Skip to content
This repository was archived by the owner on Nov 12, 2024. It is now read-only.

Commit 5d52674

Browse files
1 parent d8bcb55 commit 5d52674

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

docs/concepts/private-connections-gcp.md

+4-2
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: 'Connecting to PlanetScale privately on GCP'
33
subtitle: 'How to connect to PlanetScale privately on GCP via Private Service Connect.'
4-
date: '2024-05-13'
4+
date: '2024-10-10'
55
---
66

77
## Connecting to PlanetScale privately via GCP Private Service Connect
88

9-
When your compliance mandates that your connections do not route through the public Internet, PlanetScale provides private connection endpoints to GCP regions via [GCP Private Service Connect](https://cloud.google.com/vpc/docs/private-service-connect). Private connections are included on Scaler Pro plans. There is no additional charge on PlanetScale's end, but this may impact your GCP bill.
9+
When your compliance mandates that your connections do not route through the public Internet, PlanetScale provides private connection endpoints to GCP regions via [GCP Private Service Connect](https://cloud.google.com/vpc/docs/private-service-connect). GCP Private Service Connect is a form of _VPC peering_ that keeps your traffic within Google Cloud. Private connections are included on Scaler Pro plans. There is no additional charge on PlanetScale's end, but this may impact your GCP bill.
1010

1111
Below is a list of instructions to set up your VPC network to utilize a Private Service Connect endpoint when communicating with PlanetScale databases.
1212

@@ -95,3 +95,5 @@ Welcome to PlanetScale.
9595
By default, PlanetScale provides connection strings based on the `connect.psdb.cloud` domain name. To access your databases over the private endpoint change your connection string to match the `<Endpoint-Name>.<Domain-Name>` pattern.
9696

9797
For example, a connection string such as `gcp-us-central1.connect.psdb.cloud` would be changed to `edge.gcp-us-central1.private-connect.psdb.cloud` assuming `edge` was the Endpoint Name chosen during creation of the endpoint.
98+
99+
With this configured, you can leverage VPC peering to communicate between your GCP account and PlanetScale.

docs/concepts/private-connections.md

+5-7
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: 'Connecting to PlanetScale privately on AWS'
33
subtitle: 'How to connect to PlanetScale privately on AWS via PrivateLink.'
4-
date: '2024-05-06'
4+
date: '2024-10-10'
55
---
66

77
## Connecting to PlanetScale privately via AWS PrivateLink
88

9-
When your compliance mandates that your connections do not route through the public Internet, PlanetScale provides private connection endpoints to AWS regions via [AWS PrivateLink](https://aws.amazon.com/privatelink/). Private connections are included on Scaler Pro plans. There is no additional charge on PlanetScale's end, but this may impact your AWS bill.
9+
When your compliance mandates that your connections do not route through the public Internet, PlanetScale provides private connection endpoints to AWS regions via [AWS PrivateLink](https://aws.amazon.com/privatelink/). AWS PrivateLink is a form of _VPC peering_ that does not send your traffic over the public internet. Private connections are included on Scaler Pro plans. There is no additional charge on PlanetScale's end, but this may impact your AWS bill.
1010

1111
Below is a list of instructions to set up your Virtual Private Cloud (VPC) to utilize a VPC endpoint when communicating with PlanetScale databases.
1212

@@ -104,8 +104,6 @@ Below is a list of instructions to set up your Virtual Private Cloud (VPC) to ut
104104

105105
6. Click the "Additional settings" dropdown arrow to reveal the "DNS name" configuration, and select the "Enable DNS name" checkbox.
106106

107-
![enable_dns_name](/assets/docs/multi/aws/privatelink/enable_dns_name.png)
108-
109107
7. Choose the security group of your choice to control what can send traffic to the PlanetScale service endpoint.
110108

111109
8. Click "Create endpoint" and verify that the VPC endpoint's status reports "Available" after a few minutes.
@@ -118,9 +116,7 @@ Below is a list of instructions to set up your Virtual Private Cloud (VPC) to ut
118116
Some PlanetScale regions are named differently than AWS Provider regions. We will refer to the PlanetScale region as `<planetscale-region>` for the rest of this document.
119117
{% /callout %}
120118

121-
2. Confirm that the Private DNS Names reads: `<planetscale-region>.private-connect.psdb.cloud`. In the below example, we have configured our own VPC endpoint for `us-east`.
122-
123-
![private_dns](/assets/docs/multi/aws/privatelink/private_dns.png)
119+
2. Confirm that the Private DNS Names reads: `<planetscale-region>.private-connect.psdb.cloud`.
124120

125121
3. Log into any EC2 instance in the configured VPC and run `dig +short <planetscale-region>.private-connect.psdb.cloud` to confirm that DNS resolution is producing IP Addresses in the range of your VPC's CIDR.
126122

@@ -142,3 +138,5 @@ Welcome to PlanetScale.
142138
By default, PlanetScale provides users with a connection string that reads `<planetscale-region>.connect.psdb.cloud`.
143139

144140
To utilize your newly configured VPC endpoint, prepend `private-` to the `connect` subdomain as shown above, yielding a connection string that reads `<planetscale-region>.private-connect.psdb.cloud`.
141+
142+
With this configured, you can leverage VPC peering to communicate between your AWS account and PlanetScale.

0 commit comments

Comments
 (0)