-
Notifications
You must be signed in to change notification settings - Fork 74
docs: add more information about egress in LGP hybrid #728
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: add more information about egress in LGP hybrid #728
Conversation
Preview ID generated: preview-joaqui-1759425422-51f1280 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
some nits but otherwise looks good! feel free to merge after addressing
src/langgraph-platform/hybrid.mdx
Outdated
### Egress to LangSmith and the control plane | ||
In the hybrid deployment model, your self-hosted data plane will send network requests to the control plane to poll for changes that need to be implemented in the data plane. Traces from data plane deployments also get sent to the LangSmith instance integrated with the control plane. This traffic to the control plane is encrypted, over HTTPS. The data plane authenticates with the control plane with a LangSmith API key. | ||
|
||
In order to enable this egress, you may need to update internal Firewall rules or cloud resources such as Security Groups. You can find a list of IP addresses to allow [here](/langsmith/cloud-architecture-and-scalability#ingress-into-langchain-saas). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In order to enable this egress, you may need to update internal Firewall rules or cloud resources such as Security Groups. You can find a list of IP addresses to allow [here](/langsmith/cloud-architecture-and-scalability#ingress-into-langchain-saas). | |
In order to enable this egress, you may need to update internal firewall rules or cloud resources (such as Security Groups) to [allow certain IP addresses](/langsmith/cloud-architecture-and-scalability#ingress-into-langchain-saas). |
src/langgraph-platform/hybrid.mdx
Outdated
In order to enable this egress, you may need to update internal Firewall rules or cloud resources such as Security Groups. You can find a list of IP addresses to allow [here](/langsmith/cloud-architecture-and-scalability#ingress-into-langchain-saas). | ||
|
||
<Warning> | ||
We do not currently support traffic over Private Link or Private Service Connect. This traffic will go over the internet. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We do not currently support traffic over Private Link or Private Service Connect. This traffic will go over the internet. | |
AWS PrivateLink or GCP Private Service Connect is currently not supported. This traffic will go over the internet. |
Preview ID generated: preview-joaqui-1759445527-8f7ce52 |
Overview
Adding an egress section to the lgp hybrid docs that give more color to how this traffic is sent, encrypted, authenticated.
Once diagram is updated to be excalidraw, i can add an icon showing this encrypted traffic for egress.
Type of change
Type: Update existing documentation
Related issues/PRs
Checklist
docs dev
src/docs.json
if neededAdditional notes
Tested by running locally: