-
Notifications
You must be signed in to change notification settings - Fork 4
DOC-1678 DNS forwarding #425
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DOC-1678 DNS forwarding #425
Conversation
✅ Deploy Preview for rp-cloud ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
|
Important Review skippedAuto incremental reviews are disabled on this repository. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the 📝 WalkthroughWalkthroughAdds a new DNS resolution section for AWS PrivateLink and a new partial file modules/networking/partials/dns_resolution.adoc describing how PrivateLink affects DNS for cluster hostnames. Documents using cluster_domain and the Amazon-provided resolver address (the .2 address in the endpoint subnet), conditional forwarding and Route 53 inbound resolver setups for cross-VPC and on‑prem resolution, and examples/commands for enabling PrivateLink on new and existing clusters (including BIYOC-specific VPC notes). The new DNS section is included into configure-privatelink-in-cloud-ui.adoc before the existing "Enable endpoint service for existing clusters" section. Sequence Diagram(s)sequenceDiagram
autonumber
actor User as Client (outside endpoint subnet)
participant MainDNS as Main DNS (corp/VPC DNS)
participant Fwd as Conditional Forwarder (cluster_domain)
participant AWSR53 as Amazon-provided DNS (endpoint subnet .2)
participant PL as PrivateLink Endpoint -> Redpanda Cluster
Note over User,PL: DNS resolution with PrivateLink
User->>MainDNS: Resolve broker.seed.cluster_domain
alt forwarder exists
MainDNS->>Fwd: Forward query for cluster_domain
Fwd->>AWSR53: Query forwarded to Amazon resolver
AWSR53-->>Fwd: Return endpoint-specific IPs
Fwd-->>MainDNS: Response
MainDNS-->>User: Endpoint IPs
User->>PL: Connect to endpoint IPs
PL-->>User: Connection established
else no forwarder
MainDNS-->>User: Returns private broker IPs (non-routable)
User-xPL: Connection fails
end
Note right of Fwd: Configure conditional forward to AWS resolver (.2) for cluster_domain
sequenceDiagram
autonumber
actor OnPrem as On‑prem Client
participant OnPremDNS as On‑prem DNS
participant R53Inbound as Route 53 Inbound Resolver (endpoint VPC)
participant Assoc as VPC Associations / Forwarding Rules
participant PL as PrivateLink Endpoint -> Redpanda
Note over OnPrem,PL: Cross-network resolution via Route 53 inbound resolver
OnPrem->>OnPremDNS: Resolve *.cluster_domain
OnPremDNS->>R53Inbound: Forward per forwarding rule / peering
R53Inbound-->>OnPremDNS: Return endpoint-specific targets (.2 responses)
OnPremDNS-->>OnPrem: Targets returned
OnPrem->>PL: Connect to PrivateLink endpoint
PL-->>OnPrem: Connection established
Note right of Assoc: Associate forwarding rules with target VPCs or on‑prem networks
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes Suggested reviewers
Pre-merge checks and finishing touches❌ Failed checks (2 warnings)
✅ Passed checks (3 passed)
Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
Disabled knowledge base sources:
- Jira integration is disabled by default for public repositories
You can enable these sources in your CodeRabbit configuration.
📒 Files selected for processing (3)
modules/networking/pages/aws-privatelink.adoc(3 hunks)modules/networking/pages/configure-privatelink-in-cloud-ui.adoc(1 hunks)modules/networking/partials/dns_resolution.adoc(1 hunks)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (3)
- GitHub Check: Redirect rules - rp-cloud
- GitHub Check: Header rules - rp-cloud
- GitHub Check: Pages changed - rp-cloud
🔇 Additional comments (1)
modules/networking/pages/configure-privatelink-in-cloud-ui.adoc (1)
26-29: Nice placement for the shared DNS guidance.Dropping the reusable partial here keeps the UI guide in sync with the API doc without duplicating text.
✅ Actions performedReview triggered.
|
|
LGTM. Thank you. |
Description
This pull request adds doc about DNS resolution when using AWS PrivateLink with Redpanda Cloud clusters. The changes clarify how PrivateLink affects DNS behavior and provide step-by-step guidance for configuring DNS forwarding, ensuring reliable cluster connectivity.
DNS resolution with PrivateLink, to both the AWS PrivateLink and Cloud UI configuration guides, explaining how PrivateLink changes DNS behavior and the need to review DNS setup before connecting clients. [1] [2]dns_resolution.adoc, detailing how to identify your cluster domain, locate the Amazon-provided DNS resolver, and configure Route 53 forwarding rules for cross-VPC or on-premises access.Resolves https://redpandadata.atlassian.net/browse/DOC-1678
Review deadline:
Page previews
Configure AWS PrivateLink in the Cloud UI
Configure AWS PrivateLink with the Cloud API
Checks