Synadia Platform

Overview

By default, when Synadia Control Plane is deployed, it expects to be able to connect to NATS servers directly. This is the most common deployment model since all components are on the same network. However, there are situations when NATS servers are behind a firewall and Control Plane is not able to directly connect to them.

Synadia Private Link is a lightweight agent that can be deployed alongside the NATS cluster in order to initiate an outbound connection to Control Plane. It works by establishing a secure WebSocket connection to Control Plane and then Control Plane-initiated NATS connections are proxied through it to the NATS servers.

Install

Binary

Download from GitHub Releases

OCI Image

An OCI image (Docker/Podman) is available in the Synadia Registry.

docker pull registry.synadia.io/private-link:latest

Use tag latest for latest version or a specific SemVer version, e.g. 1.0.1, for specific release.

Kubernetes

View the Helm Chart documentation on ArtifactHub.

Setup

In order to run Private Link, it requires a token generated from Synadia Control Plane. This token is used to authenticate the connection between Private Link and Control Plane.

Reference

usage: synadia-private-link [<flags>]

Private Link

Global Flags:
  -h, --help               Show context-sensitive help
  -v, --version            Show application version.
      --platform-url="https://cloud.synadia.com"
                           URL for the Synadia Platform (Synadia Control Plane /
                           Synadia Cloud) ($SPL_PLATFORM_URL)
      --nats-url=NATS-URL  URL for NATS Server Connection ($SPL_NATS_URL)
      --token=TOKEN        Synadia Platform Token ($SPL_TOKEN)
      --tlscert=TLSCERT    TLS Certificate ($SPL_TLS_CERT)
      --tlskey=TLSKEY      TLS Key ($SPL_TLS_KEY)
      --tlsca=TLSCA        TLS CA ($SPL_TLS_CA)
      --[no-]insecure      No TLS Validation ($SPL_INSECURE)
  -V, --[no-]verbose       Enable verbose logging
Previous
system