AWS PrivateLink Setup
groundcover's inCloud comes with VPC service endpoint (PrivateLink) built in. The PrivateLink endpoint let you ingest data through private network and reduce data transfer costs.
Prerequisites
Get the VPC service endpoint name value provided by groundcover during inCloud installation.
Cross-region Ingestion: To keep cloud cost low as possible, PrivateLink connection is enabled only on the backend region by default. To allow cross-region endpoint send the require region to groundcover team.
Setup PrivateLink connection
Make sure DNS resolution is enabled on the VPC.
Create Security group for the VPC endpoint that allow port 443 from your workloads ( K8s nodes / EC2s).
Create VPC endpoint.
Choose the service endpoint name provided by groundcover.
(Optional) If the endpoint created on different region then inCloud backend, click on cross region and choose the backend's region
Enable DNS
Choose the required subnets for the VPC endpoint.
Choose the security group created in step 1 for the VPC endpoint
Create the VPC endpoint
Troubleshooting
Open shell on the monitored workload on the same VPC
Use nslookup to determine if DNS configured correctly, if the endpoint returns IPs that are not from your VPC CIDRs, double check the DNS configuration
nslookup <groundcover backend endpoint>
Use netcat to test the security groups configured correctly, if you get timeout to the VPC endpoint double check the inboud rules on the VPC endpoint and the outbound rule on the workload security groups
nc -vz <groundcover backend endpoint> 443
Last updated