Configuring private endpoints
Configuring private endpoints for Azure
If you want to connect to your NPSaaS instance on Azure by using Azure PrivateLink, you must create private endpoints in your Azure subscriptions.
-
Provide your subscription IDs.
When you create your private endpoint connection, the private link service must approve the request. If you provide the subscription IDs in which they are to be created, your request is approved automatically.
-
If you deployed your instance with private endpoints only, you provided your subscription IDs during provisioning, in step 9. Configure advanced features.
-
If you deployed your instance with public and private endpoints and did not provide your subscription IDs during provisioning, log in to the web console by using the public endpoint and set up the private link service.
-
Go to Administration > Settings > Private endpoints.
-
Click Create Private Link.
-
Type the subscription IDs that you want to use to set up the private endpoints in your Azure account.
Use the Private Link page to update subscription IDs after private link is created.
Image 2. Configure advanced features during provisioning.
-
-
Get resource ID or alias. You can get the resource ID either from the NPSaaS web console or the IBM Cloud catalog.
-
The NPSaaS web console:
- Log in to the web console.
- Go to Administration > Settings > Private endpoints.
- Click Create Private Link.
-
The IBM Cloud catalog:
- Log in to your IBM Cloud account.
- Go to Private endpoints > Service instance details.
-
-
Create private endpoints.
Follow the instructions described in Create a private endpoint.
During Step 5, when you are in the Resource pane, select Connect to an Azure resource by resource ID or alias and enter the resource ID or alias you retrieved in 2. Get resource ID or alias.
When the private endpoints are created, the status automatically changes to Approved. A private IP is assigned to each of your private endpoints. The IPs are displayed in Microsoft Azure Portal. Use these details to log in to your instace by using private endpoints.
Configuring private endpoints for AWS
Pre-requisites:
To create a VPC (Virtual Private Cloud) endpoint in the same region as your Netezza instance, follow these steps:
-
Have a VPC in the same region as your Netezza instance. For example, if you created the instance in the eu-central-1 (Frankfurt) region, you need to have a VPC in the Frankfurt region.
-
Create two VPC endpoints in this VPC. One for outbound traffic and one for inbound traffic.
Creating endpoints:
The following steps need to be repeated for the database and console VPC endpoint.
-
Go to VPC->Endpoint->Create Endpoint.
Create two endpoints:
- to access the database and the API server using
nz tool
. - to access the web console.
- to access the database and the API server using
-
Give a name tag to your endpoint. For example,
console-nz-dev-endpoint
. -
In Service category, select Other endpoint service.
-
To verify the
VPC endpoint service
name under Service settings, navigate to yourinstance details
page and copy the providedVPC endpoint service
name. Then paste it on the corresponding field in Service settings and click Verify. Upon successful verification, the message Service name verified will display. TheVPC endpoint service
names for the database and console may differ; refer yourinstance details
page for accurate values. For example:-
com.amazonaws.vpce.eu-central-1.vpce-svc-0c5bd5410f78fd451
is the service name for the database. -
com.amazonaws.vpce.eu-central-1.vpce-svc-0061f6348c1e6eba6
is the service name for the console.
-
-
Select the VPC and the subnets, ensuring that the selected VPC is located in the same region as where your instance is deployed, such as
eu-central-1
. -
Select a Security group that permits traffic on ports
5480
and443
. -
Click on Create endpoint.
-
Go to VPC->Endpoints once the endpoint is created and select the endpoint to view its status.
Once the endpoint status shows
Available
, in the endpoint details page, you will see the DNS names assigned to each endpoint you created. There will be one DNS name created which can be used to access the service across all subnets and one for each subnet you added in Step 5. The dns name specific to each subnet will have the subnet name in sub-domain, like,eu-central-1a.vpce.amazonaws.com
for the subnet in availability zone A in eu-central-1. We recommend use the first dns record, which can be used to access the service across all subnets that have been added.You will have two DNS names that you will use to connect to the service created.
- One for the database VPC endpoint.
- One for the console VPC endpoint.
-
Database and API server (using nz tool) can be accessed using the DNS name using port 5480 and 443 respectively.
-
To access the console, use the following URL format:
https:://<dns-name>/#/?crn=<crn>
Example
https:://vpce-039389rjehrjhr37ee.eu-central-1.vpce.amazonas.com/#/?crn=crn:v1:bluemix:public:data-warehouse:eu-de:a/46e84bdc00b94e99a0e4aeda769a02b6:9e57cae1-5bdd-4574-9a64-6261b96fc85f::
To connect to your NPSaaS on AWS by using AWS PrivateLink, you must create private endpoints in your AWS subscription.
-
Provide your service principals.
When you create your private endpoint connection, the private link service must approve the request. Your request is approved automatically if you provide the service principals in which they are to be created.
- If you deployed your instance with private endpoints, you must have provided your service principals during provisioning, in step 9. Configure advanced features.
Image 3. Configure advanced features during provisioning. -
Create private endpoints.
Follow the instructions described in Create a private endpoint.
When the private endpoints are created, a private hostname is assigned to each of your private endpoints. Use these details to log in to your instace by using private endpoints.