Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 5ca531c

Browse files
Update
1 parent de0afea commit 5ca531c

File tree

1 file changed

+25
-10
lines changed

1 file changed

+25
-10
lines changed

gdi/private-connectivity/aws-privatelink.rst

Lines changed: 25 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ Prerequisites
2222

2323
To connect Splunk Observability Cloud to AWS using AWS PrivateLink, you need the following:
2424

25-
* An active AWS account
26-
* A basic understanding of VPC concepts and networking principles
25+
* An active AWS account.
26+
* A basic understanding of VPC concepts and networking principles.
2727

2828
Connect different accounts within or accross regions
2929
==============================================================
@@ -33,7 +33,7 @@ Connect different accounts in the same region using AWS PrivateLink
3333

3434
You can use AWS PrivateLink to connect different accounts in the same AWS region. The following diagram shows an overview of how AWS PrivateLink for Splunk Observability Cloud works:
3535

36-
.. image:: /_images/gdi/aws-privatelink-schema2.png
36+
.. image:: /_images/gdi/AWS_PL_region1.png
3737
:width: 80%
3838
:alt: AWS Private Link schema.
3939

@@ -48,6 +48,12 @@ AWS PrivateLink also provides cross region private link connectivity if the sour
4848
* ``ap-southeast-1`` (Sydney). Splunk Observability Cloud realm: ``au0``.
4949
* ``ap-northeast-1`` (Tokyo). Splunk Observability Cloud realm: ``jp0``.
5050

51+
.. image:: /_images/gdi/AWS_PL_region2.png
52+
:width: 80%
53+
:alt: AWS Private Link schema.
54+
55+
.. caution:: Cross-region connectivity is not supported if either the source or target account is in the ``eu-central-1`` (eu1) or ``eu-west-2`` (eu2) regions. For the latest list of supported AWS regions for cross-region PrivateLink connectivity refer to the :new-page:`official AWS announcement <https://aws.amazon.com/about-aws/whats-new/2024/11/aws-privatelink-across-region-connectivity/>`.
56+
5157
If your workloads or Splunk Observability Cloud accounts are in regions not listed above, cross-region PrivateLink is not supported. In such cases, you should either:
5258

5359
* Use PrivateLink within the same AWS region.
@@ -226,6 +232,8 @@ Reach out to Splunk Customer Support with the following information to include y
226232

227233
* AWS region
228234

235+
* If you're connecting between two regions you need to provide both the source region (where your workloads are hosted) and the target account region (where your Splunk Observability Cloud account is located).
236+
229237
* Endpoint type
230238

231239
* Ingest
@@ -316,11 +324,8 @@ To delete an endpoint, follow these steps:
316324
#. Select the VPC endpoint you want to delete.
317325
#. Confirm the deletion when prompted.
318326

319-
Advanced configuration
320-
==========================================================================
321-
322327
Use AWS PrivateLink with the Collector
323-
--------------------------------------------------
328+
==========================================================================
324329

325330
To use AWS PrivateLink URLs in your Collector instance, update the necessary variables in your Collector configuration to point to the given endpoint type:
326331

@@ -351,15 +356,25 @@ See all PrivateLink URLs at :ref:`aws-privatelink-endpoint-urls`.
351356
For information about the Collector's environment variables see :ref:`collector-env-var`.
352357

353358
Use AWS PrivateLink with VPC peering
359+
==========================================================================
360+
361+
VPC peering in US regions
354362
--------------------------------------------------
355363

356-
Examine a scenario where the workloads that you're monitoring with Splunk Observability Cloud are in the AWS ``ap-south-1`` region, and your Splunk Observability Cloud account is in ``us-east-1``. You want to use PrivateLink to ingest observability data, but PrivateLink only works within one AWS region.
364+
If your monitored workloads in Splunk Observability Cloud are located in the AWS regions ``eu-central-1`` (eu1) or ``eu-west-2`` (eu2), or if you need to enable connectivity to the Splunk Observability Cloud accounts in those regions, use VPC peering instead of AWS PrivateLink since cross-region connectivity via AWS PrivateLink is not currently supported in these regions.
365+
366+
For the latest list of supported AWS regions for cross-region PrivateLink connectivity refer to the :new-page:`official AWS announcement <https://aws.amazon.com/about-aws/whats-new/2024/11/aws-privatelink-across-region-connectivity/>`.
367+
368+
Scenario: Connect your workloads to a Splunk Observability Cloud account in a different region
369+
----------------------------------------------------------------------------------------------------
370+
371+
Examine a scenario where the workloads that you're monitoring with Splunk Observability Cloud are running in the AWS region ``eu-central-1``, and your Splunk Observability Cloud account is hosted in ``us-east-1``. You want to use AWS PrivateLink to ingest observability data, but AWS PrivateLink cross-region connectivity is not currently supported in these regions.
357372

358-
In this scenario, carry out the following steps:
373+
Use VPC Peering instead with the following steps:
359374

360375
#. Ensure that you have a VPC set up in the destination region, in this example ``us-east-1``. If you don't have a VPC in that region, create a new one.
361376

362-
#. Use AWS VPC peering to peer the ``ap-south-1`` and the ``us-east-1`` VPCs together.
377+
#. Use AWS VPC peering to peer the ``eu-central-1`` and the ``us-east-1`` VPCs together in the source account with the workloads you want to monitor with Splunk Observability Cloud.
363378

364379
#. Activate AWS PrivateLink in the ``us-east-1`` VPC.
365380

0 commit comments

Comments
 (0)