Skip to main content

Connecting Striim Cloud on Google Cloud Platform to data services behind Striim Forwarding Agent

This topic explains how to use a Striim Forwarding Agent when you prefer to push data to Striim Cloud rather than allowing Striim to initiate direct connections to your sources. It describes how to enable a secure, private connection from a Striim Forwarding Agent (running on-premises or in another cloud) to Striim Cloud (hosted on Google Cloud) by leveraging your GCP VPC and Google Cloud Private Service Connect (PSC).

Overview

The Striim Forwarding Agent reaches Striim Cloud without using the public internet. Traffic stays on private networks: Striim Forwarding Agent → your GCP VPC (via Interconnect/VPN/peering) → PSC endpoint → Striim Cloud.

When the source VM already runs inside GCP, only a PSC connection between your project and Striim is required.

What this solution covers

  • Using your GCP network as the private transit for Striim Forwarding Agent → Striim Cloud.

  • Creating a PSC Published Service / Service Attachment (Striim side) and a PSC Endpoint (customer side), or vice-versa per agreed pattern.

  • Support for Striim Forwarding Agents located:

    • On-premises (via Cloud Interconnect or VPN into customer GCP VPC)

    • Cross-cloud (AWS/Azure/Oracle Cloud Infrastructure (OCI)) with private connectivity into customer GCP VPC

    • GCP (native VMs or Google Kubernetes Engine (GKE) in the customer project)

For on-premises Striim Forwarding Agents, the connection routes through your GCP VPC via VPN to reach Striim Cloud privately:

gcp-psc-fwd-agent-on-prem.png

For cross-cloud Striim Forwarding Agents in AWS, Azure, or OCI, the connection routes through your GCP VPC via inter-cloud connectivity to reach Striim Cloud privately:

gcp-psc-fwd-agent-cross-cloud.png

Prerequisites

  • A GCP project & VPC capable of hosting a PSC endpoint.

  • Private connectivity from Striim Forwarding Agent location to the customer GCP VPC (Interconnect, VPN, or peering).

  • Appropriate IAM to create and approve PSC resources.

  • VPC firewall rules allowing traffic from the Striim Forwarding Agent to the PSC endpoint and onward to Striim Cloud over ports - 30000, 30002, 30003, 30010-30200.

  • A Striim service with admin role to the striim cloud account as well as Customer GCP console.

  • Striim service (sys) password

Prepare customer VPN with on-prem/cross-cloud network

Step-by-step process to setup private service connect (PSC)

This process involves coordination between you and the Striim team to establish the PSC connection. The Striim team provides the service attachment, while you create the corresponding PSC endpoint in your GCP project.

  1. Prepare striim network:

    The customer submits a request to the prepaid Striim service with Private Service Connect for forwarding agent compatibility

  2. Striim information sharing list for customer:

    • The Striim team prepares the environment and shares the Private Service Connect attachment with the customer. The PSC attachment looks like:

    projects/saas-app1-stg/regions/us-west1/serviceAttachments/k8s1-sa-o2br638g-defau
    • The Striim team also shares the Striim service sys password to generate the Striim agent key-store password

  3. Create Private service connect connection in customer GCP network:

    • The customer's GCP VPC network must be in the same region as the Striim service.

    • Create a subnet to host Private Service Connect.

    • Create a private static IP address from the psc-subnet IP range.

    • Create the Private Service Connect connection using the PSC attachment shared by the Striim team.

    • After successfully creating the PSC, you can check in the GCP console within the private service connect service page, under CONNECTED ENDPOINTS. This PSC will show in Pending state until the request is accepted by the Striim team.

      gcp-psc-connected-endpoints.png
    • Once the Striim team accepts the connection, the PSC endpoint status will change to Approved.

  4. Test the connection from the customer network:

    • SSH to the Striim Forwarding Agent VM

    • Use the telnet command to check connection using PSC endpoint IP e.g. 10.10.0.12

    telnet 10.10.0.12 30000

    Also try the following ports: 30001, 3003, 30010-30200