Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

W-16132496-CH2-Networking-Guide-LDS #227

Open
wants to merge 33 commits into
base: latest
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 25 commits
Commits
Show all changes
33 commits
Select commit Hold shift + click to select a range
eaca88d
W-16132496-CH2-Networking-Guide-LDS
luanamulesoft Aug 21, 2024
5867588
added content
luanamulesoft Aug 29, 2024
610df3d
added topic to nav
luanamulesoft Aug 29, 2024
6ddeffe
fixed format
luanamulesoft Aug 29, 2024
6dcc079
fixed format2
luanamulesoft Aug 29, 2024
0f48411
new changes
luanamulesoft Sep 24, 2024
318f0a9
applied content strategy review
luanamulesoft Sep 30, 2024
c342c4f
applied content strategy review - nav
luanamulesoft Sep 30, 2024
974a8b6
applied content strategy review2
luanamulesoft Sep 30, 2024
86ceafd
fixed format
luanamulesoft Sep 30, 2024
871414d
fixed format2
luanamulesoft Sep 30, 2024
cc59d66
review
luanamulesoft Sep 30, 2024
25838e7
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
29c4930
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
097e64c
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
f54a64d
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
395fa07
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
632077b
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
5341f1b
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
a42186b
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
fb2d77b
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
5909790
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
619125d
Update ch2-networking-guide.adoc
luanamulesoft Oct 23, 2024
0a53ad2
applied SME reviews
luanamulesoft Oct 30, 2024
672230f
Update ch2-networking-guide.adoc
luanamulesoft Nov 8, 2024
5a8da36
Update cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
luanamulesoft Nov 12, 2024
72dd4e6
Update cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
luanamulesoft Nov 12, 2024
c58f578
Update cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
luanamulesoft Nov 12, 2024
43a022d
Update cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
luanamulesoft Nov 12, 2024
0d900dc
Update cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
luanamulesoft Nov 12, 2024
8a45275
Update cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
luanamulesoft Nov 12, 2024
de09da1
Update cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
luanamulesoft Nov 12, 2024
4ac33ff
updated diagrams
luanamulesoft Nov 25, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 20 additions & 1 deletion .vscode/settings.json
Original file line number Diff line number Diff line change
@@ -1 +1,20 @@
{}
{
"files.exclude": {
"**/.git": true,
"**/.svn": true,
"**/.hg": true,
"**/CVS": true,
"**/.DS_Store": true,
"**/Thumbs.db": true,
"**/.apivcs": true,
"**/.gitignore": true,
"**/.designer.json": true,
"**/.exchange.xml": true,
"**/.vscode": true,
"**/.mvn": true,
"**/.tmp": true,
"**/.settings": true,
"**/.exchange_modules_tmp": true,
".mule": true
}
}
Binary file not shown.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should show where TGW attachments and / VPN sits as well

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We also need a diagram for shared spaces.

Copy link

@ahuynhms ahuynhms Oct 3, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. Should app2 in node1 be "app2/replica1" instead of just "app2"? To be consistent with app1/replica1.
  2. For the Client (Customer Network) to Internal NLB, maybe add an image to show it uses Anypoint VPN or Transit Gateway Attachment.
  3. A suggestion: should we have a 2nd more detailed diagram to show where the PS FW comes into the picture and the traffic flow for PS CIDR versus "Local Private Network"? We've had support cases where customer's app to app traffic is failing because they only allowed "PS CIDR" in the PS FW, but didn't allow "Local Private Network".

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions cloudhub-2/modules/ROOT/nav.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@
** xref:ch2-clustering.adoc[Clustering]
** xref:ch2-patch-updates.adoc[CloudHub 2.0 Operating System Patch Updates]
** xref:ch2-penetration-testing-policies.adoc[Run Vulnerability Assessment and Penetration Tests]
* xref:ch2-networking-guide.adoc[CloudHub 2.0 Networking Architecture]
* xref:ps-setup.adoc[Extending Your Network to Anypoint Platform]
** xref:ps-assign-permissions.adoc[Assigning Permissions]
** xref:ps-gather-setup-info.adoc[Gathering Required Setup Information]
Expand Down
199 changes: 199 additions & 0 deletions cloudhub-2/modules/ROOT/pages/ch2-networking-guide.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,199 @@
= CloudHub 2.0 Networking Architecture

CloudHub 2.0 is MuleSoft's fully managed, containerized integration platform as a service (iPaaS). It allows you to deploy APIs and integrations as lightweight containers in the cloud, ensuring they’re maintainable, secure, and scalable.
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved

This document provides relevant information regarding the configuration and administration of CloudHub 2.0 networks, network interfaces, and network services. For information about different deployment scenarios, see xref:runtime-manager::deployment-strategies.adoc[].

The basic components of CloudHub 2.0 networking architecture are HTTP load balancer, Mule replica DNS records, private spaces, and regional services.
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved

* <<HTTP Load Balancer>>
* <<DNS Records>>
* <<Private Spaces Configurations>>
* <<Regional Services>>

image::ch2-networking-architecture-diagram.png[Basic Components of CloudHub 2.0 Networking Architecture]

== HTTP Load Balancer

CloudHub 2.0 provides a load-balancing service for all integrations. You can use a default endpoint or provision a custom endpoint with your own certificate.

When you deploy an application to two or more replicas, CloudHub 2.0 provides an HTTP load-balancing service that automatically distributes HTTP requests among your assigned replicas.

The CloudHub 2.0 load-balancing service performs a round-robin load distribution across application replicas, which provides horizontal scalability. The load-balancing service also provides transparent switchover when an application is upgraded. See xref:ch2-update-apps.adoc[].

Each application deployed to CloudHub 2.0 has both default public and internal DNS records that refer to the load balancer: `<app>.<space-id>.<region>.cloudhub.io.` and `<app>.internal-<space-id>.<region>.cloudhub.io.`.

The CloudHub 2.0 private spaces load-balancing service accepts public traffic on the standard HTTPS port: `443`. For private spaces, you can also accept HTTP traffic on the standard HTTP port: `80`. Shared spaces don’t accept port `80`.

=== Mule Application Ports

Applications must listen on host `0.0.0.0` and port via the reserved property `${http.port}`. MuleSoft allocates the value of this property.

The load-balancing service forwards traffic to deployed applications.

=== Upstream HTTPS Traffic

By default, the load-balancing service forwards traffic to deployed applications over HTTP. To use HTTPS:

* Enable the *Last-Mile Security* setting in the *Ingress* tab of the xref:ch2-deploy-private-space.adoc#configure-endpoint-path[deployment settings].
* Configure the application to listen on HTTPS by providing a certificate in the TLS context of your private space.

The following example shows a Mule application configuration that exposes an HTTPS endpoint:

[source,console,linenums]
----
<http:listener-config name="HTTP_Listener_Configuration" protocol="HTTPS" host="0.0.0.0" port="${http.port}" doc:name="HTTP Listener Configuration" >
<tls:context name="TLS_Context_Custom_Keystore" doc:name="TLS Context">
<tls:key-store type="jks" path="server.jks" keyPassword="" password="" alias="" />
</tls:context>
</http:listener-config>
----

=== Load Balancer Connections

For each request a client makes through the CloudHub 2.0 load balancer `(<app>.<space-id>.<region>.cloudhub.io)`, the load balancer maintains two connections: one connection between the client and the load balancer, and another connection between the load balancer and the application. For each connection, the load balancer manages a default idle timeout of 300 seconds that is triggered when no data is sent over either connection. If no data is sent or received during this duration, the load balancer closes both connections.

For connections that take longer than 300 seconds to process from either side, handle the processing asynchronously. You can customize the idle timeout value in the *Advanced* tab of your xref:ps-config-advanced.adoc#configure-http-requests-and-read-response-timeout[private space settings] in Runtime Manager, or via the Mule application xref:mule-runtime::global-settings-configuration.adoc[global configurations] of the xref:mule-runtime::about-mule-configuration.adoc[Mule configuration file].
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved

== DNS Records

The following DNS records are exposed for your CloudHub 2.0 applications:

[cols="2*a"]
|===
|`*.<space-id>.<region>.cloudhub.io`|Applications running inside a private space.
|`<space-id>.<region>.cloudhub.io`|Record pointing to the load balancer. Use this record as the target of a custom domain CNAME.
|`*.internal-<space-id>.<region>.cloudhub.io`|Applications running inside a private space. The IP addresses for this DNS record are accessible only within your xref:ch2-private-space-about.adoc[private spaces]. They cannot be accessed within xref:ch2-shared-space-about.adoc[shared spaces].
|`internal-<space-id>.<region>.cloudhub.io`|Internal load balancer. Use this record as the target of a custom domain CNAME. The IP addresses for this DNS record are accessible only within your private spaces. They cannot be accessed within shared spaces.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The "Use this record as the target of a custom domain CNAME" comment for the last entry (internal load balancer) is wrong. We currently don't support custom domain CNAME for the internal LB. Is that correct?

Copy link
Contributor

@xuanshi xuanshi Oct 28, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't support a vanity domain for private endpoints. But we can still put the internal domain as a target, right?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SME confirmed that it is correct as it is now.

Copy link

@ahuynhms ahuynhms Oct 28, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are we planning to have vanity domains for private endpoints released, before we publish this doc?

For the public endpoint scenario:

  1. Customer configures example.com
  2. They create a CNAME for example.com, which points to the public endpoint for purposes of DNS resolution, to get the IP.
  3. When CH2 LB receives the request, it will match the host header example.com against the configured vanity domain (example.com), and it will match.

For the private endpoint scenario:

  1. Let say customer sends request to internal.com
  2. They have CNAME for internal.com, that points to the private endpoint, and DNS resolution works.
  3. But the problem is when CH2 LB receives the request, it will see the host header as internal.com, and it will be unable to match this against any certificate on the CH2 LB, because (currently) we don't support vanity domains for the private endpoint.

Based on my above examples, I don't understand how that statement is valid when we don't support vanity domains for the private endpoint.

|===


== Private Spaces Configurations

The following configurations apply to private spaces only.

=== Application-to-Application Communication

An application communicates with another application via:

* The default public DNS name: `app.sxjsip.aus-s1.cloudhub.io`
* The default internal DNS name (in private spaces only): `app.internal-sxjsip.aus-s1.cloudhub.io`
* The custom domain name (if configured): `acme.example.com`
* The cluster local DNS: `app` or `app.envid.svc.cluster.local:8081`

If you use the internal DNS name, traffic remains within the private space network. You can delete or omit the externally exposed endpoint when deploying an application to a private space. In that case, use the application’s internal endpoint for internal traffic.

If you use the private space’s local endpoint, traffic doesn’t leave the private space. However, the private space’s local endpoint isn’t highly available. The endpoint can be unreachable during some private space operations, such as disaster recovery. The private space’s local endpoint allows traffic within the same environment only.

=== Custom Domain Name

You can apply custom certificates to your private space. CloudHub 2.0 parses the CN and SAN lists from the certificate and makes those domains available when deploying applications.

Configure either in the public or the internal DNS record to CNAME. For example:
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought we don't support custom domain name for internal endpoint/DNS record (at least not yet?).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SME confirmed it is correct as it is

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we don't support private custom domain. but we can still do the CNAME to the internal DNS record, right?


----
*.example.com => sxjsip.aus-s1.cloudhub.io
*.example.com => internal-sxjsip.aus-s1.cloudhub.io
----

=== IP Ranges

Traffic egressing to the internet originates from an IP address listed under the *Outbound Static IPs* field of the private network configuration.

The public DNS target and the private DNS target IPs don’t change during the lifetime of the private space.

Traffic egressing to a VPN or Transit Gateway (TGW) originates from the private space CIDR block.

image::ch2-networking-ip-ranges.png[Inbound and outbound IPs listed in the UI]

Private spaces also use several secondary CIDR for internally.

If you use BGP routing protocols, the following additional CIDR blocks can be published to your gateway:
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved

----
100.64.0.0/16
100.66.0.0/16
100.67.0.0/16
100.68.0.0/16
----

Because of this, `100.64.0.0/10` is xref:ps-gather-setup-info.adoc#unusable-cidr[not a supported range] for private spaces.

You can filter these prefixes from the route map. For more information, see https://help.mulesoft.com/s/article/Received-Extra-BGP-routes-from-CloudHub-2-0-VPN[Received Extra BGP routes from CloudHub 2.0 VPN].

You can also indicate a reserved range for your on-prem network upon creating your private space. CloudHub 2.0 doesn’t use reserved ranges indicated by customers. For more information, see xref:ps-gather-setup-info.adoc#reserved-cidr[Reserved Corporate CIDR].

=== Connections

Private spaces support two types of connections: Virtual Private Network (VPN) and Transit Gateway (TGW).
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved

Each Anypoint VPN connection consists of two tunnels that enable you to connect to a single public IP address at a remote location. VPNs are highly available if you configure both tunnels on your endpoint.

Additionally, CloudHub 2.0 enables you to define redundant VPN connections for additional resiliency. As a managed service, the underlying VPN service is often upgraded. Routine maintenance can briefly disable one of the two tunnels of your VPN connection. Your VPN connection automatically fails over to the second tunnel during this time, so access isn’t interrupted. For this reason, you must configure both tunnels on your endpoint. For more information, see https://help.mulesoft.com/s/article/Tunnel-Switch-in-an-Anypoint-Dynamic-BGP-VPN-Update[Tunnel Switch in an Anypoint Dynamic (BGP) VPN Update].
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved

By design, TGW connections are highly available. Don’t create redundant TGW connections. For more information, see xref:ps-tgw-about.adoc[].

CloudHub VPC AWS direct connect connections are deprecated in CloudHub 2.0. Instead, use TGW attachments. When you delete a private space that has a TGW attached, the transit gateway is preserved, and you can reattach it to a different private space.
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved


==== Connections Between CloudHub and CloudHub 2.0

You can use a xref:ps-create-configure-tgw.adoc[TGW attachment] to connect a dedicated VPC in CloudHub to a CloudHub 2.0 private space. You must apply the attachments independently in CloudHub and CloudHub 2.0.
luanamulesoft marked this conversation as resolved.
Show resolved Hide resolved


=== Firewall Rules and Port Access

HTTP Ingress::

By default, ports `443` and `80` are exposed for all external inbound traffic. You can remove or change these ports to restrict inbound traffic.


Non-HTTP Ingress::

By default, no non-http ports are open. You can open a fixed list of TCP ports (30500-32500) to allow non-http traffic to flow to your Mule applications. Those ports are only reachable from within the private space or originated from a VPN or a TGW. For more information about how to allow TCP traffic for your private space, see xref:ch2-deploy-api.adoc[].


Egress::

By default, applications can make outbound connections to any destination and port. You can change this behavior to restrict egress traffic.
+
You can remove all ingress and egress rules from and to the internet. In this case, the private space still functions normally because of these control measures:
+
* Anypoint Monitoring ingestion traffic firewall rules are implicitly added to all Mule applications’ firewall rules.
* Essential AWS services traffic flows are always allowed from Mule applications.
* You can apply egress rules at the application level. For more information, see xref:ps-config-app-level-egress.adoc[].
* You can remove the default route to the Internet Gateway. However, for the egress firewall rules to work, the destination IPs must be routable.


== Regional Services

The DNS record and the load balancer for your integration can change depending on what region you deploy your applications in. This table summarizes what DNS records are available for your applications in each region:

Anypoint Platform for the US control plane covers these regions:

[%header,cols="3*a"]
|===
| Regions in U.S. Control Plane | DNS Record | Internal DNS Record
| US East (N. Virginia) | `<app>.<space-id>.usa-e1.cloudhub.io`
| US East (Ohio) | `<app>.<space-id>.usa-e2.cloudhub.io` | `<app>.internal-<space-id>.usa-e1.cloudhub.io`
| US West (N. California) | `<app>.<space-id>.usa-w1.cloudhub.io` | `<app>.internal-<space-id>.usa-w1.cloudhub.io`
| US West (Oregon) | `<app>.<space-id>.usa-w2.cloudhub.io` | `<app>.internal-<space-id>.usa-w2.cloudhub.io`
| Canada (Central) | `<app>.<space-id>.can-c1.cloudhub.io` | `<app>.internal-<space-id>.can-c1.cloudhub.io`
| South America (Sao Paulo) | `<app>.<space-id>.bra-s1.cloudhub.io` | `<app>.internal-<space-id>.bra-s1.cloudhub.io`
| Asia Pacific (Singapore) | `<app>.<space-id>.sgp-s1.cloudhub.io` | `<app>.internal-<space-id>.sgp-s1.cloudhub.io`
| Asia Pacific (Sydney) | `<app>.<space-id>.aus-s1.cloudhub.io` | `<app>.internal-<space-id>.aus-s1.cloudhub.io`
| Asia Pacific (Tokyo) | `<app>.<space-id>.jpn-e1.cloudhub.io` | `<app>.internal-<space-id>.jpn-e1.cloudhub.io`
| EU (Ireland) | `<app>.<space-id>.irl-e1.cloudhub.io` | `<app>.internal-<space-id>.irl-e1.cloudhub.io`
| EU (Frankfurt) | `<app>.<space-id>.deu-c1.cloudhub.io` | `<app>.internal-<space-id>.deu-c1.cloudhub.io`
| EU (London) | `<app>.<space-id>.gbr-e1.cloudhub.io` | `<app>.internal-<space-id>.gbr-e1.cloudhub.io`
|===


Anypoint Platform for the EU control plane covers these regions:

[%header,cols="2*a"]
|===
| Regions in EU Control Plane | DNS Record
| EU (Ireland) | `<app>.<space-id>.irl-e1.eu1.cloudhub.io`
| EU (Frankfurt) | `<app>.<space-id>.deu-c1.eu1.cloudhub.io`
|===
1 change: 1 addition & 0 deletions cloudhub-2/modules/ROOT/pages/ps-gather-setup-info.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -155,6 +155,7 @@ You cannot use the following list of CIDR blocks:
224.0.0.0/4
169.254.0.0/16
127.0.0.0/8
172.17.0.0/16
0.0.0.0/8
----

Expand Down