Manage Private Networking for Cluster Linking on Confluent Cloud

The following sections describe supported cluster combinations, commands, configurations, use cases, and walkthroughs for private networking on Confluent Cloud.

Note

Cross-cloud Cluster Linking across clouds on privately networked clusters is in Limited Availability.

Supported cluster combinations

Cluster Linking is fundamentally a networking feature: it copies data over the network. As such, Cluster Linking requires that at least one of the clusters involved has connectivity to the other cluster. Therefore, the networking situation of each cluster determines whether the two clusters can be linked, and whether the destination cluster or the source cluster must initiate the connection. By default, the destination cluster will initiate the connection. A special mode called “source-initiated links” allows the source cluster to initiate the connection of the cluster link.

Tip

When using the Confluent Cloud Console to create cluster links, only linkable clusters are shown in the drop-down options. Clusters that cannot be linked are filtered out.

Confluent Cloud source and destination clusters

Source cluster Destination cluster Possible? Notes
Confluent Cloud - Basic, Standard, or Dedicated with secure public endpoints [1] Confluent Cloud - Any Dedicated cluster with secure public endpoints Yes
  • Source and destination clusters can be on the same or different cloud providers
  • Source and destination clusters can be on the same or different Confluent Cloud Organization
Confluent Cloud - Public Dedicated cluster on any supported cloud provider Confluent Cloud - Public Dedicated cluster on any supported cloud provider Yes
  • Source and destination clusters can be on the same or different cloud providers
  • Source and destination clusters can be on the same or different Confluent Cloud Organization
Confluent Cloud - Public Dedicated cluster on any supported cloud provider Confluent Cloud - Private Dedicated cluster on any supported cloud provider Yes
  • Using destination-initiated, source-initiated, or bidirectional links
  • Source and destination clusters can be on the same or different Confluent Cloud Organization
Confluent Cloud - Enterprise cluster with AWS or Azure private networking [2] [3] Confluent Cloud - Enterprise cluster with AWS or Azure private networking Yes
  • Clusters must be in the same Confluent Cloud Organization
Confluent Cloud - Enterprise cluster with AWS or Azure private networking Confluent Cloud - Dedicated cluster with AWS or Azure private networking Yes
  • Clusters must be in the same Confluent Cloud Organization
Confluent Cloud - Dedicated cluster with AWS or Azure private networking Confluent Cloud - Enterprise cluster with AWS or Azure private networking Yes
  • Clusters must be in the same Confluent Cloud Organization
Confluent Cloud - Dedicated cluster with AWS or Azure private networking Confluent Cloud - Dedicated cluster with AWS or Azure private networking Yes
  • Clusters must be in the same Confluent Cloud Organization
Confluent Cloud - Dedicated cluster with private networking on Google Cloud Confluent Cloud - Dedicated cluster with private networking on Google Cloud No  
Confluent Cloud - Dedicated cluster with AWS Transit Gateway networking [5] Confluent Cloud - Dedicated cluster with AWS Transit Gateway networking Yes
Confluent Cloud - Dedicated cluster with private networking Confluent Cloud - Dedicated cluster with public networking Yes
  • Must use a source-initiated link as described in Private to public Cluster Linking
  • Not available to create in Confluent Cloud Console
  • Source and destination clusters can be on the same or different Confluent Cloud Organization
Confluent Cloud - Basic or Standard cluster Confluent Cloud - Basic or Standard cluster No
  • Cluster Linking across Basic and Standard clusters is currently not supported
Confluent Cloud - Google Cloud cluster with private networking on different cloud provider than destination Confluent Cloud - Google Cloud cluster with private networking on different cloud provider than source No
  • Cross cloud Cluster Linking with private networking is currently not supported on Google Cloud. So, Google Cloud-AWS and Google Cloud-Azure private networking does not work, regardless of which is the source or or destination.
[1]Basic, Standard, Dedicated, and Enterprise cluster types are described in Supported cluster types. Bidirectional links on Enterprise clusters do not work when both clusters are in the same region. (That said, bidirectional links are for disaster recovery, so should not be used within same region per a DR strategy.)
[2]Currently available in a subset of Azure regions only: centralus, southcentralus, eastus, eastus2, westus2, westus3, westeurope, northeurope, southeastasia, canadacentral, centralindia, brazilsouth.
[3]Currently available in these AWS regions only: eu-central-1, eu-west-1, eu-west-2, us-east-1, us-east-2, us-west-2, ap-south-1, ap-southeast-1, ap-southeast-2, sa-east-1.
[4]Dedicated clusters with Transit Gateway networking is currently only available on AWS.
[5]Classless Inter-Domain Routing (CIDR) is explained in the AWS documentation.

Note

To learn more about all available Confluent Cloud cluster types, see Kafka Cluster Types in Confluent Cloud. The above table shows supported cluster types for this particular Cluster Linking scenario (private networking). For a more general overview of supported cluster types for Cluster Linking, see Supported cluster types.

Confluent Platform and Confluent Cloud

Source cluster Destination cluster Possible? Notes
Confluent Platform 7.1.0 or later Confluent Cloud - Any Dedicated or Enterprise cluster Yes
  • Must use a source-initiated link
  • Source Confluent Platform cluster must have connectivity to the destination cluster
  • Brokers must be Confluent Server
Confluent Platform 5.4+ with public endpoints on all brokers Confluent Cloud - Any Dedicated or Enterprise cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Confluent Platform 5.4+ without public endpoints Confluent Cloud - An Enterprise cluster, or Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Confluent Cloud cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster
Confluent Cloud - A Basic or Standard cluster, or a Dedicated cluster with secure public endpoints Confluent Platform 7.0.0 or later Yes  
Confluent Cloud - A cluster with private networking Confluent Platform 7.0.0 or later Yes
  • Destination Confluent Platform cluster must have connectivity to the source Confluent Cloud cluster

Confluent Cloud and Apache Kafka®

Source cluster Destination cluster Possible? Notes
Kafka 2.4 or later with public endpoints on all brokers Confluent Cloud - Any Dedicated or Enterprise cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Kafka 2.4 or later without public endpoints Confluent Cloud - An Enterprise cluster, or Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Kafka cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster

Limitations and Summary

The matrices of supported and non-supported cluster combinations above are a bit complex. To simplify at a high level, keep in mind these more generalized, shorthand tips.

The following cluster combinations are supported for cross-cloud scenarios; that is, clusters can be in different cloud providers:

  • Any public cluster can connect to private networking.
  • “Public to Public” using destination-initiated, source-initiated, or bidirectional links is supported across organizations and cloud providers.
  • “Public to Private” using destination-initiated, source-initiated, or bidirectional links is supported across organizations and cloud providers.
  • “Private to Public” using source-initiated or bidirectional links is supported across organizations and cloud providers. (This is not supported with destination-initiated links.)
  • “Private to Private” clusters across cloud providers Azure and AWS are supported. It is not supported across organizations.

Conversely, the following combinations are not supported for cross-cloud scenarios:

  • “Private to Public” with destination-initiated links is not supported across organizations or cloud providers. This is only supported with source-initiated links.
  • Google Cloud private networking scenarios are not supported on cross-cloud scenarios. If you use a Google Cloud cluster for private networking, the other (linked) cluster must also be on Google Cloud.

Diagrams of supported combinations for private networking

Confluent Cloud to Confluent Cloud

../../_images/cluster-link-private-net-cloud-to-cloud.png

Confluent Cloud to Confluent Platform/Apache Kafka®

../../_images/cluster-link-private-net-cloud-to-cp-kafka.png

Confluent Cloud billing considerations

There are cost differences associated with private vs. public networking. These are detailed under Cluster Linking in the Billing documentation. Examples are provided there for public networking.

Here is further detail specifically related to the private-public-private pattern outlined for Cluster Linking.

Private-Public-Private pattern cost considerations and security

When adding the jump cluster architecture to an existing Origin and Target cluster, new Confluent Cloud cost will be introduced by:

  • The Jump cluster (an hourly cost)
  • The two cluster links: one from origin to Jump, and one from Jump to Target (an hourly cost)
  • The data throughput (ClusterLinkRead and ClusterLinkWrite charged twice), once on each cluster link (a per GB cost).

How to keep costs as low as possible and maintain security

Consider these suggestions and recommendations for keeping costs as low as possible while still achieving the desired level of security on the cluster links.

Use a single zone for the jump cluster

Using a “single zone” cluster for the Jump cluster will reduce the hourly cost of the jump cluster, if the replication use case can tolerate the “single zone” service level agreement (SLA). Here are points to consider for this strategy:

  • “Multi-zone” clusters are always recommended for clusters that run “production” traffic–which the Origin and Target clusters likely do–as they come with a higher SLA. However, the “single zone” Jump cluster’s SLA may be sufficient if the use case is data sharing, data aggregation, or even disaster recovery.
  • If there is a disruption in the availability zone used by a “single zone” jump cluster, it will only impact the replication flow from Origin to Target. Producers and consumers on both Origin and Target clusters will be unaffected. When the disruption ends, if the Jump cluster returns to healthy status, the cluster links will automatically resume and catch the Target cluster up with any data that it missed.
  • For a Data Sharing or Data Aggregation architecture, replication is used to send a copy of data from the Origin to the Target, so the Target’s consumers can read the data. An outage of the availability zone of a single zone Jump cluster would stop the cluster links from replicating new data to the Target cluster. During this time, the Target’s consumers can still read any data that was already replicated to the Target. When the outage is over, if the Jump cluster recovers in good health, the Target’s replicated topics will automatically catch up and the consumers will be able to read data. Topics on the Target cluster that do not use replication will be unaffected. Therefore, the only effect of an availability zone outage on a single zone Jump cluster is a delay in some replicated data. A multi-zone Jump cluster would avoid this case, but for an added cost.
  • For a Disaster Recovery (DR) architecture, replication is used to keep topics on the Target cluster up-to-date and ready for failover, should an outage hit the Origin cluster. If the availability zone of a single zone Jump cluster has an outage, this would temporarily halt replication, thereby increasing the RPO at the moment. Hypothetically, if some time after this outage began and before it resolved, the Origin cluster’s region (a different cloud region from the Jump cluster) also experienced an outage, then its applications would fail over to the Target cluster without access to recent data produced since the Jump cluster’s zone outage. The net effect is that, in this corner case, a multi-zone Jump cluster would yield a lower RPO than a single zone jump cluster, for an added cost. However, as of this writing, there are no documented cases of a cloud provider experiencing a regional outage and an availability zone outage in a different region at the same time. Because this hypothetical corner case is exceedingly rare, most enterprise companies require disaster recovery for only a single cloud region outage at a time, and therefore would be served by a single zone Jump cluster.

Next steps

Try Confluent Cloud on AWS Marketplace with $1000 of free usage for 30 days, and pay as you go. No credit card is required.