Additional VPC scenarios

Learn more about the additional VPC scenarios that show how VPC can be configured between your workload environment and Cloudera Control Plane.

Scenario 1: VPC endpoint in your egress VPC with no HTTP proxy
This scenario has the VPC endpoints in your egress VPC, allowing the VPC endpoints to be shared by multiple VPCs in your network. In this setup, VPC endpoints receive IPs from egress VPC.
  • DNS overrides where DNS is a per-VPC view:
    • Deploying a VPC endpoint with private DNS option enabled will automatically install the DNS overrides in the egress VPC, but this does not solve the overrides for the workload environment VPC.
    • DNS override zones and records can be deployed in each workload environment VPC, or a single set of DNS override zones and records are deployed and the zones are associated with each workload environment VPC.
  • DNS overrides where DNS is a regional or global view:
    • The DNS override will have a regional or global impact to resolution of the Cloudera hostnames, clients in the region/globally will receive these VPC endpoints.
Scenario 2: VPC endpoint in your egress VPC, HTTP proxy
Similar to scenario 1, except you have egress traffic flowing through an HTTP proxy in the egress VPC. In this setup, VPC endpoints receive IPs from egress VPC.
  • DNS overrides:
    • Deploying a VPC endpoint with private DNS option enabled will automatically install the DNS overrides in the egress VPC. If the egress proxy is performing the DNS lookup for the destination service, this approach should be sufficient.
    • Transparent proxy or egress firewall policy configurations may require the original destination IP to match the DNS resolution. If this is the case, the override zones/records/VPC associations can be deployed as described in scenario 1.
Scenario 3: VPC endpoint in your workload environment VPC, HTTP proxy
VPC endpoints deployed in your workload environment network. In this setup, VPC endpoints receive IPs from egress VPC.
  • DNS overrides where DNS is a per-VPC view:
    • Deploying a VPC endpoint with “private DNS” option enabled will automatically install the DNS overrides in the egress VPC. This is recommended.
  • DNS overrides where DNS is a regional or global view:
    • The overrides will impact resolution for clients elsewhere in the region and globally.
    • Traffic to these hostnames from outside this VPC will attempt to use these VPC endpoints, which may not be a desired configuration
  • HTTP forward proxy or non-transparent proxy
    • Workload environment will be configured to use an HTTP proxy profile.
    • The no_proxy configuration of the profile must include the hostnames of the APIs reachable through VPC endpoint. HTTP requests for destinations in the no_proxy list will not be forwarded to the proxy, local DNS and therefore the VPC endpoints will be used for that traffic