|
| 1 | +--- |
| 2 | +title: Amazon Web Services PrivateLink |
| 3 | +hidden: true |
| 4 | +--- |
| 5 | + |
| 6 | +[Amazon Web Services' PrivateLink](https://aws.amazon.com/privatelink/){:target="_blank”} is an AWS service that provides private connectivity between VPCs without exposing traffic to the public Internet. |
| 7 | + |
| 8 | +> info "" |
| 9 | +> Segment's PrivateLink integration is currently in public beta and is governed by Segment’s [First Access and Beta Preview Terms](https://www.twilio.com/en-us/legal/tos){:target="_blank”}. |
| 10 | +
|
| 11 | +During the AWS PrivateLink Private Beta, Segment supports the following integrations: |
| 12 | +- Databricks |
| 13 | + - [Databricks storage destination](/docs/connections/storage/catalog/databricks/) |
| 14 | + - [Databricks Reverse ETL source](/docs/connections/reverse-etl/reverse-etl-source-setup-guides/databricks-setup/) |
| 15 | + - [Databricks Profiles Sync destination](/docs/unify/profiles-sync/profiles-sync-setup/databricks-profiles-sync/) |
| 16 | +- RDS Postgres |
| 17 | + - [RDS Postgres storage destination](/docs/connections/storage/catalog/postgres/) |
| 18 | + - [RDS Postgres Reverse ETL source](/docs/connections/reverse-etl/reverse-etl-source-setup-guides/postgres-setup/) |
| 19 | + - [RDS Postgres Profiles Sync destination](/docs/unify/profiles-sync/profiles-sync-setup/#step-1-select-a-warehouse) |
| 20 | +- Redshift |
| 21 | + - [Redshift storage destination](/docs/connections/storage/catalog/redshift/) |
| 22 | + - [Redshift Reverse ETL source](/docs/connections/reverse-etl/reverse-etl-source-setup-guides/redshift-setup/) |
| 23 | + - [Redshift Profiles Sync destination](/docs/unify/profiles-sync/profiles-sync-setup/#step-1-select-a-warehouse) |
| 24 | + |
| 25 | +## Getting started |
| 26 | + |
| 27 | +You can set up AWS PrivateLink for [Databricks](), [RDS Postgres], and [Redshift]. |
| 28 | + |
| 29 | +### Databricks |
| 30 | + |
| 31 | +> info "Segment recommends reviewing the Databricks documentation before attempting AWS PrivateLink setup" |
| 32 | +> The setup required to configure the Databricks PrivateLink integration requires front-end and back-end PrivateLink configuration. Review the [Databricks documentation on AWS PrivateLink](https://docs.databricks.com/en/security/network/classic/privatelink.html){:target="_blank”} to ensure you have everything required to set up this configuration before continuing. |
| 33 | +
|
| 34 | +#### Prerequisites |
| 35 | + |
| 36 | +Before you begin, [reach out to Segment]() and indicate your interest in configuring AWS PrivateLink for Databricks. Segment's engineering team will create a VPC endpoint on your behalf and share the VPC endpoint ID with you. You need information about this VPC endpoint to [Create VPC Endpoints](https://docs.databricks.com/en/security/network/classic/privatelink.html#step-3-register-privatelink-objects){:target="_blank”} in your Databricks instance. |
| 37 | + |
| 38 | +To configure AWS PrivateLink for Databricks: |
| 39 | +- Your Databricks account must be on the [Enterprise pricing tier](https://www.databricks.com/product/pricing/platform-addons){:target="_blank”} and use the [E2 version](https://docs.databricks.com/en/archive/aws/end-of-life-legacy-workspaces.html#e2-architecture){:target="_blank”} of the platform. |
| 40 | +- Your Databricks workspace must use a [Customer-managed VPC](https://docs.databricks.com/en/security/network/classic/customer-managed-vpc.html){:target="_blank”} and [Secure cluster connectivity](https://docs.databricks.com/en/security/network/classic/secure-cluster-connectivity.html){:target="_blank”} |
| 41 | +- You must have the AWS permissions required to [set up a new Databricks workspace](https://docs.databricks.com/en/admin/workspace/create-workspace.html#before-you-begin){:target="_blank”} and [create a VPC](https://docs.aws.amazon.com/vpc/latest/privatelink/getting-started.html#create-vpc-subnets){:target="_blank”} |
| 42 | + |
| 43 | +> warning "The `us-west-1` region does not support PrivateLink" |
| 44 | +> Create a Databricks warehouse in a new region to use PrivateLink. |
| 45 | +
|
| 46 | +### Getting started |
| 47 | + |
| 48 | +To configure PrivateLink for Databricks, follow the instructions in Databricks' [Enable private connectivity using AWS PrivateLink](https://docs.databricks.com/en/security/network/classic/privatelink.html){:target="_blank”} documentation. You must create both [front-end and back-end](https://docs.databricks.com/en/security/network/classic/privatelink.html#private-connectivity-overview){:target="_blank”} connections to integration PrivateLink for Segment. |
| 49 | + |
| 50 | +### RDS Postgres |
| 51 | + |
| 52 | +1. Create a Network Load Balancer VPC endpoint service using the instructions in the [Create a service powered by AWS PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/create-endpoint-service.html){:target="_blank”} documentation. |
| 53 | +2. [Reach out to Segment]() for more details about Segment's AWS principal. |
| 54 | +3. Add the Segment AWS principal as an “Allowed Principal” to consume the service. |
| 55 | +4. [Reach out to Segment]() and provide Segment's engineering team with the name of the service that you created above and the region that service is located in. Segment's engineering team provisions a VPC endpoint for the service in the Segment Edge VPC. After creating the VPC, Segment either provides you with private DNS so you can configure the feature in the Segment app or creates an RDS Postgres source or destination on your behalf already configured with the required connection settings. |
| 56 | + |
| 57 | +### Redshift |
| 58 | + |
| 59 | +1. [Reach out to Segment]() and let the engineering team know you're interested in configuring AWS PrivateLink for Redshift. Segment's engineering team will then share information with you about Segment’s Edge account and VPC. |
| 60 | +2. After you receive information from Segment about the Edge account and VPC, [grant cluster access to Segment's Edge account and VPC](https://docs.aws.amazon.com/redshift/latest/gsg/rs-gsg-connect-to-cluster.html){:target="_blank”}. |
| 61 | +3. Segment creates a Redshift managed VPC endpoint within a Redshift subnet on your behalf, which creates an internal PrivateLink Endpoint URL. Segment will provide you with this URL, which you need to configure your Warehouse in the Segment app. |
0 commit comments