This page provides the technical capabilities and limitations of the Managed Databases (also called Cloud Databases) for Kafka Connect offer.
We continuously improve our offers. You can follow and submit ideas to add to our roadmap.
Capabilities and limitations
Supported regions
To view Cloud Databases availability, please see our regions and availability webpage.
Entire database instances have to be in the same region.
Plans
Three plans are available:
- Essential
- Business
- Enterprise
Here is an overview of the various plans' capabilities:
Plan | Number of nodes | Additional nodes |
---|---|---|
Essential | 1 | No |
Business | 3 | No |
Enterprise | 6 | No |
Your choice affects the number of nodes your cluster runs or the SLA.
Be aware that you will be able to upgrade your plan but you won't be able to downgrade it afterward.
Nodes
- Essential: the cluster consists of one node.
- Business: the cluster is delivered with 3 nodes.
- Enterprise: the cluster is delivered with 6 nodes.
Hardware resources
Here are the node types you can choose from:
Name | Storage | vCores | Memory (GB) |
---|---|---|---|
db1-4 | N/A | 2 | 4 |
db1-7 | N/A | 2 | 7 |
db1-15 | N/A | 4 | 15 |
db1-30 | N/A | 8 | 30 |
All nodes of a given cluster should be of the same type and distributed in the same region.
Features
Network
Public as well as private networking (vRack) can be used for all the offers.
Ingress and Egress traffic are included in the service plans and unmetered.
The database service's IP address is subject to change periodically. Thus, it is advised not to rely on these IPs for any configuration, such as connection or egress policy. Instead, utilize the provided DNS record and implement CIDR-based egress policies for more robust and flexible network management.
Private network considerations
Here are some considerations to take into account when using a private network:
- Network ports are created in the private network of your choice. Thus, further operations on that network might be restricted - e.g. you won’t be able to delete the network if you didn’t stop the Cloud Databases services first.
- When connecting from an outside subnet, the OpenStack IP gateway must be enabled in the subnet used for the Database service. The customer is responsible for any other custom network setup.
- Subnet sizing should include considerations for service nodes, other co-located services within the same subnet, and an allocation of additional available IP addresses for maintenance purposes. Failure to adequately size subnets could result in operational challenges and the malfunctioning of services.
- OpenStack subnets routes announcement will not be applied to your services.
- You can only create private network services if you are the original owner of the network. You cannot create private network services on a shared network.
Authorized IPs
Once your service is up and running, you will be able to specify IP addresses (or CIDR blocks) to authorize incoming traffic. Until then, your service will be unreachable.
Advanced parameters
You can further customize your Kafka Connect by using advanced parameters. See our Kafka Connect - Advanced Parameters References guide for more information on the supported parameters.
Logs and metrics
Logs and metrics are available through the Control Panel and the API. Additionally, cross-service integration can be configured to leverage your logs and metrics in other Cloud Database services. You could then view your Kafka Connect logs in OpenSearch and metrics in Grafana (metrics have to be exported first in a time series compatible engine such as PostgreSQL). See our Cloud Databases - Cross Service Integration guide for more information.
- Logs retention: 1000 lines of logs
- Metrics retention: 1 calendar month
Please note that if the cluster is deleted, logs and metrics are also automatically deleted.
Go further
For more information and tutorials, please see our other Managed Databases & Analytics or Platform as a Service guides. You can also explore the guides for other OVHcloud products and services.