Routing Instance
The Routing Instance
(RI) object is a core resource in the Cloud Router resource model. It is designed to create network topologies enabling network connectivity between cloud resources in different networks.
General rules and recommendations
When using Cloud Router and Cloud Interconnect, we strongly recommend to follow these rules and guidelines:
-
All network segments (both cloud and on-prem sides) connected via
Routing Instance (RI)
must use non-overlapping, coordinated IP addressing. Subnet IP prefixes you add to an RI must be coordinated between themselves. You cannot add two identical IP prefixes to a single RI.On-Prem
IP addressing must be aligned with IP addressing in the virtual cloud networks. IP address overlapping will cause IP connectivity problems. Plan IP addressing carefully. -
Network communication across virtual networks is strictly confined to a single cloud organization. All Cloud Router and Cloud Interconnect resources, as well as the virtual cloud networks that are going to be integrated into a network topology using an
RI
, must reside in cloud folders within the same cloud organization. For network connectivity between virtual cloud networks belonging to different cloud organizations, consider migrating clouds from several organizations into a single one.If such migration is not feasible, you have to obtain formal written consents (on paper) from owners of all such cloud organizations for cross-organization networking. For detailed information about the verification procedure, contact Yandex Cloud support.
-
No direct exchange of routing info between any private connections (PRCs) within an
RI
is allowed. -
The IP prefixes announced by the customer’s network hardware also get into the
RI
and from there to the virtual networks connected to thatRI
. Currently, you cannot view these IP prefixes at theRI
level. We recommend getting this information from the customer's network hardware. In some cases, if routing issues arise, you may want to contact support for this information. -
You can only add a VPC network ID,
vpc_network_id
, to oneRouting Instance
at a time. An attempt to add the same ID to anotherRouting Instance
will fail. -
You can only add a private connection ID,
cic_private_connection_id
, to oneRouting Instance
at a time. An attempt to add the same ID to anotherRouting Instance
will fail.
Tips for configuring private connections
-
Always set up two Cloud Interconnect communication circuits through two points of presence. This will keep your services up and running if one of the circuits fails.
-
To simplify the setup of fault-tolerant BGP routing, consider using the same BGP ASN for multiple customer edge routers connecting to Cloud Interconnect. You can use different BGP ASNs, e.g., when setting up connections via telecom providers. Keep in mind that Yandex Cloud is not responsible for configuring the customer and telecom provider network hardware.
-
If the customer's two Cloud Interconnect communication circuits connect to different routers, ensure iBGP connectivity is configured between these customer routers. Without such connectivity, if one of the communication circuits fails on one of the routers, the remaining one will learn nothing about the failure and the dead circuit's traffic will not be automatically rerouted to the live circuit over BGP.
-
Use prefixes of different lengths for BGP announcements on customer edge routers if you need to distribute outgoing traffic from cloud networks across multiple Cloud Interconnect communication circuits:
- Short prefixes, such as
/8
, have the lowest route priority. - Long prefixes, such as
/32
, have the highest route priority.
For more information on traffic distribution between multiple communication circuits, see use cases.
- Short prefixes, such as
-
When selecting a communication circuit for outgoing traffic from the customer infrastructure to cloud networks, consider using the
Local Preference
BGP attribute on the customer edge router. For more information on traffic distribution between multiple communication circuits, see use cases.
Networking limitations
-
You can use Cloud Interconnect along with a NAT gateway if customer edge routers do not announce the
0.0.0.0/0
default route over BGP to Yandex Cloud. If customer edge routers do announce the0.0.0.0/0
default route over BGP to Yandex Cloud, you cannot use a NAT gateway. -
Currently, Yandex Cloud does not support routing of outgoing traffic from cloud subnets to the customer infrastructure using BGP community
attributes.
Alert
You cannot use matching prefixes in VPC route tables and customer edge router announcements at the same time.
Working with security groups
Security groups are used to protect Yandex Cloud resources and cannot be used for filtering traffic outside Yandex Cloud.
Security group rules should be set up for the prefixes announced by customer edge routers to Yandex Cloud. For example, to allow access from the customer infrastructure to a web application (port 443) deployed in Yandex Cloud, set up a security group as follows:
ingress {
protocol = "TCP"
port = 443
description = "Allow ingress traffic from Interconnect to Web server"
v4_cidr_blocks = ["172.16.1.5/32"]
}
egress {
protocol = "ANY"
description = "We allow any egress traffic"
v4_cidr_blocks = ["10.0.0.0/8"]
}
The Egress
security group rule allows any cloud resources to access customer infrastructure resources on any port without any restriction.
If required, you can use more granular rules to only allow access to specific IP addresses or subnets and ports:
ingress {
protocol = "TCP"
port = 443
description = "Allow ingress traffic from Interconnect to Web server"
v4_cidr_blocks = ["172.16.1.5/32"]
}
egress {
protocol = "TCP"
port = 3389
description = "Allow RDP traffic to server behind Interconnect"
v4_cidr_blocks = ["10.10.10.10/32"]
}