copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2024-10-21 |
satellite, hybrid, multicloud |
satellite |
{{site.data.keyword.attribute-definition-list}}
{: #connector-create-endpoints}
After creating a Connector and deploying a Connector agent, you can create endpoints to manage the network between your {{site.data.keyword.satellitelong_notm}} location and services, servers, or apps that run outside of the location. {: shortdesc}
{: #create-connector-endpoint-cli} {: cli}
-
Run the following command to find the ID of your Satellite Connector.
ibmcloud sat connector ls
{: pre}
-
Run the command to create the endpoint.
ibmcloud sat endpoint create --dest-hostname HOSTNAME --connector-id ID --dest-type location --dest-port PORT --name NAME --source-protocol PROTOCOL [--dest-protocol PROTOCOL] [--sni SNI]
{: pre}
--connector-id ID
: The ID of the Satellite connector. To find the connector ID, runibmcloud sat connector ls
.--dest-hostname HOSTNAME
: Indicate the fully qualified domain name (FQDN) or the externally accessible IP address of the destination that you want to connect to. Forlocation
endpoints, this value must resolve from and be reachable from the control plane hosts for Satellite locations or where the agent runs for Satellite Connector.--dest-port PORT
: Provide the port that the destination resource listens on for incoming requests. Make sure that the port matches the destination protocol.--dest-protocol PROTOCOL
: Specify the destination's protocol. If you do not specify this option, the destination protocol is inherited from the source protocol. Available options:TCP
,TLS
.--dest-type TYPE
: Specify where the destination resource runs, either in IBM Cloud (cloud
) or your Satellite location (location
). Available options:location
,cloud
.--name NAME
: Provide a name for the endpoint.--sni SNI
: Specify the server name indicator, if you specify aTLS
orHTTPS
source protocol and want a separate hostname to be added to the TLS handshake.--source-protocol PROTOCOL
: Provide the protocol that the source uses to connect the destination resource. For more information, see Encryption protocols. Available options:TCP
,TLS
,HTTP
,HTTPS
,HTTP-tunnel
. -
Verify that the endpoint is created.
ibmcloud sat endpoint ls --connector-id ID
{: pre}
-
If you are creating an on-cloud endpoint by specifying
--dest-type=cloud
, you must configure your location's Connector agent to expose the target port to requests from the source application. Follow the steps in Configuring the agent port for on-cloud endpoints.
{: #create-connector-endpoints-comm}
Example command to create an endpoint using HTTPS source and TLS destination protocols and specifying an SNI hostname.
ibmcloud sat endpoint create --dest-hostname server1.mydomain.com --connector-id A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI --dest-type location --dest-port 443 --name myendpoint --source-protocol HTTPS --dest-protocol TLS --sni mydomain.com
{: pre}
Example command to create an endpoint that uses TCP protocol.
ibmcloud sat endpoint create --dest-hostname server1.mydomain.com --connector-id A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI --dest-type location --dest-port 443 --name myendpoint --source-protocol TCP --dest-protocol TCP
{: pre}
{: #configure-connector-oncloud-port}
On-cloud endpoints allow you to access {{site.data.keyword.cloud_notm}} resources outside of your {{site.data.keyword.satelliteshort}} location network. This includes any public or private service that is accessible from your {{site.data.keyword.satelliteshort}} account, such as an endpoint for {{site.data.keyword.cloud_notm}} IAM or a private {{site.data.keyword.cos_full_notm}} bucket.
Calls to an on-cloud endpoint from your source application are first directed to the local Connector agent running on your location. Before your source application can access the endpoint, however, you must ensure that the endpoint's target port, which the agent is listening on, is accessible to your source application. For container platforms such as Docker or Rancher, this requires you to map the endpoint's target port to an appropriate port that is accessible to clients from outside of the container that the agent is running in. Follow the steps to complete this requirement.
-
Run the command to get the target port. In the output, find the port number listed in the Address column.
ibmcloud sat endpoints --connector-id <connector ID>
{: pre}
Example output. In this example, the target port number is
29998
.OK ID Name Destination Type Address Status A1A1AAaaaAAaA11AAAAAaA11aaaAaaaAaA_aaaaa test123 cloud TCP :29998 enabled
{: screen}
-
Map the target port to the container using the steps appropriate for your container platform. For most platforms, including Docker and Rancher, you can use the
-p LISTENPORT:CONTAINERPORT
option when starting your Connector agent.For example, using Docker, the following command exposes port
8443
for the endpoint's container-internal target port29998
.docker run -d --network host --platform linux/amd64 --env-file ~/agent/env-files/env.txt -v ~/agent/env-files:/agent-env-files icr.io/ibm/satellite-connector/satellite-connector-agent:latest -p 8443:29998
{: pre}
You may also need to work with your container platform and operating system to allow outside traffic into your chosen
LISTENPORT
. In the previous example, theLISTENPORT
is8443
. -
Now the resource is reachable from the IP address or the DNS name set up in your container platform on port 8443 in this example.
{: #create-connector-rule-cli} {: cli}
-
Run the following command to create an ACL rule for one or more subnets and optionally bound to one or more endpoints.
ibmcloud sat acl create --connector-id ID --name NAME --subnet SUBNET [--subnet SUBNET ...] [--endpoint ENDPOINT ...]
{: pre}
--connector-id ID
: The ID of the Satellite connector. To find the connector ID, runibmcloud sat connector ls
.--name NAME
: The name for the ACL.--subnet SUBNET
: An IP or CIDR block allowed by this ACL. Value must be fully contained in the following CIDRs: 10.0.0.0/8, 161.26.0.0/16, 166.8.0.0/14, 172.16.0.0/12.--endpoint ENDPOINT
: A name or ID of an endpoint to enable for this ACL. -
Verify that the ACL was created.
ibmcloud sat acl ls --connector-id ID
{: pre}
-
You can also add or remove endpoints or subnets for an existing ACL.
ibmcloud sat acl endpoint add --connector-id ID --acl-id ID --endpoint ENDPOINT [--endpoint ENDPOINT ...] ibmcloud sat acl endpoint rm --connector-id ID --acl-id ID --endpoint ENDPOINT [--endpoint ENDPOINT ...] ibmcloud sat acl subnet add --connector-id ID --acl-id ID --subnet SUBNET [--subnet SUBNET ...] ibmcloud sat acl subnet rm --connector-id ID --acl-id ID --subnet SUBNET [--subnet SUBNET ...]
{: codeblock}
{: #create-connector-acls-comm}
Example command to create an ACL rule allowing subnet 10.123.76.192/26 access to endpoint 'myendpoint'.
ibmcloud sat acl create --connector-id A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI --name myrule --subnet 10.123.76.192/26 --endpoint myendpoint
{: pre}
This will produce output similar to the following.
OK
ACL created with ID A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI-Source-vbfea
{: screen}
Use the ID of the newly created ACL to run the following command to add a second subnet, 10.194.127.64/26, to the ACL.
ibmcloud sat acl subnet add --connector-id A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI --acl-id A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI-Source-vbfea --subnet 10.194.127.64/26
{: pre}
Run the following command to list ACLs. You will see that the myrule
ACL now includes two subnets, 10.123.76.192/26 and 10.194.127.64/26.
ibmcloud sat acl ls --connector-id A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI
{: pre}
OK
ID Name Subnets Created
A1B0CDefgHilQ11ubmVjdG1yOiJjb11hnTdlWSRE1dnZla1szbDBsZyI-Source-vbfea myrule 10.123.76.192/26,10.194.127.64/26 11 minutes ago
{: screen}
{: #create-connector-endpoint-console} {: ui}
-
From the {{site.data.keyword.satelliteshort}} console{: external}, click the Connector that you want to use create an endpoint.
-
On the Connector overview page, click the User endpoints tab, then click Create endpoint.
-
On the Resource details page, enter the following details.
- Give your endpoint a name.
- Enter the fully qualified domain name or IP address of the destination resource that you want to connect to.
- Enter the port that your destination resource listens on for incoming requests.
- Click Next.
-
On the Protocol page, select the protocol that a source must use to connect to the destination FQDN or IP address. This protocol must match the port for your destination resource. For more information, see Endpoint protocols.
- If you selected the TLS or HTTPS protocols and want to require server-side authentication of the destination's certificate, select the Verify destination certificate checkbox.
- If you selected the TLS or HTTPS protocols but the destination resource is still in development, you can click Upload certificate to add your self-signed certificate file. This
ssl.crt
file must contain the public, base-64 encoded certificate for your resource's host name and must not contain the privatessl.key
certificate key. To create a self-signed certificate for testing purposes by using OpenSSL, see this self-signed SSL certificate tutorial{: external}. - If you selected the TLS or HTTPS protocols and want to allow a separate hostname to be provided to the TLS handshake of the resource connection, enter the server name indicator (SNI).
-
On the Access control lists page, click Create rule.
-
Optional: On the ACL rule page, enter a Rule name and enter the IBM Cloud private IP addresses of the clients that will be allowed to connect to the endpoint. This value can be a single IP address, a CIDR block, or a comma-separated list. The value must be fully contained in the following CIDRs: 10.0.0.0/8, 161.26.0.0/16, 166.8.0.0/14, 172.16.0.0/12.
If no rules are selected, any client that is connected to the IBM Cloud private network can use the endpoint to connect to the destination resource that runs in your location. {: important}
-
On the Connection settings page, set an inactivity timeout between 1 and 600.
-
Click Create endpoint.
{: #create-connector-rule-console} {: ui}
-
From the {{site.data.keyword.satelliteshort}} console{: external}, click the Connector that you want to create an ACL rule for.
-
On the Connector overview page, click the Access control list tab, then click Create rule.
-
On the ACL rule page, complete the following steps.
-
Enter a Rule name.
-
Enter the IP addresses of the clients that are allowed to connect to the endpoint. This value can be a single IP address, a CIDR block, or a comma-separated list. The value must be fully contained in the following CIDRs: 10.0.0.0/8, 161.26.0.0/16, 166.8.0.0/14, 172.16.0.0/12.
If no rules are selected, any client that is connected to the IBM Cloud private network can use the endpoint to connect to the destination resource that runs in your location. {: important}
-
Select the endpoint (or multiple endpoints) this rule should control access to in your location.
-
-
Click Create