Skip to main content

Create a Private Service Connect Endpoint

You can create a Private Service Connect (PSC) endpoint on Google Cloud Platform (GCP) to enable direct, secure connectivity between CelerData's VPC and your own VPC. If your cluster is deployed in a private subnet without internet access, you must configure the correct PSC endpoint for connectivity.

PSC endpoint is also required for enabling End-to-End Private Link for your cluster, which can secure all the traffic between your client and the CelerData Cloud service in addition to that between between your CelerData cluster and CelerData Cloud service. You can even disable the public access to CelerData cluster console to forbid any traffic directly from the public internet to your CelerData cluster console.

note

Before proceeding, make sure you have enabled necessary APIs for your project.

Ensure your cluster is not publicly accessible

For security reasons, your cluster should not be accessible over the public internet. To verify this, check your VPC routes to ensure there is no route with:

  • Destination IP range: 0.0.0.0/0
  • Next hop: Default internet gateway

If such a route exists, CelerData Cloud will create a public Network Load Balancer (NLB) for SQL query processing, making your cluster accessible from the public internet.

Follow these steps to check your VPC routes:

  1. Sign in to your project in the Google Cloud console.

  2. Expand the left-side navigation menu, and choose VPC Network > VPC networks.

  3. Click the VPC where your CelerData cluster will be deployed.

  4. On the Routes tab of the VPC network details page, select the region of your CelerData cluster in the Region drop-down list.

  5. Click View to see all routes in the selected VPC and region.

  6. Look for any route with:

    • Destination IP range: 0.0.0.0/0
    • Next hop: Default internet gateway

    Image

  7. If found, click the route name, review the details, and click DELETE.

  8. On the dialog box that appears, click DELETE.

Create a PSC Endpoint

To create a PSC endpoint, follow these steps:

  1. Sign in to your project in the Google Cloud console.

  2. Expand the left-side navigation menu, and choose Network Services > Private Service Connect.

  3. In the Endpoints section, click CONNECT ENDPOINT.

  4. On the Connect endpoint page, configure the following:

    Image

    • Target: Select Published service.
    • Target service: Enter the service attachment of your selected region as described in Appendix - GCP regions and service attachments.
    • Endpoint name: Enter a unique name for the endpoint.
    • Network: Select the VPC network for your cluster.
    • Subnetwork: Select the subnet for your cluster.
    • IP address: Click Create IP Address. On the dialog box that appears, enter a name for the IP address, click RESERVE to reserve a static internal IP for the endpoint. Then, select the IP address you created.
    • Namespace: Click Create Namespace. On the dialog box that appears, enter a Namespace name to create a namespace. Then, select the namespace you created.
    tip

    If you cannot find the Namespace field, you must enable the API for Namespace first.

  5. Click ADD ENDPOINT.

Wait until the endpoint is created. The Status should be Accepted.

Image

Click the newly created endpoint and copy the PSC connection ID. You will need this in STEP3 of the Deployment Wizard.

Image

Verify Service Directory and Cloud DNS

After creating a PSC endpoint, GCP automatically generates a Service Directory entry and a Cloud DNS zone. Verify them to ensure proper configuration.

Check the Service Directory

  1. Sign in to your project in the Google Cloud console.
  2. Expand the left-side navigation menu, and choose Network Services > Service Directory.
  3. Find the service name which has the same name as your PSC endpoint and click it to view details.
  4. Ensure the Self link is correct.

Image

Check the Cloud DNS Record

  1. Sign in to your project in the Google Cloud console.
  2. Expand the left-side navigation menu, and choose Network Services > Cloud DNS.
  3. Find the DNS zone with DNS name as {region}.p.celerdata.com.

Image

For example, if your cluster is to be deployed in us-central1, the DNS name will be us-central1.p.celerdata.com.

If you use the End-to-End Private Link solution for secure traffic, all VM instances in the deployment subnet must have a DNS record with {endpoint_name}.{region}.p.celerdata.com domain resolved to the PSC endpoint's private IP. This ensures that all traffic accessing {endpoint_name}.{region}.p.celerdata.com in the subnet will be directed to the PSC endpoint. Otherwise, you will not be able to access the CelerData cluster console.

Additional Considerations

Enable Private Access to Google Cloud Storage

After creating a PSC endpoint, your cluster may lose access to Google Cloud Storage which is required for cluster deployment and operation. Follow the instructions provided in Configure Network for Private Access to enable the private access.

In most scenarios, if you have created a PSC Endpoint for deploying your CelerData cluster, you can further enable End-to-End Private Link for a better secure solution. With the private link, you can restrict all traffic between your CelerData cluster and CelerData console over Private Service Connect.

In this case, you need to unselect Enable public access to the Cluster console in STEP3 of Deployment Wizard or disable it after deployment on the Security tab in the cluster detail page. You also need to create a DNS record to resolve the private link domain. See Configure Network for Private Link for detailed instructions.

Appendix

GCP regions and service attachments

GCP regionRegion IDService attachment
US Central (Iowa)us-central1projects/celerdata-byoc-1683716900563/regions/us-central1/serviceAttachments/us-central1-privatelink