This page describes the steps to successfully create and provision a Partner Cross-Cloud Interconnect for Amazon Web Services (AWS) connection from AWS if you already have an activation key.
Before you start the Partner Cross-Cloud Interconnect for AWS provisioning process, ensure that the following conditions are met:
- You must already have an AWS account.
- You must also create a Virtual Private Cloud (VPC) network, if it doesn't already exist, to connect your transport resource to.
If you want to initiate a connection from the AWS Console, follow the instructions on the AWS Console for creating the required resource, and provide the project and region information where you want the connection to land in Google Cloud. After AWS has created the resource, you must create the Google Cloud resource with the provided activation key.
To achieve a successful connection, you must create the transport resource.
Follow these instructions to create the transport.
Before you begin
Before you get started, review the following sections.
Create or select a project
To make it easier to configure Network Connectivity Center, start by identifying a valid project.
- Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
-
In the Google Cloud console, on the project selector page, select or create a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator role
(
roles/resourcemanager.projectCreator), which contains theresourcemanager.projects.createpermission. Learn how to grant roles.
-
Verify that billing is enabled for your Google Cloud project.
-
Install the Google Cloud CLI.
-
If you're using an external identity provider (IdP), you must first sign in to the gcloud CLI with your federated identity.
-
To initialize the gcloud CLI, run the following command:
gcloud init -
In the Google Cloud console, on the project selector page, select or create a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator role
(
roles/resourcemanager.projectCreator), which contains theresourcemanager.projects.createpermission. Learn how to grant roles.
-
Verify that billing is enabled for your Google Cloud project.
-
Install the Google Cloud CLI.
-
If you're using an external identity provider (IdP), you must first sign in to the gcloud CLI with your federated identity.
-
To initialize the gcloud CLI, run the following command:
gcloud init If you are using the Google Cloud CLI, set your project ID by using the
gcloud config setcommand.gcloud config set project PROJECT_ID
Replace
PROJECT_IDwith your unique project ID.The gcloud CLI instructions on this page assume that you have set your project ID.
To confirm that you set the project ID correctly, use the
gcloud config listcommand.gcloud config list --format='text(core.project)'
Enable the Network Connectivity API
Before you can perform any tasks using Network Connectivity Center, you must enable the Network Connectivity API.
Console
To enable the Network Connectivity API, do the following:
In the Google Cloud console, go to the Network Connectivity Center page.
Click Enable.
Alternatively, you can enable the API by using the Google Cloud console API Library, as described in Enabling APIs.
Create the transport resource
API
Use the networkconnectivity.transports.create method:
POST https://networkconnectivity.googleapis.com/v1beta/projects/PROJECT/locations/LOCATION/transport/TRANSPORT_ID
curl \
-H "Authorization: Bearer $(gcloud auth print-access-token)" \
-H "Content-Type: application/json" \
https://networkconnectivity.googleapis.com/v1beta/projects/PROJECT/locations/LOCATION/transports?transportId=TRANSPORT_ID \
--data '
{
"bandwidth": "BANDWIDTH",
"network": "NETWORK",
"advertisedRoutes": ["IP_RANGE"],
"providedActivationKey": "ACTIVATION_KEY",
"stackType": "STACK_TYPE
}'
Replace the following values:
PROJECT: the name of the project in which you want to create the transportLOCATION: the name of the Google Cloud region where you want to provision connectivity, such as,us-west1TRANSPORT_ID: a name for the transport resourceBANDWIDTH: the chosen bandwidth for your connection, such as,BPS_1GNETWORK: the network in which you want to create the transportIP_RANGE: a comma-separated list of IP address rangesACTIVATION_KEY: the activation key that you have received from AWSSTACK_TYPE(optional): IP address version stack type. Must beIPV4_ONLYorIPV4_IPV6. Defaults toIPV4_ONLY
Establish VPC Network Peering
You can proactively establish VPC Network Peering at the
Google Cloud end. To do this, use the peeringNetwork resource
and ensure that you create a peering with the same stack type. The default
stack type matches the transport resource using IPV4_ONLY.
To receive the AWS routes, you must enable the
Import custom routes field.
The MTU in the peering VPC network is explicitly set to the
maximum in order to avoid MTU issues in the connectivity. If you're using an
MTU less than 8896, you might get a warning WARNING: Some requests generated
warnings: - Network MTU 1460B does not match the peer's MTU 8896B. In that
case, you must ensure that you're using matching MTU configurations between
your Google Cloud VPC network and the
AWS VPC network. If these are mismatched, you might
need to override MTU values to the lowest common denominator. For example, if
you're using 8896 in Google Cloud and 8800 in AWS,
everything in Google Cloud must be configured as 8800.
gcloud
To establish VPC Network Peering, use the
gcloud compute networks peerings create command.
gcloud compute networks peerings create "TRANSPORT_NAME" \
--network="VPC_NETWORK"
--peer-network="PEERING_NETWORK" \
--stack-type=STACK_TYPE \
--import-custom-routes
--export-custom-routes
Replace the following values:
TRANSPORT_NAME: the name of the transport that you createdVPC_NETWORK: the name of the VPC network that you want to list the routes forPEERING_NETWORK: the name of the VPC network provided by theTransportresourceSTACK_TYPE: IP address version stack type. Must beIPV4_ONLYorIPV4_IPV6. Defaults toIPV4_ONLY
If the command is successful, the output's state field has the value
ACTIVE.
API
To establish VPC Network Peering, use the
compute.networks.addPeering method.
POST https://compute.googleapis.com/compute/v1/projects/PROJECT/global/networks/NETWORK/addPeering
Replace the following values:
PROJECT: the name of the project that you are peeringNETWORK: the name of the network resource to add peering to
What's next
- To find answers to common questions about Cloud Interconnect architecture and features, see the Cloud Interconnect FAQ.
- To find out more about Cloud Interconnect, see the Cloud Interconnect overview.
- To learn about best practices when planning for and configuring Cloud Interconnect, see Best practices.
- To find Google Cloud resource names, see the
Cloud Interconnect APIs.