Skip to content

Commit dc4f3a7

Browse files
authored
add AWS PrivateLink considerations (elastic#958)
1 parent 1858539 commit dc4f3a7

File tree

1 file changed

+15
-27
lines changed

1 file changed

+15
-27
lines changed

deploy-manage/security/aws-privatelink-traffic-filters.md

Lines changed: 15 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,50 +9,38 @@ mapped_urls:
99

1010
# AWS PrivateLink traffic filters
1111

12-
$$$ec-access-the-deployment-over-private-link$$$
13-
14-
$$$ec-associate-traffic-filter-private-link-rule-set$$$
15-
16-
$$$ec-create-traffic-filter-private-link-rule-set$$$
12+
Traffic filtering, to only AWS PrivateLink connections, is one of the security layers available in {{ecloud}}. It allows you to limit how your deployments can be accessed.
1713

18-
$$$ec-find-your-endpoint$$$
14+
AWS PrivateLink establishes a secure connection between two AWS Virtual Private Clouds (VPCs). The VPCs can belong to separate accounts, i.e. a service provider and its service consumers. AWS routes the PrivateLink traffic within the AWS data center and never exposes it to the public internet. In such a configuration, {{ecloud}} is the third-party service provider and the customers are service consumers.
1915

20-
$$$ec-private-link-service-names-aliases$$$
16+
PrivateLink is a connection between a VPC Endpoint and a PrivateLink Service.
2117

22-
$$$ec-remove-association-traffic-filter-private-link-rule-set$$$
18+
Read more about [Traffic Filtering](/deploy-manage/security/traffic-filtering.md) for the general concepts behind traffic filtering in {{ecloud}}.
2319

24-
$$$ech-access-the-deployment-over-private-link$$$
2520

26-
$$$ech-associate-traffic-filter-private-link-rule-set$$$
21+
## Considerations
2722

28-
$$$ech-create-traffic-filter-private-link-rule-set$$$
23+
Before you begin, review the following considerations:
2924

30-
$$$ech-find-your-endpoint$$$
25+
### PrivateLink filtering and regions
3126

32-
$$$ech-private-link-service-names-aliases$$$
27+
AWS PrivateLink filtering is supported only for AWS regions. Elastic does not yet support cross-region AWS PrivateLink connections. Your PrivateLink endpoint needs to be in the same region as your target deployments. Additional details can be found in the [AWS VPCE Documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-limitations).
3328

34-
$$$ech-remove-association-traffic-filter-private-link-rule-set$$$
29+
AWS interface VPC endpoints get created in availability zones (AZ). In some regions, our VPC endpoint *service* is not present in all the possible AZs that a region offers. You can only choose AZs that are common on both sides. As the *names* of AZs (for example `us-east-1a`) differ between AWS accounts, the following list of AWS regions shows the *ID* (e.g. `use1-az4`) of each available AZ for the service.
3530

31+
Check [interface endpoint availability zone considerations](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-availability-zones) for more details.
3632

33+
### Availability zones
3734

38-
Traffic filtering, to only AWS PrivateLink connections, is one of the security layers available in {{ecloud}}. It allows you to limit how your deployments can be accessed.
35+
Elastic [charges](/deploy-manage/cloud-organization/billing/cloud-hosted-deployment-billing-dimensions.md) for inter-node traffic regardless of whether nodes are in the same or different availability zones (AZ). As a result, placing the deployment nodes within a single AZ, instead of two or three, does not reduce inter-node costs.
3936

40-
Read more about [Traffic Filtering](/deploy-manage/security/traffic-filtering.md) for the general concepts behind traffic filtering in {{ecloud}}.
37+
On the customer VPC side, the inter-availability zone data transfer, within the same AWS region, towards AWS PrivateLink endpoints, [is free of charge](https://aws.amazon.com/about-aws/whats-new/2022/04/aws-data-transfer-price-reduction-privatelink-transit-gateway-client-vpn-services/). As a result, you do not incur charges for cross-AZ data transfer within your VPC when the target is the AWS Privatelink Elastic Cloud service endpoint. We recommend you set up the VPC endpoints in all supported Elastic Cloud AZs for a particular region for maximum traffic throughput and resiliency.
4138

42-
::::{note}
43-
PrivateLink filtering is supported only for AWS regions. AWS does not support cross-region PrivateLink connections. Your PrivateLink endpoint needs to be in the same region as your target deployments. Additional details can be found in the [AWS VPCE Documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-limitations). AWS interface VPC endpoints get created in availability zones (AZ). In some regions, our VPC endpoint *service* is not present in all the possible AZs that a region offers. You can only choose AZs that are common on both sides. As the *names* of AZs (for example `us-east-1a`) differ between AWS accounts, the following list of AWS regions shows the *ID* (e.g. `use1-az4`) of each available AZ for the service. Check [interface endpoint availability zone considerations](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-availability-zones) for more details.
44-
::::
39+
If Elastic and your VPC overlap in two AZs or less, you can create subnets and VPC PrivateLink endpoints in your VPC within the same availability zones where Elastic PrivateLink service has presence.
4540

41+
### Transport client
4642

47-
::::{note}
4843
Transport client is not supported over PrivateLink connections.
49-
::::
50-
51-
52-
AWS PrivateLink establishes a secure connection between two AWS Virtual Private Clouds (VPCs). The VPCs can belong to separate accounts, i.e. a service provider and its service consumers. AWS routes the PrivateLink traffic within the AWS data center and never exposes it to the public internet. In such a configuration, {{ecloud}} is the third-party service provider and the customers are service consumers.
53-
54-
PrivateLink is a connection between a VPC Endpoint and a PrivateLink Service.
55-
5644

5745
## PrivateLink service names and aliases [ec-private-link-service-names-aliases]
5846

0 commit comments

Comments
 (0)