Skip to main content

Private Data Plane Overview

A private data plane (PDP) provides dedicated infrastructure for a single organization to run its integrations. Unlike a cloud data plane which runs on shared multi-tenant infrastructure managed by WSO2, a private data plane gives your organization full isolation at the runtime level. This makes it the right choice when you have strict data residency requirements, need to meet compliance standards like GDPR or HIPAA, or want runtime traffic to stay within your own network boundary. Private data planes can be deployed on Azure, AWS, GCP, or on-premises infrastructure.

Infrastructure requirements

  • An upstream-compatible Kubernetes cluster
  • A container registry
  • A key vault (secret store)
  • A logging service or log storage

System components

Setting up a private data plane involves a Helm installation on your Kubernetes infrastructure. The following components are installed:

  • Cilium CNI and service mesh
  • WSO2 Cloud API gateways and related components
  • WSO2 Cloud PDP agent
  • Observability and logging APIs, along with observability agents
  • Flux controller

All components receive automatic updates through the Flux controller connected to the WSO2 Cloud Update Management System.

Connectivity with the control plane

All communication from the private data plane to the control plane is outbound, so you do not need to open any inbound IP:Port. If your organization restricts outbound traffic, you must permit access to the public IP range of the WSO2 Cloud control plane.

Data plane componentEndpointDirectionProtocol
PDP agentWSO2 Cloud control plane (mizzen server)OutboundWSS
PDP agentKubernetes API serverOutbound (cluster internal)HTTPS, WS
APIM / local adaptorGlobal adaptorOutboundHTTPS
APIM / local adaptorAzure Service Bus (control plane)OutboundAMQP
APIM / enforcerEvent hub (control plane)OutboundAMQP
Secret resolverCloud secret storeOutbound (VPC internal)HTTPS
Container registryContainer registry (public)InboundHTTPS
Container registryContainer registryOutbound (VPC internal)HTTPS
Certificate managerAzure DNS serviceOutboundHTTPS
Certificate managerLet's EncryptOutboundHTTPS
Flux source controllerGitHubOutboundHTTPS
Flux Helm controllerWSO2 Integration Platform container registryOutboundHTTPS

All communication is secured using TLS.

What's next