Chapter 1. Private Service Connect overview


You can create a private OpenShift Dedicated cluster on Google Cloud using Google Cloud’s security-enhanced networking feature Private Service Connect (PSC).

1.1. Understanding Private Service Connect

Private Service Connect (PSC), a capability of Google Cloud networking, enables private communication between services across different projects or organizations within Google Cloud. Users that implement PSC as part of their network connectivity can deploy OpenShift Dedicated clusters in a private and secured environment within Google Cloud without any public facing cloud resources.

For more information about PSC, see Private Service Connect.

Important

PSC is only available on OpenShift Dedicated version 4.17 and later, and is only supported by the Customer Cloud Subscription (CCS) infrastructure type.

1.2. Prerequisites

In addition to the prerequisites that you need to complete before deploying any OpenShift Dedicated on Google Cloud cluster, you must also complete the following prerequisites to deploy a private cluster using Private Service Connect (PSC):

  • A pre-created Virtual Private Cloud (VPC) with the following subnets in the same Google Cloud region where your cluster will be deployed:

    • A control plane subnet
    • A worker subnet
    • A subnet used for the PSC service attachment with the purpose set to Private Service Connect

      Important

      The subnet mask for the PSC service attachment must be /29 or larger and must be dedicated to an individual OpenShift Dedicated cluster. Additionally, the subnet must be contained within the Machine CIDR range used while provisioning the OpenShift Dedicated cluster.

      For information about how to create a VPC on Google Cloud, see Create and manage VPC networks in the Google Cloud documentation.

  • Provide a path from the OpenShift Dedicated cluster to the internet for the domains and ports listed in the Google Cloud firewall prerequisites in the Additional resources section.
  • Enabled Cloud Identity-Aware Proxy API at the Google Cloud project level.

In addition to the requirements listed above, clusters configured with the Service Account authentication type must grant the IAP-Secured Tunnel User role to osd-ccs-admin service account.

For more information about the prerequisites that must be completed before deploying an OpenShift Dedicated on Google Cloud, see Customer Requirements.

Note

PSC is supported with the Customer Cloud Subscription (CCS) infrastructure type only. To create an OpenShift Dedicated on Google Cloud using PSC, see Creating a cluster on Google Cloud with Workload Identity Federation.

1.3. Private Service Connect architecture

The Private Service Connect (PSC) architecture includes producer services and consumer services. Using PSC, the consumers can access producer services privately from inside their VPC network. Similarly, it allows producers to host services in their own separate VPC networks and offer a private connect to their consumers.

The following image depicts how Red HAT SREs and other internal resources access and support clusters created using PSC.

  • A unique PSC service attachment is created for each OSD cluster in the customer Google Cloud project. The PSC service attachment points to the cluster API server load balancer created in the customer Google Cloud project.
  • Similar to service attachments, a unique PSC endpoint is created in the Red Hat Management Google Cloud project for each OSD cluster.
  • A dedicated subnet for Google Cloud Private Service Connect is created in the cluster’s network within the customer Google Cloud project. This is a special subnet type where the producer services are published via PSC service attachments. This subnet is used to Source NAT (SNAT) incoming requests to the cluster API server. Additionally, the PSC subnet must be within the Machine CIDR range and cannot be used in more than one service attachment.
  • Red Hat internal resources and SREs access private OSD clusters using the connectivity between a PSC endpoint and service attachment. Even though the traffic transits multiple VPC networks, it remains entirely within Google Cloud.
  • Access to PSC service attachments is possible only via the Red Hat Management project.

Figure 1.1. PSC architecture overview

PSC architecture overview

1.4. Next steps

Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동