/gcp-squid-proxy-psc

Use Private Service Connect (PSC) and Squid Proxy to access resources in another VPC

Primary LanguageHCL

Use Private Service Connect (PSC) and Squid Proxy to access resources in another VPC

There are tons of ways to connect VPCs in Google Cloud. This example uses Private Service Connect and a Squid Proxy VM to allow Source VPC Clients to access resources in the Destination VPC.

Connectivity overview

Read the associated blog post: How To Use Squid Proxy To Access Services In Another VPC Using Private Service Connect.

Deployment

Use Terraform to deploy the example setup.

  1. Set the required Terraform variables

    variables.tf

  2. Deploy the example infrastructure

    cd terraform
    terraform init
    terraform apply
  3. Try it for yourself

    Log in to the client VM:

    gcloud compute ssh client --tunnel-through-iap --project <project_id>

    Invoke a service in the destination VPC:

    curl -x http://proxy.xebia:3128 http://example-server.xebia/

    Invoke an internet url via the proxy:

    curl -x http://proxy.xebia:3128 https://www.google.com/

Clean up

Use Terraform to destroy the example setup.

  1. Set the required Terraform variables

    variables.tf

  2. Destroy the example infrastructure

    cd terraform
    terraform init
    terraform destroy