Skip to content

Commit 3560d59

Browse files
Update language to address review comments
Co-authored-by: forstisabella <[email protected]>
1 parent 4e8a16f commit 3560d59

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

src/connections/aws-privatelink.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,8 @@ Before you can configure AWS PrivateLink for RDS Postgres, complete the followin
3838
- **Set up a Network Load Balancer (NLB) to route traffic to your Postgres database**: Segment recommends creating a NLB that has target group IP address synchronization, using a solution like AWS Lambda.
3939
If any updates are made to the Availability Zones (AZs) enabled for your NLB, please let your CSM know so that Segment can update the AZs of your VPC endpoint.
4040
- **Configure your NLB with one of the following settings**:
41-
- Preferably, disable the **Enforce inbound rules on PrivateLink traffic** setting
42-
- Alternatively, add an inbound rule that allows traffic belonging to Segment's PrivateLink/Edge CIDR: `10.0.0.0/8`
41+
- Disable the **Enforce inbound rules on PrivateLink traffic** setting
42+
- If you must enforce inbound rules on PrivateLink traffic, add an inbound rule that allows traffic belonging to Segment's PrivateLink/Edge CIDR: `10.0.0.0/8`
4343

4444
### Configure PrivateLink for RDS Postgres
4545
1. Create a Network Load Balancer VPC endpoint service using the instructions in the [Create a service powered by AWS PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/create-endpoint-service.html){:target="_blank”} documentation.

0 commit comments

Comments
 (0)