-VPC environment
2827
while the latter would place the service within the VPC. The same functionality
29-
is available with the "Migrate" feature, allowing moving a service to / from a VPC.
28+
is available with the "Migrate" feature, allowing moving a service to and from a
29+
VPC.
3030

3131
The IP Range should be chosen so that it doesn't overlap with any networks you
3232
wish to peer. For example, if your own networks use the 10.0.0.0/8 range,
3333
selecting 192.168.0.0/24 for your Timescale project VPC makes it possible to
3434
peer the networks.
3535

3636
Peering connections can be requested with the VPC request, or added later. Note
37-
however that the VPC is not accessible until at least one connection has been created.
37+
however that the VPC is not accessible until at least one connection has been
38+
created.
3839

3940
After the request has been submitted VPC peering will be automatically set up by
40-
Manage Service for TimescaleDB, and the status is updated in the web console's VPC view together
41-
with instructions for starting peering with our network. Note that you'll need
42-
to accept a VPC peering connection request (AWS) or create a corresponding
43-
peering from your project to Manage Service for TimescaleDB's (Google) before Manage Service for TimescaleDB's
44-
backend can notice the peering is ready and traffic can be routed through it.
45-
After setting up your side, the VPC peering will activate shortly on the Timescale
46-
Cloud console.
41+
Managed Service for TimescaleDB, and the status is updated in the web console's
42+
VPC view together with instructions for starting peering with our network. Note
43+
that you'll need to accept a VPC peering connection request (AWS) or create a
44+
corresponding peering from your project to Managed Service for TimescaleDB's
45+
(Google) before Managed Service for TimescaleDB's backend can notice the peering
46+
is ready and traffic can be routed through it. After setting up your side, the
47+
VPC peering will activate shortly on the Managed Service for TimescaleDB console.
48+
49+
When you have submitted a VPC peering request, you can find cloud-specific
50+
identification details for your VPC by hovering your mouse over the `pending
51+
peer` status message of the peering request. The details show in a popup dialog.

0 commit comments

Comments
 (0)