You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For customers connecting to private resources in on-prem data centers, also refer to the [Sourcegraph Connect agent for Sourcegraph Cloud](#sourcegraph-connect-agent-for-sourcegraph-cloud) section.
175
+
174
176
<Callouttype="note">
175
177
Learn more in the [Sourcegraph Cloud docs](/cloud).
176
178
</Callout>
@@ -403,6 +405,56 @@ Enterprise Portal also handles Sourcegraph licensing and metering. Sourcegraph w
403
405
docs](/admin/enterprise-portal).
404
406
</Callout>
405
407
408
+
### Sourcegraph Connect agent for Sourcegraph Cloud
409
+
410
+
Sourcegraph Cloud supports connecting to private code hosts and artifact registries in the customer's network by deploying the Sourcegraph Connect tunnel agent in the customer's network.
411
+
412
+
Sourcegraph Connect consists of three components:
413
+
414
+
-**Connect tunnel clients:** Forward proxy clients for the Sourcegraph Cloud instance's containers to reach the customer's private code hosts and artifact registries, through the tunnel server.
415
+
- Clients are managed by Sourcegraph, and deployed in the customer's Sourcegraph Cloud instance's VPC.
416
+
-**Connect tunnel servers:** The broker between agents and clients, it authenticates agents and clients, enforces ACLs, sets up mTLS, and proxies encrypted traffic between agents and clients.
417
+
- Tunnels are managed by Sourcegraph, and deployed in the customer's Sourcegraph Cloud instance's VPC.
418
+
- mTLS certificates are rotated every 6 hours by default.
419
+
-**Connect agents:** Deployed by the customer inside their network, agents proxy and encrypt traffic between the customer's private resources and the Sourcegraph Cloud tunnel clients.
420
+
- The agent has its own identity, and using credentials provided to the customer during deployment, the agent authenticates and establishes a secure connection with the tunnel server. Only agents are allowed to establish secure connections with the tunnel server, and the server only accepts a connection if the agent's identity is approved.
421
+
- Agents can only communicate with permitted code hosts and artifact registries.
422
+
- The handshake between agents and tunnel servers occurs over a mTLS-encrypted connection using TCP/HTTP2 (gRPC) on port 50050.
Observability encapsulates the monitoring and debugging of Sourcegraph deployments. Sourcegraph is designed and ships several observability tools and out-of-the-box capabilities to enable visibility into the health and state of a Sourcegraph deployment.
@@ -428,3 +480,18 @@ Debugging includes [tracing](/self-hosted/observability/tracing) and [logging](/
428
480
<Callouttype="note">
429
481
Learn more in the [Observability docs](/self-hosted/observability).
430
482
</Callout>
483
+
484
+
## Glossary
485
+
486
+
### Standard ports
487
+
488
+
Unless otherwise mentioned:
489
+
490
+
- HTTPS: 443
491
+
- SSH: 22
492
+
- HTTP: 80
493
+
494
+
### Data encryption
495
+
496
+
- Where TLS is used, at minimum, TLS 1.2 (TLS 1.3 also supported) is required.
Copy file name to clipboardExpand all lines: docs/cloud/private-connectivity-sourcegraph-connect.mdx
+13-41Lines changed: 13 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Private Resources in On-Prem Data Centers via Sourcegraph Connect Agent
1
+
# Private resources in on-prem data centers via the Sourcegraph Connect agent
2
2
3
3
<Callouttype="note">
4
4
This feature is in the Experimental stage. [Contact
@@ -9,35 +9,7 @@ As part of the [Enterprise tier](https://sourcegraph.com/pricing), Sourcegraph C
9
9
10
10
## How it works
11
11
12
-
Sourcegraph Connect consists of three components:
13
-
14
-
### Tunnel Clients
15
-
16
-
Forward proxy clients for the Sourcegraph Cloud instance's containers to reach the customer's private code hosts and artifact registries, through the tunnel server.
17
-
18
-
Managed by Sourcegraph, and deployed in the customer's Sourcegraph Cloud instance's VPC.
19
-
20
-
### Tunnel Server
21
-
22
-
The broker between agents and clients, it authenticates agents and clients, enforces ACLs, sets up mTLS, and proxies encrypted traffic between agents and clients.
23
-
24
-
Managed by Sourcegraph, and deployed in the customer's Sourcegraph Cloud instance's VPC.
25
-
26
-
### Tunnel Agents
27
-
28
-
Deployed by the customer inside their network, agents proxy and encrypt traffic between the customer's private resources and the Sourcegraph Cloud tunnel clients.
29
-
30
-
The agent has its own identity, and using credentials provided to the customer during deployment, the agent authenticates and establishes a secure connection with the tunnel server. Only agents are allowed to establish secure connections with the tunnel server, and the server only accepts a connection if the agent's identity is approved.
31
-
32
-
Agents can only communicate with permitted code hosts and artifact registries.
0 commit comments