Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Anda dapat memilih salah satu dari dua opsi jaringan yang berbeda saat menyediakan organisasi Apigee baru:
Peering Non-VPC atau Peering VPC.
Kedua opsi ini dirangkum di bawah.
Opsi Peering Non-VPC menggunakan Private Service Connect (PSC) untuk merutekan traffic dari klien ke Apigee (traffic northbound) dan dari Apigee ke layanan target yang dihosting di project Google Cloud Anda (traffic southbound). Dalam model ini, Anda tidak perlu
menyediakan rentang IP khusus di jaringan selama penyediaan Apigee. Lihat juga
Pola jaringan southbound
dan Jaringan northbound dengan Private Service Connect.
Opsi peering VPC menggunakan akses layanan pribadi
untuk membuat koneksi pribadi antara jaringan VPC Anda dan jaringan yang dimiliki oleh Apigee. Model ini menggunakan peering jaringan VPC untuk menghubungkan jaringan Anda dengan jaringan Apigee. Model peering mengharuskan Anda mengalokasikan rentang IP khusus di jaringan saat menyediakan instance Apigee baru.
Selain itu, Anda juga dapat memanfaatkan Private Service Connect (PSC) untuk merutekan traffic dari klien ke Apigee (traffic northbound) dan dari Apigee ke layanan target yang dihosting di project Google Cloud Anda (traffic southbound) bersama dengan peering VPC.
Opsi Peering Non-VPC
Opsi ini tidak memerlukan peering VPC. Dengan pendekatan ini, Anda tidak perlu memberikan jaringan dan rentang IP selama proses penyediaan Apigee. Sebagai gantinya, Anda menggunakan Private Service Connect (PSC) untuk merutekan traffic northbound (dari klien ke Apigee) dan traffic southbound (dari Apigee ke layanan target yang berjalan di project Google Cloud Anda).
PSC memungkinkan koneksi pribadi antara produsen layanan (Apigee) dan konsumen layanan (satu atau beberapa project Cloud lainnya yang Anda kontrol). Dengan penyediaan peering non-VPC, permintaan akan melewati load balancer eksternal global atau load balancer eksternal regional ke satu titik lampiran, yang disebut lampiran layanan (Gambar 1) menggunakan PSC.
Secara tradisional, Apigee telah menggunakan peering jaringan VPC untuk memungkinkan komunikasi antara jaringan virtual private cloud (VPC) yang dikelola oleh Anda dan jaringan VPC yang dikelola oleh Apigee. Konfigurasi ini memungkinkan komunikasi dua arah
antara dua jaringan VPC dan memungkinkan proxy Apigee API memanggil layanan target yang di-deploy di
VPC Anda. Jika aplikasi target berada di jaringan yang di-peering, Apigee dapat mengakses alamat IP-nya dan merutekan
traffic proxy API ke aplikasi tersebut.
Lihat juga ringkasan arsitektur Apigee.
Untuk membuat instance Apigee, Anda harus mengalokasikan sepasang Rentang Alamat IP (rentang CIDR /22 dan /28) ke Apigee dan melakukan peering VPC antara jaringan Anda dan jaringan Apigee. Setiap instance Apigee memerlukan
rentang CIDR /22 dan /28 yang tidak tumpang-tindih. Platform runtime Apigee diberi alamat IP dari dalam rentang CIDR ini. Oleh karena itu, rentang tersebut harus
dicadangkan untuk Apigee dan tidak digunakan oleh aplikasi lain di jaringan VPC Anda.
Apigee hanya mendukung peering dengan satu jaringan; namun, banyak perusahaan memiliki beberapa jaringan tempat aplikasi dan layanan di-deploy. Dalam hal ini, Anda dapat menggunakan PSC untuk menghubungkan Apigee secara pribadi ke layanan target yang berjalan di seluruh jaringan VPC selain jaringan peering (Gambar 2).
Lihat
Pola jaringan southbound untuk mengetahui informasi selengkapnya.
Gambar 2. Arsitektur Apigee dengan peering VPC. Untuk mengetahui detail arsitektur ini, lihat
ringkasan arsitektur
Apigee.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-05 UTC."],[[["\u003cp\u003eApigee offers two distinct networking options for new organizations: Non-VPC Peering and VPC Peering.\u003c/p\u003e\n"],["\u003cp\u003eNon-VPC Peering utilizes Private Service Connect (PSC) for both northbound (client to Apigee) and southbound (Apigee to target services) traffic, eliminating the need for dedicated IP ranges.\u003c/p\u003e\n"],["\u003cp\u003eVPC Peering uses private service access to create a private connection between your VPC network and Apigee's network and requires dedicated IP range allocation during Apigee instance provisioning.\u003c/p\u003e\n"],["\u003cp\u003eWhile VPC Peering can use both VPC peering and PSC for southbound routing, Non-VPC Peering only uses PSC.\u003c/p\u003e\n"],["\u003cp\u003eNon-VPC peering is exclusively available via the CLI provisioning steps, whereas VPC peering can be set up via the console or CLI, and both can be set up using Terraform.\u003c/p\u003e\n"]]],[],null,["# Apigee networking options\n\nYou can choose one of two distinct networking options when you provision a new Apigee organization:\n[Non-VPC Peering](#non-vpc-peering-architecture-overview) or [VPC peering](#vpc-peering-architecture-overview).\nThese two options are summarized below.\n\n- The Non-VPC Peering option uses [Private Service Connect](/vpc/docs/private-service-connect) (PSC) to route traffic from clients to Apigee (northbound traffic) and from Apigee to target services hosted in your Google Cloud projects (southbound traffic). In this model, you do not need to provide dedicated IP ranges in your network during Apigee provisioning. See also [Southbound networking patterns](/apigee/docs/api-platform/architecture/southbound-networking-patterns-endpoints) and [Northbound networking with Private Service Connect](/apigee/docs/api-platform/system-administration/northbound-networking-psc).\n- The VPC-peering option uses [private service access](/vpc/docs/private-services-access) to create a private connection between your VPC network and a network owned by Apigee. This model employs [VPC network peering](/vpc/docs/vpc-peering) to connect your network with Apigee's. The peering model requires you to allocate dedicated IP ranges in your network when you provision a new instance of Apigee. Additionally, you can also leverage [Private Service Connect](/vpc/docs/private-service-connect) (PSC) to route traffic from clients to Apigee (northbound traffic) and from Apigee to target services hosted in your Google Cloud projects (southbound traffic) along with VPC peering.\n\nNon-VPC Peering option\n----------------------\n\n| **Note:** The non-VPC peering option is available using the CLI provisioning steps only. Non-VPC peering through the Cloud console is not available at this time. You can use the CLI to provision Apigee with non-VPC peering for [subscription](/apigee/docs/api-platform/get-started/install-cli-non-peered), [Pay-as-you-go](/apigee/docs/api-platform/get-started/install-cli-non-peered-paygo), and [eval](/apigee/docs/api-platform/get-started/install-cli-non-peered-eval) organizations.\n|\n| We also support using [Terraform](https://www.terraform.io/) to provision Apigee\n| without VPC peering. The [Apigee terraform modules\n| repository](https://github.com/apigee/terraform-modules/tree/main/samples) on GitHub. provides end-to-end sample\n| modules and reusable terraform modules for Apigee.\n\n\nThis option does not require VPC peering. With this approach, you are not required to provide networks\nand IP ranges during the Apigee provisioning process. Instead, you use\n[Private Service Connect](/vpc/docs/private-service-connect)\n(PSC) for routing northbound traffic (from clients to Apigee) and southbound traffic (from Apigee to to target services running\nin your Google Cloud projects).\n\n\nPSC enables private connection between a service producer (Apigee) and a service consumer\n(one or more other Cloud projects that you control). With non-VPC peering provisioning, requests pass through\neither a global external load balancer or a regional external load balancer to a single point\nof attachment, called a [service attachment](/vpc/docs/private-service-connect#service-attachments) (Figure 1) using PSC.\n\n\nThe non-VPC provisioning steps are described in\n[Provision without VPC peering](/apigee/docs/api-platform/get-started/install-cli-non-peered)\n\n\n**Figure 1.** Apigee architecture without VPC peering. See also [Apigee architecture overview](/apigee/docs/api-platform/architecture/overview).\n\n\nVPC peering option\n------------------\n\n\nTraditionally, Apigee has employed [VPC\nnetwork peering](/vpc/docs/vpc-peering) to enable communication between a virtual private cloud (VPC) network managed\nby you and a VPC network managed by Apigee. This configuration allows bi-directional communication\nbetween the two VPC networks and allows Apigee API proxies to call target services deployed in\nyour VPC. If target applications are in the peered network, Apigee can access their IP addresses and route\nAPI proxy traffic to them.\nSee also [Apigee architecture overview](/apigee/docs/api-platform/architecture/overview).\n\nTo create an Apigee instance, you are required to allocate a pair of IP Address Ranges (a /22 and /28 CIDR range) to Apigee and perform\nthe VPC peering between your network and Apigee's network. Each Apigee instance requires\na non-overlapping CIDR range of /22 and /28. The Apigee runtime plane is assigned IP\naddresses from within this CIDR range. As a result, it's important that the range is\nreserved for Apigee and not used by other applications in your VPC network.\n\nApigee supports peering with only one network; however, many enterprises have multiple\nnetworks where applications and services are deployed. In these cases, you can use PSC to privately connect Apigee to\ntarget services running across VPC networks in addition to the peered network (Figure 2).\nSee [Southbound networking patterns](/apigee/docs/api-platform/architecture/southbound-networking-patterns-endpoints) for more information.\n**Figure 2.** Apigee architecture with VPC peering. For details of this architecture, see [Apigee\narchitecture overview](/apigee/docs/api-platform/architecture/overview).\n\n\nThe steps for provisioning Apigee with VPC peering are covered in\n[Provision\nwith VPC peering](/apigee/docs/api-platform/get-started/install-cli).\n\nHow to choose a networking option\n---------------------------------\n\n\nThe following table describes the features/approaches available with each networking option:"]]