Managing Private Endpoints
Create, edit, and delete private endpoints in Resource Manager.
With private endpoints, you can access nonpublic cloud resources in your tenancy from Resource Manager. For example, configure a private compute instance using Terraform's remote exec functionality and access Terraform configurations in a private GitHub server.
You can perform the following tasks with private endpoints:
- Listing Private Endpoints
- Creating a Private Endpoint
- Getting a Private Endpoint's Details
- Getting the Reachable IP Address for a Private Endpoint
- Updating a Private Endpoint
- Managing Security Attributes for a Private Endpoint
- Moving a Private Endpoint to a Different Compartment
- Deleting a Private Endpoint
Required IAM Policy
To manage private endpoints, you must have permission to manage private endpoints in the tenancy, and to use virtual network resources, such as VCNs and subnets. For more information, see Manage Private Templates.
If you're new to policies, see IAM Policies Overview.
Scenarios
Review common scenarios for using private endpoints with Resource Manager.
Other scenarios also exist. You can reach any private resource with a private IP, using a private endpoint in Resource Manager. For example, connect to a Kubernetes cluster.
Private Git Server
Give Resource Manager access to a Git server that isn't accessible over the internet. User these instructions for a private server that you host at Oracle Cloud Infrastructure or on-premises.
Private Remote Exec
Access private instances with Remote Exec.
When accessing a private instance with Remote Exec, you must use a reachable IP address.
See also Getting the Reachable IP Address for a Private Endpoint.
Managing Security Attributes
You can use Zero Trust Packet Routing (ZPR) along with or in place of network security groups to manage network access to OCI resources . To do this, define ZPR policies that govern how resources communicate with each other, and then add security attributes to those resources. For more information, see Zero Trust Packet Routing.
If an endpoint has a Zero Trust Packet Routing (ZPR) security attribute, traffic to the endpoint must satisfy ZPR policies and also all NSG and security list rules. For example, if you're already using NSGs and you add a security attribute to an endpoint, all traffic to the endpoint is blocked. From then onward, a ZPR policy must explicitly allow traffic to the endpoint.
Applying Tags
Apply tags to resources to help organize them according to your business needs. You can apply tags when you create a resource, and you can update a resource later to add, revise, or remove tags. For general information about applying tags, see Resource Tags.