Skip to content

Commit a223553

Browse files
Adds new knwoledgebase article on ClickPipes privatelink.
1 parent 95490b0 commit a223553

File tree

4 files changed

+14389
-10079
lines changed

4 files changed

+14389
-10079
lines changed

.yarn/install-state.gz

1.37 MB
Binary file not shown.

.yarnrc.yml

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
nodeLinker: node-modules
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
Date: 2024-11-27
3+
---
4+
5+
# AWS PrivateLink setup to expose private RDS for ClickPipes
6+
7+
## Requirements
8+
The VPC must be located in one of our ClickPipes regions: us-east-1, us-east-2 or eu-central-1.
9+
(https://clickhouse.com/docs/en/integrations/clickpipes#list-of-static-ips)
10+
11+
The recommended approach for integrating RDS with ClickPipes is to utilize PrivateLink along with a Private Hosted Zone on the ClickPipes side. Once configured, all database connections initiated by ClickPipes will traverse through VPC endpoints, as the RDS instance's DNS names will resolve to the PrivateLink endpoint IP addresses. This setup requires the RDS instance to be accessible via unique DNS names. The DNS zone should be unique to avoid conflicts (e.g., myTestDB.123z8u.c2.rds.us-west-1.amazonaws.com).
12+
13+
## Private link creation
14+
Follow these steps to create a **VPC endpoint service** for your RDS instance. Repeat these steps if you have multiple instances that require endpoint services:
15+
1. Locate Your VPC and [Create an NLB](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/create-network-load-balancer.html)
16+
- Navigate to your target VPC and create a Network Load Balancer (NLB).
17+
2. Configure the Target Group
18+
- The target group should point to the RDS instance's endpoint.
19+
- Ensure that the TCP protocol is used to avoid TLS termination by the NLB.
20+
3. Set the Listener Port
21+
- The listener port of the load balancer must match the port used by the target group (typically 5432 for PostgreSQL or 3306 for MySQL).
22+
4. Ensure the Load Balancer is Private
23+
- Configure the NLB to be private, ensuring it is only accessible within the VPC.
24+
5. Create the VPC Endpoint Service
25+
- In the VPC, create an endpoint service that points to the NLB.
26+
- Enable acceptance of connection requests from specific accounts.
27+
6. Authorize ClickPipes to Use the Endpoint Service
28+
- Grant permission to the ClickPipes account to request this endpoint service.
29+
- Configure allowed principals by adding the following principal ID: `arn:aws:iam::072088201116:root`
30+
31+
## Initiating connection
32+
When it’s done, share details such as private DNS name, VPC service name and availability zone.
33+
ClickPipes team will initiate VPC endpoints creation in ClickPipes VPC. This will require [connection request acceptance](https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#accept-reject-connection-requests) on your side.
34+
35+
## Creating ClickPipes
36+
Use your RDS's private DNS endpoints to create your ClickPipes.

0 commit comments

Comments
 (0)