Amazon Web Services PrivateLink

Amazon Web Services’ PrivateLink is an AWS service that provides private connectivity between VPCs without exposing traffic to the public Internet. Keeping traffic in the Amazon network reduces the data security risk associated with exposing your Warehouse traffic to the Internet.

Segment’s PrivateLink integration is currently in private beta and is governed by Segment’s First Access and Beta Preview Terms. Only warehouses located in region us-east-1 are eligible for PrivateLink. You might incur additional networking costs while using AWS PrivateLink.

During the Private Beta, you can set up AWS PrivateLink for Databricks, RDS Postgres, and Redshift.

Databricks

Segment recommends reviewing the Databricks documentation before attempting AWS PrivateLink setup

The setup required to configure the Databricks PrivateLink integration requires front-end and back-end PrivateLink configuration. Review the Databricks documentation on AWS PrivateLink to ensure you have everything required to set up this configuration before continuing.

Prerequisites

Before you can configure AWS PrivateLink for Databricks, complete the following prerequisites in your Databricks workspace:

To configure PrivateLink for Databricks:

  1. Follow the instructions in Databricks’ Enable private connectivity using AWS PrivateLink documentation. You must create a back-end connection to integrate with Segment’s front-end connection.
  2. After you’ve configured a back-end connection for Databricks, request access to Segment’s PrivateLink integration by reaching out to your Customer Success Manager (CSM).
  3. Your CSM sets up a call with Segment R&D to continue the onboarding process.

The following Databricks integrations support PrivateLink:

RDS Postgres

Prerequisites

Before you can configure AWS PrivateLink for RDS Postgres, complete the following prerequisites in your Databricks workspace:

  • Set up a Network Load Balancer (NLB) to route traffic to your Postgres database: Segment recommends creating a NLB that has target group IP address synchronization, using a solution like AWS Lambda.
  • Configure your NLB with one of the following settings:
    • Disable the Enforce inbound rules on PrivateLink traffic setting
    • Add an inbound rule that allows traffic belonging from Segment’s us-east-1 PrivateLink/Edge CIDR: 10.248.64.0/18
  1. Create a Network Load Balancer VPC endpoint service using the instructions in the Create a service powered by AWS PrivateLink documentation.
  2. Reach out to your Customer Success Manager (CSM) for more details about Segment’s AWS principal.
  3. Add the Segment AWS principal as an “Allowed Principal” to consume the Network Load Balancer VPC endpoint service you created in step 1.
  4. Reach out to your CSM and provide them with the Service name for the service that you created above. Segment’s engineering team provisions a VPC endpoint for the service in the Segment Edge VPC.
  5. After creating the VPC, Segment provides you with private DNS so you can update the Host in your Segment app settings or create a new Postgres integration.
    The following RDS Postgres integrations support PrivateLink:

Redshift

Prerequisites

  • You’re using the RA3 node type: To access Segment’s PrivateLink integration, use an RA3 instance.
  • You’ve enabled cluster relocation: Cluster relocation migrates your cluster behind a proxy and keeps the cluster endpoint unchanged, even if your cluster needs to be migrated to a new Availability Zone. A consistent cluster endpoint makes it possible for Segment’s Edge account and VPC to remain connected to your cluster. To enable cluster relocation, follow the instructions in the AWS Relocating your cluster documentation.
  • Your cluster is using a port within the ranges 5431-5455 or 8191-8215: Clusters with cluster relocation enabled might encounter an error if updated to include a port outside of this range.

Implement Segment’s PrivateLink integration by taking the following steps:

  1. Let your Customer Success Manager (CSM) know that you’re interested in PrivateLink. They will share information with you about Segment’s Edge account and VPC.
  2. After you receive the Edge account and VPC, grant cluster access to Segment’s Edge account and VPC.
  3. Reach back out to your CSM and provide them with the Cluster identifier for your cluster and your AWS account ID.
  4. Segment creates a Redshift managed VPC endpoint within the Segment Redshift subnet on your behalf, which creates a PrivateLink Endpoint URL. Segment then provides you with the internal PrivateLink Endpoint URL.
  5. After Segment provides you with the URL, use it to update or create new Redshift integrations. The following integrations support PrivateLink:

This page was last modified: 18 Jun 2024



Get started with Segment

Segment is the easiest way to integrate your websites & mobile apps data to over 300 analytics and growth tools.
or
Create free account