Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 358fd5a

Browse files
Edits
1 parent dfa82d8 commit 358fd5a

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

gdi/private-connectivity/aws-privatelink.rst

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -322,7 +322,7 @@ To enable Private DNS Name, follow these steps:
322322
#. On the left navigation pane, select :guilabel:`Endpoints`.
323323
#. Select the VPC endpoint you want to modify.
324324
#. Under the :guilabel:`Actions` dropdown, select :guilabel:`Modify private DNS name`.
325-
#. Under :guilabel:`Modify private DNS name settings`, check the :guilabel:Enable private DNS names > Enable for this endpoint` checkbox.
325+
#. Under :guilabel:`Modify private DNS name settings`, check the :guilabel:`Enable private DNS names > Enable for this endpoint` checkbox.
326326
#. Select :guilabel:`Save Changes`.
327327

328328
Delete a VPC endpoint
@@ -337,7 +337,22 @@ To delete an endpoint, follow these steps:
337337
#. Select the VPC endpoint you want to delete.
338338
#. Confirm the deletion when prompted.
339339

340-
Use AWS PrivateLink with the Collector
340+
.. _aws-privatelink-vpc-peering:
341+
342+
Use AWS PrivateLink with VPC peering
343+
==========================================================================
344+
345+
If the workloads that you're monitoring with Splunk Observability Cloud are not in the :ref:`aws-source-regions` list, follow the steps below:
346+
347+
1. In your AWS account, either use an existing VPC or create a new VPC in one of Splunk Observability's AWS account regions mentioned in the :ref:`aws-privatelink-service-names`.
348+
349+
2. Set up AWS VPC peering between the regions where the workloads are being monitored and the region where the VPC used in step 1 is located.
350+
351+
3. Follow :ref:`aws-privatelink-configure-vpc` to activate the AWS PrivateLink endpoint connection from the region where the VPC used in step 1 is located.
352+
353+
Learn more about VPC Peering in the AWS documentation at :new-page:`Two VPCs peered together <https://docs.aws.amazon.com/vpc/latest/peering/peering-configurations-full-access.html#two-vpcs-full-access>`.
354+
355+
Use AWS PrivateLink with the OpenTelemetry Collector
341356
==========================================================================
342357

343358
To use AWS PrivateLink URLs in your Collector instance, update the necessary variables in your Collector configuration to point to the given endpoint type:
@@ -368,21 +383,6 @@ See all PrivateLink URLs at :ref:`aws-privatelink-endpoint-urls`.
368383

369384
For information about the Collector's environment variables see :ref:`collector-env-var`.
370385

371-
.. _aws-privatelink-vpc-peering:
372-
373-
Use AWS PrivateLink with VPC peering
374-
==========================================================================
375-
376-
If the workloads that you're monitoring with Splunk Observability Cloud are not in the :ref:`aws-source-regions` list, follow the steps below:
377-
378-
1. In your AWS account, either use an existing VPC or create a new VPC in one of Splunk Observability's AWS account regions mentioned in the :ref:`aws-privatelink-service-names`.
379-
380-
2. Set up AWS VPC peering between the regions where the workloads are being monitored and the region where the VPC used in step 1 is located.
381-
382-
3. Follow :ref:`aws-privatelink-configure-vpc` to activate the AWS PrivateLink endpoint connection from the region where the VPC used in step 1 is located.
383-
384-
Learn more about VPC Peering in the AWS documentation at :new-page:`Two VPCs peered together <https://docs.aws.amazon.com/vpc/latest/peering/peering-configurations-full-access.html#two-vpcs-full-access>`.
385-
386386
.. _aws-privatelink-support:
387387

388388
.. raw:: html

0 commit comments

Comments
 (0)