Skip to content

Commit f7f2c0e

Browse files
committed
add cross-region docs for aws
1 parent a8d23fc commit f7f2c0e

File tree

2 files changed

+23
-4
lines changed

2 files changed

+23
-4
lines changed
269 KB
Loading

deploy-manage/security/private-connectivity-aws.md

Lines changed: 23 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Before you begin, review the following considerations:
3535

3636
### Private connections and regions
3737

38-
Private connectivity with AWS PrivateLink is supported only in AWS regions. Elastic does not yet support cross-region AWS PrivateLink connections. Your PrivateLink endpoint needs to be in the same region as your target deployments. Additional details can be found in the [AWS VPCE Documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-limitations).
38+
Private connectivity with AWS PrivateLink is supported only in AWS regions.
3939

4040
AWS interface virtual private connection (VPC) endpoints are configured for one or more availability zones (AZ). In some regions, our VPC endpoint service is not present in all the possible AZs that a region offers. You can only choose AZs that are common on both sides. As the names of AZs (for example `us-east-1a`) differ between AWS accounts, the following list of AWS regions shows the ID (e.g. `use1-az4`) of each available AZ for the service.
4141

@@ -135,14 +135,13 @@ $ aws ec2 describe-availability-zones --region us-east-1 | jq -c '.AvailabilityZ
135135

136136
The mapping will be different for your region. Our production VPC Service for `us-east-1` is located in `use1-az2`, `use1-az4`, `use1-az6`. We need to create the VPC Endpoint for the preceding mapping in at least one of `us-east-1e`, `us-east-1a`, `us-east-1b`.
137137

138-
139138
### Create your VPC endpoint and DNS entries in AWS [ec-aws-vpc-dns]
140139

141140
1. Create a VPC endpoint in your VPC using the service name for your region.
142141

143-
Refer to the [AWS documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#create-interface-endpoint) for details on creating a VPC interface endpoint to an endpoint service.
142+
Refer to the [AWS documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#create-interface-endpoint) for additional details on creating a VPC interface endpoint to an endpoint service.
144143

145-
Use [the service name for your region](#ec-private-link-service-names-aliases).
144+
Select **PrivateLink Ready partner services** as the endpoint type. Use [the service name for your region](#ec-private-link-service-names-aliases) as the **Service name**.
146145

147146
:::{image} /deploy-manage/images/cloud-ec-private-link-service.png
148147
:alt: PrivateLink
@@ -151,6 +150,10 @@ The mapping will be different for your region. Our production VPC Service for `u
151150

152151
The security group for the endpoint should, at minimum, allow for inbound connectivity from your instances' CIDR range on ports 443 and 9243. Security groups for the instances should allow for outbound connectivity to the endpoint on ports 443 and 9243.
153152

153+
:::{tip}
154+
You can also create a cross-region endpoint. Refer to [Setting up an cross-region Private Link connection](#ec-aws-inter-region-private-link).
155+
:::
156+
154157
2. Create a DNS record.
155158

156159
1. Create a Private hosted zone.
@@ -338,6 +341,22 @@ To access the deployment:
338341
:::{include} _snippets/private-connection-fleet.md
339342
:::
340343
344+
## Setting up an cross-region PrivateLink connection [ec-aws-inter-region-private-link]
345+
346+
AWS supports cross-region PrivateLink as described on the [AWS blog](https://aws.amazon.com/blogs/networking-and-content-delivery/introducing-cross-region-connectivity-for-aws-privatelink/).
347+
348+
This means your deployment on {{ecloud}} can be in a different region than the PrivateLink endpoints or the clients that consume the deployment endpoints.
349+
350+
In this example, `region 1` contains your VPC endpoint. `region 2` is the region where your deployment is hosted.
351+
352+
1. Begin to create your VPC endpoint in `region 1`, as described in [Create your VPC endpoint and DNS entries in AWS](#ec-aws-vpc-dns).
353+
354+
In the service settings, select **Enable Cross Region endpoint** and select `region 2` from the **Select a region** drop-down list.
355+
356+
1. [Create a private connection policy](#create-private-connection-policy) in the region where your deployment is hosted (`region 2`), and [associate it](#associate-private-connection-policy) with your deployment.
357+
358+
2. [Test the connection](#ec-azure-access-the-deployment-over-private-link) from a VM or client in `region 1` to your Private Link endpoint, and it should be able to connect to your {{es}} cluster hosted in `region 2`.
359+
341360
## Manage private connection policies
342361
343362
After you create your private connection policy, you can edit it, remove it from your deployment, or delete it.

0 commit comments

Comments
 (0)