You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
@@ -9,30 +9,30 @@ Private Connectivity using AWS PrivateLink
9
9
10
10
You can use Amazon Web Services (AWS) PrivateLink to secure your metric and traces traffic from your AWS environment to your Splunk Observability Cloud environment without exposing it to the internet.
11
11
12
-
AWS PrivateLink connects your Virtual Private Cloud (VPC) to your AWS services, treating them as if they were in your VPC. You can create and use VPC endpoints to securely access AWS services and control the specific API endpoints and sites. To learn more, see the AWS PrivateLink documentation at :new-page:`What is AWS PrivateLink? <https://docs.aws.amazon.com/vpc/latest/privatelink/what-is-privatelink.html>`.
12
+
AWS PrivateLink connects your Virtual Private Cloud (VPC) to the AWS-hosted services that you use, treating them as if they were in your VPC. You can create and use VPC endpoints to securely access AWS-hosted services and control the specific API endpoints and sites. To learn more, see the AWS PrivateLink documentation at :new-page:`What is AWS PrivateLink? <https://docs.aws.amazon.com/vpc/latest/privatelink/what-is-privatelink.html>`.
13
13
14
14
.. note::
15
15
16
16
To send logs to Splunk Observability Cloud, use :ref:`lo-connect-landing`.
17
17
18
-
To send logs securely, use :new-page:`Private connectivity in Splunk Cloud Platform <https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/Privateconnectivityenable>`.
19
-
20
-
The following diagram shows an overview of how AWS PrivateLink for Splunk Observability Cloud works:
21
-
22
-
.. source in Lucidchart: https://lucid.app/lucidchart/21f1cd02-7b2c-4654-a1b8-18c80a903fee/edit?shared=true&page=0_0&invitationId=inv_2f660037-6a85-4b98-9025-212b16c6b5a2#
To send logs with AWS PrivateLink see :new-page:`Private connectivity in Splunk Cloud Platform <https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/Privateconnectivityenable>`.
You can use AWS PrivateLink to connect different accounts within or across AWS regions. The following diagram shows diagram shows an overview of how AWS PrivateLink for Splunk Observability Cloud works:
32
+
33
+
.. image:: /_images/gdi/AWS_PL_region1.jpg
34
+
:width:80%
35
+
:alt:AWS Private Link schema.
36
36
37
37
.. _aws-privatelink-endpoint-types:
38
38
@@ -52,7 +52,42 @@ You can use any of these endpoints with AWS PrivateLink:
See the following tables for the AWS PrivateLink endpoint URLs and service names for each AWS region.
55
+
See the following sections for information on the available AWS source account regions, AWS PrivateLink endpoint URLs and service names for each AWS region.
Reach out to Splunk Customer Support with the following information to include your AWS Account ID to the allow list:
241
+
Reach out to :ref:`Splunk Customer Support<support>` with the following information to include your AWS Account ID to the allow list:
205
242
206
243
* AWS Account ID
207
244
208
-
* AWS region
209
-
210
245
* Endpoint type
211
246
212
247
* Ingest
213
248
* API
214
249
* Stream
215
250
216
-
Review the ways you can contact Splunk Customer Support at :ref:`Splunk Observability Cloud support <support>`.
251
+
* AWS source account region: It must be one of the regions listed in :ref:`aws-source-regions`.
252
+
253
+
* Splunk Observability AWS account region: It must be one of the regions listed in :ref:`aws-privatelink-service-names`.
254
+
255
+
.. note::
256
+
257
+
* If you're setting up same-region PrivateLink connectivity, your AWS source account region is the same as the Splunk Observability AWS account region.
258
+
259
+
* If you're setting up cross-region PrivateLink connectivity, your AWS source account region is different from the Splunk Observability AWS account region.
260
+
261
+
.. caution:: If your workloads are deployed in AWS regions not listed in :ref:`aws-source-regions`, then cross-region PrivateLink connectivity is not supported. In such cases, you should consider setting up VPC peering as described in :ref:`aws-privatelink-vpc-peering`.
217
262
218
263
.. _aws-privatelink-step2:
219
264
220
-
Step 2: Verify AWS Account ID is added to allow list
.. caution:: Wait for Splunk Customer Support's confirmation that your AWS Account ID was added to the allow list before performing these steps. Support might take up to 24 hours.
224
269
225
270
To verify your AWS Account ID has been allowed, follow these steps:
226
271
227
-
1. Log in to the AWS Management Console, and open the :guilabel:`Amazon VPC service` in the specific region where you intend to set up AWS PrivateLink.
272
+
1. Log in to the AWS Management Console and open the :guilabel:`Amazon VPC service` in the specific region where you intend to set up AWS PrivateLink.
273
+
274
+
2. On the left navigation pane, navigate to :guilabel:`PrivateLink and Lattice > Endpoints`.
228
275
229
-
2. On the left navigation pane, select:guilabel:`Endpoints`.
276
+
3. Select :guilabel:`Create endpoint`, then:guilabel:`Endpoint services that use NLBs and GWLBs`.
230
277
231
-
3. Select:guilabel:`Endpoint`, and then:guilabel:`Other endpoint services`.
278
+
4. Under:guilabel:`Service Settings`, enter the:guilabel:`Service Name` based on the AWS region where you're configuring the VPC endpoint. Identify the appropriate service name using the :ref:`AWS PrivateLink service names table <aws-privatelink-service-names>`.
232
279
233
-
4. Enter and verify the service name based on the AWS region where you're configuring the VPC endpoint. Identify the appropriate service name using the :ref:`AWS PrivateLink service names table <aws-privatelink-service-names>`.
280
+
5. If you are setting up cross-region PrivateLink connectivity, check the :guilabel:`Enable Cross Region endpoint` checkbox. Based on the service name you used in point 4, select the appropriate Splunk Observability region.
281
+
282
+
.. image:: /_images/gdi/AWS_PL_region3.png
283
+
:width:80%
284
+
:alt:Verify account.
285
+
286
+
.. caution:: If you are setting up PrivateLink connectivity in the same region do not check the Enable Cross Region endpoint checkbox.
287
+
288
+
6. Select :strong:`Verify Service`.
234
289
235
290
* If you see the "Service name verified" message, proceed with :ref:`aws-privatelink-step3`.
291
+
236
292
* If you see the "Service name could not be verified" error message, your account ID is not yet allowed for the given service name. Reach out to Splunk Customer Support to check the status of your request from :ref:`aws-privatelink-step1`.
237
293
238
294
.. _aws-privatelink-step3:
@@ -242,48 +298,30 @@ Step 3: Create a VPC endpoint
242
298
243
299
To create a VPC endpoint, follow these steps:
244
300
245
-
1. Log in to the AWS Management Console, and open :guilabel:`Amazon VPC service` within the specific region where you intend to set up AWS PrivateLink. If you have a VPC peering configuration, keep in mind the destination region of VPC peering.
246
-
247
-
2. On the left navigation pane, select :guilabel:`Endpoints`.
248
-
249
-
3. Select :guilabel:`Create Endpoint`, and then :guilabel:`Other endpoint` services.
301
+
1. Under :guilabel:`Network settings` select the VPC where the endpoint will reside.
250
302
251
-
4. Enter and verify the service name based on the AWS region where you're configuring the VPC endpoint. Identify the appropriate service name using the :ref:`AWS PrivateLink service names table <aws-privatelink-service-names>`.
303
+
.. caution:: Under :guilabel:`Additional settings` do not select :guilabel:`Enable DNS name` at this point. Select this option after the VPC endpoint has been successfully created in :ref:`aws-privatelink-step4`.
252
304
253
-
5. Select the VPC in which you want to create the endpoint.
305
+
2. Under :guilabel:`Subnets` select the subnet(s) where the endpoint will reside.
254
306
255
-
6. Select the subnet or subnets within the VPC where the endpoint will reside. Make sure to select the subnets from the appropriate availability zones.
307
+
3. Under :guilabel:`Security groups` select the security group(s) controlling traffic for the endpoint. Make sure to set the outbound rule to HTTPS protocol and the ``443`` port.
256
308
257
-
7. Set the IP address type to ``IPv4``.
258
-
259
-
8. Specify the security group controlling traffic for the endpoint. Set the outbound rule to HTTPS protocol and the ``443`` port.
260
-
261
-
The following image shows the security options for AWS PrivateLink:
:alt:Specify security groups that control traffic.
266
-
267
-
9. Review the configuration details and select :guilabel:`Create Endpoint`.
268
-
269
-
10. Before proceeding to :ref:`aws-privatelink-step4`, confirm with Splunk Customer Support that you created the endpoint, that the service name has been verified, and that Support has activated the endpoint urls.
309
+
4. Select :guilabel:`Create endpoint`.
270
310
271
311
.. _aws-privatelink-step4:
272
312
273
313
Step 4: Modify the endpoint to activate a Private DNS Name
If the workloads that you're monitoring with Splunk Observability Cloud are not in the :ref:`aws-source-regions` list, follow the steps below:
344
+
345
+
1. In your AWS account, either use an existing VPC or create a new VPC in one of Splunk Observability's AWS account regions mentioned in the :ref:`aws-privatelink-service-names`.
346
+
347
+
2. Set up AWS VPC peering between the regions where the workloads are being monitored and the region where the VPC used in step 1 is located.
348
+
349
+
3. Follow :ref:`aws-privatelink-configure-vpc` to activate the AWS PrivateLink endpoint connection from the region where the VPC used in step 1 is located.
350
+
351
+
Learn more about VPC Peering in the AWS documentation at :new-page:`Two VPCs peered together <https://docs.aws.amazon.com/vpc/latest/peering/peering-configurations-full-access.html#two-vpcs-full-access>`.
352
+
353
+
Use AWS PrivateLink with the OpenTelemetry Collector
To use AWS PrivateLink URLs in your Collector instance, update the necessary variables in your Collector configuration to point to the given endpoint type:
307
357
@@ -331,33 +381,8 @@ See all PrivateLink URLs at :ref:`aws-privatelink-endpoint-urls`.
331
381
332
382
For information about the Collector's environment variables see :ref:`collector-env-var`.
Examine a scenario where the workloads that you're monitoring with Splunk Observability Cloud are in the AWS ``ap-south-1`` region, and your Splunk Observability Cloud account is in ``us-east-1``. You want to use PrivateLink to ingest observability data, but PrivateLink only works within one AWS region.
338
-
339
-
In this scenario, carry out the following steps:
340
-
341
-
#. Ensure that you have a VPC set up in the destination region, in this example ``us-east-1``. If you don't have a VPC in that region, create a new one.
342
-
343
-
#. Use AWS VPC peering to peer the ``ap-south-1`` and the ``us-east-1`` VPCs together.
344
-
345
-
#. Activate AWS PrivateLink in the ``us-east-1`` VPC.
346
-
347
-
Learn more about VPC Peering in the AWS documentation at :new-page:`Two VPCs peered together <https://docs.aws.amazon.com/vpc/latest/peering/peering-configurations-full-access.html#two-vpcs-full-access>`.
348
-
349
-
.. Next steps
350
-
.. ================
351
-
352
-
.. After you connect Splunk Observability Cloud with AWS, you can use Splunk Observability Cloud to track a series of metrics and analyze your AWS data in real time.
353
-
354
-
.. - See the AWS official documentation for a list of the available AWS resources.
355
-
.. - See :ref:`how to leverage data from integration with AWS <aws-post-install>` for more information.
0 commit comments