You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You may refer to [TF](https://search.opentofu.org/provider/kowabunga-cloud/kowabunga/latest/docs/resources/kawaii) documentation to extend **Kawaii** gateway with VPC peering and custom egress/ingress/nat rules.
53
53
54
-
## IPSec Peering
54
+
## VPC Peering
55
55
56
-
Alternatively, it is also possible to setup an [IPSec peering connection](https://search.opentofu.org/provider/kowabunga-cloud/kowabunga/latest/docs/resources/kawaii_ipsec) with **Kawaii**, should you need to provide some admin users with remote access capabilities.
56
+
Kowabunga VPC peering allows you to inter-connect 2 projects subnets. This can come in handy if you have 2 specific applications, managed by different set of people, and still need both to communicate all together.
57
+
58
+
The following example extends our **Kawaii** gateway configuration to peer with 2 subnets:
59
+
60
+
- the underlying Ceph one, used to directly access storage resources.
61
+
- the one form **marvelous** project, allowing bi-directional connectivity throuh associated ingress/egress firewalling rules.
Note that setting up VPC peering requires you to configure and allow connectivity on both projects ends. Network is bi-directional and, for security measures, one project cannot arbitrary decide to peer with another one without mutual consent.
94
+
{{< /alert >}}
95
+
96
+
## IPsec Peering
97
+
98
+
Alternatively, it is also possible to setup an [IPsec peering connection](https://search.opentofu.org/provider/kowabunga-cloud/kowabunga/latest/docs/resources/kawaii_ipsec) with **Kawaii**, should you need to provide some admin users with remote access capabilities.
99
+
100
+
This allows connecting your private subnet with other premises or Cloud providers as to extend the reach of services behind the walls of Kowabunga.
101
+
102
+
The above example extend our **Kawaii** instance with an IPsec connection with the ACME remote office. The remote IPsec engine public IP address will be **5.6.7.8** and expose the private network **172.16.1.0/24**.
0 commit comments