Adding a cross-account connection
You can request connections to networks in other IBM Cloud accounts, by using the UI, CLI, API, and Terraform.
Planning considerations
Before you add a cross-account connection, review these considerations:
-
After you connect a transit gateway to a network in another account, all resources that are connected to that transit gateway are accessible from the other network. Make sure that you use a trusted account. The following network connections are permitted as cross-account connections:
- VPC
- Classic infrastructure
- Redundant GRE
- Direct Link
- Power System Virtual Server
- Unbound GRE tunnel
-
Only 10 pending requests are allowed per gateway. To create more requests, you can cancel the pending connection request, or wait for it to be approved. Connection requests expire if not approved within 72 hours.
-
Use of security controls, such as ACLs, security groups, or other network services to control traffic flow are highly recommended. IBM Cloud Transit Gateway does not provide security groups or ACLs, but the networks they attach to might and can affect transit gateway communications. For more information on ACLs and security groups, refer to the following topics:
Adding a cross-account connection in the UI
To connect networks that different accounts own by using the UI, follow these steps:
-
From your browser, open the IBM Cloud console and log in to your account.
-
Select the Navigation Menu icon from the upper left, then click Interconnectivity > Transit Gateway.
-
Click the name of the transit gateway where you want to add a connection. Then, click Add connection.
-
Choose your network connection type. Then, select Request connection to a network in another account.
-
Type the CRN of the cross-account network, or if Classic infrastructure or an Unbound or RedundantGRE, enter the IBM Cloud account ID that you want to connect to.
- To get the IBM Cloud account ID for a Classic infrastructure or an Unbound or RedundantGRE tunnel connection, select Manage > Account from the IBM Cloud console and choose Account Settings. Your account ID shows in the Account section of the Account settings page.
- To get the CRN of a VPC, Direct Link, or Power Systems Virtual Server, select the Navigation Menu icon from the upper left, then click Resource list. Expand Networking (for VPC and Direct Link) or Computing (for Power Systems Virtual Server) to list your networking resources, then locate the service that you are looking for. Next, click anywhere in the service's table row (except for the Name link). From the side window that appears, copy the CRN and paste it into the Add connection pane.
-
Complete any remaining fields, then click Add. The network connection now shows the Pending approval status in the gateway owner's account.
For the Classic infrastructure connection, the ID number is for your IBM Cloud account, not for a SoftLayer account.
The network owner's account then receives a notification of the request. If the network owner rejects the cross-account connection, no connectivity is established and the connection shows a status of Rejected. You can now delete this connection. If the cross-account connection is not explicitly approved, it expires after 72 hours.
Connection requests can be resubmitted if they expire or are rejected.
-
A user with the necessary IAM permissions in the network owner's account can see the gateway and the details of all other connections that are attached to it in View only mode. From the network owner's account, go to the Transit Gateway page and click the gateway name in the table.
-
In the Connections section, see Action required to view the incoming network connection request. A user with the necessary additional IAM permissions can then click Approve to approve the request.
After the network owner's account ensures that the connection request is from a legitimate source and approves it, the system establishes routes to and from all other networks that are connected to the same transit gateway. Use of network ACLs and/or security groups within networks that are accessible across accounts are highly recommended to control the network traffic flows. You can unilaterally detach cross-account connections by either account through users who have the appropriate permissions.
Click Approve to confirm. The status of the network connection indicates Attaching.
-
When you change back to the original account, the status of the connection changes to Attached, indicating that the network request was approved.
The gateway owner's account (or the network owner's account) can delete the connection. If the network owner deletes the connection, the gateway owner sees the connection status as Detached.
Adding a cross-account connection from the CLI
Creating a cross-account connection consists of the following steps:
- Request connection to communicate with other account.
- Approve/Reject connection on other account.
For example, to request a connection to communicate with another account, run the following command:
ibmcloud tg connection-create|cc GATEWAY_ID --name NAME --network-type NETWORK-TYPE --network-id NETWORK_ID [-h, --help]
Where:
GATEWAY_ID
-
ID of the gateway that the new connection is on.
--name
-
Name of the new connection.
--network-type
-
Network type of the connection. Values are
classic
,vpc
,directlink
, orpower_virtual_server
.To create an unbound GRE tunnel, see the
ibmcloud tg connection-create-gre
command. --network-id
-
ID of the network connection. For
classic
connections, do not set a value. Use the CRN for all other network types. --output json
-
Optional. Specify whether you want the output to display in JSON format.
--help | -h
-
Optional. Get help on this command.
Examples
This example illustrates creating a VPC connection named vpc-connection
that uses vpcCRN="crn:v1:bluemix:public:is:us-south:a/3aa0a9999a1a46258064d84f7f447920::vpc:r134-f87014d5-87d2-46d1-9999-24683082f6bc"
:
ibmcloud tg cc $gateway --name vpc-connection --network-id $vpcCRN --network-type vpc
To create a classic connection named classic-conn
.
ibmcloud tg cc $gateway --name classic-conn --network-account-id 67123579566843320188712647902101 --network-type classic
To approve a connection from another account as the network owner, run the following command:
ibmcloud tg connection-approve|ca GATEWAY_ID CONNECTION_ID [-h, --help]
To reject a connection from another account as the network owner, run the following command:
ibmcloud tg connection-reject|cr GATEWAY_ID CONNECTION_ID [-h, --help]
For more information about available commands and options, see Connections in the Transit Gateway command reference.
Adding a cross-account connection with the API
To add a cross-account connection, follow these steps:
- Request a connection to communicate between other accounts.
- Perform actions on a requested connection. This must be completed.
For classic cross-account connections, be sure that the network-account-id
is set to the account you are requesting to communicate with. For VPC cross-account connections, be sure that the network-id
is set to the account
that you are requesting to communicate with.
For more information, see Adds a connection to a Transit Gateway and Performs actions on a connection for a Transit Gateway in the Transit Gateway API reference.
Request cross-account connection
The original account must request a connection to communicate with the other account.
Example Request
This example illustrates the original account requesting a cross-account connection:
curl -X POST --location --header "Authorization: Bearer {iam_token}" \
--header "Accept: application/json" \
--header "Content-Type: application/json" \
--data '{ "network_type": "vpc" }'
"
{base_url}/transit_gateways/{transit_gateway_id}/connections?version={version}"
"name": "Transit_Service_BWTN_SJ_DL",
"network_id": "crn:v1:bluemix:public:is:us-south:a/123456::vpc:4727d842-f94f-4a2d-824a-9bc9b02c523b",
"network_type": "vpc",
"prefix_filters": [
{
"action": "permit",
"ge": 0,
"le": 32,
"prefix": "192.168.100.0/24"
}
],
"prefix_filters_default": "permit",
Example Response
This example illustrates the response from a request for a cross-account connection:
{
"created_at": "2020-03-31T12:08:05Z",
"id": "1a15dca5-7e33-45e1-b7c5-bc690e569531",
"name": "example-connection",
"network_id": "crn:[...]",
"network_type": "vpc",
"status": "pending",
"updated_at": "2020-03-31T12:08:05Z"
}
Perform actions on a requested connection
After the original account requests a cross-account connection, the other account must perform actions on a requested connection.
Example Request
This example illustrates approving a cross-account connection:
"
{base_url}/transit_gateways/{transit_gateway_id}/connections/{id}/actions?version={version}"
{
"action": "approve"
}
Example Response
This example illustrates a Status 403 response in which the caller is not authorized to perform the requested action:
{
"errors": [
{
"code": "missing_field",
"message": "The `location` field is required.",
"more_info": "https://transitservice.cloud.ibm.com/",
"target": {
"name": "location",
"type": "field"
}
}
],
"trace": "86780a34-e651-4b47-9fb0-184a169cc9af"
}
Adding a connection by using Terraform
Review the following argument references that you can specify for your resource when you create a cross-connection for a transit gateway using Terraform:
Argument | Details |
---|---|
base_connection_id Optional Forces new resource string |
The ID of a network_type 'classic' connection a tunnel is configured over. This field only applies to network type gre_tunnel connections. |
base_network_type Optional Forces new resource string |
The base network type. Allowed values are classic .This field only applies to unbound_gre_tunnel type connections. |
gateway Required Forces new resource string |
Enter the transit gateway identifier. |
local_gateway_ip Optional Forces new resource string |
The local gateway IP address. This field is required for, and only applicable to, gre_tunnel and unbound_gre_tunnel type connections. |
local_tunnel_ip Optional Forces new resource string |
The local tunnel IP address. This field is required for, and only applicable to, gre_tunnel and unbound_gre_tunnel type connections. |
name Optional string |
The connection name. If the name is not given, a default name is provided based on the network type, such as vpc for network type VPC and classic for network type classic. |
network_account_id Optional Forces new resource string |
The ID of the network connected account. This is used if the network is in a different account than the gateway. |
network_type Required Forces new resource string |
The network type. Allowed values are classic , directlink , gre_tunnel , unbound_gre_tunnel , and vpc . |
network_id Optional Forces new resource string |
The ID of the network that is being connected to through this connection. This parameter is required for network type vpc and directlink , the CRN of the VPC or direct link gateway to be connected.This field is required to be unspecified for network type classic .Example: crn:v1:bluemix:public:is:us-south:a/123456::vpc:4727d842-f94f-4a2d-824a-9bc9b02c523b |
remote_bgp_asn Optional Forces new resource integer |
The remote network BGP ASN (will be generated for the connection if not specified). This field only applies to gre_tunnel and unbound_gre_tunnel type connections. |
remote_gateway_ip Optional Forces new resource string |
The remote gateway IP address. This field only applies to gre_tunnel and unbound_gre_tunnel type connections. |
remote_tunnel_ip Optional Forces new resource string |
The remote tunnel IP address. This field only applies to gre_tunnel and unbound_gre_tunnel type connections. |
zone Optional Forces new resource string |
The location of the GRE tunnel. This field only applies to gre_tunnel and unbound_gre_tunnel type connections. |
Example
This example illustrates creating a transit gateway cross-connection using Terraform:
resource "ibm_tg_connection" "test_ibm_tg_connection" {
gateway = ibm_tg_gateway.test_tg_gateway.id
network_type = "vpc"
name = "myconnection"
network_id = ibm_is_vpc.test_tg_vpc.resource_crn
}