Skip to contentSkip to navigationSkip to topbar
On this page
Looking for more inspiration?Visit the
(information)
You're in the right place! Segment documentation is now part of Twilio Docs. The content you are used to is still here—just in a new home with a refreshed look.

Amazon Web Services PrivateLink


Amazon Web Services' PrivateLink(link takes you to an external page) is an AWS service that provides private connectivity between VPCs without exposing traffic to the public Internet. Keeping traffic in the Amazon network reduces the data security risk associated with exposing your Warehouse traffic to the Internet.

(new)

AWS PrivateLink Integration is currrently in Private Beta

Segment's PrivateLink integration is currently in private beta and is governed by Segment's First Access and Beta Preview Terms(link takes you to an external page). You might incur additional networking costs while using AWS PrivateLink.

You can configure AWS PrivateLink for Databricks, RDS Postgres, Redshift, and Snowflake. Only warehouses located in regions us-east-1, us-east-2, us-west-2, or eu-west-1 are eligible.

Usage limits for each customer during the AWS PrivateLink Private Beta include the following:

  • Up to 2 AWS PrivateLink VPC endpoints.
  • A monthly data transfer limit of 300GB total for all PrivateLink VPC endpoints connected to Segment.

Databricks

databricks page anchor

The following Databricks integrations support PrivateLink:

(information)

Segment recommends reviewing the Databricks documentation before attempting AWS PrivateLink setup

The setup required to configure the Databricks PrivateLink integration requires front-end and back-end PrivateLink configuration. Review the Databricks documentation on AWS PrivateLink(link takes you to an external page) to ensure you have everything required to set up this configuration before continuing.

Prerequisites

prerequisites page anchor

Before you can implement AWS PrivateLink for Databricks, complete the following prerequisites in your Databricks workspace:


The following RDS Postgres integrations support PrivateLink:

Before you can implement AWS PrivateLink for RDS Postgres, complete the following prerequisites:

  • Set up a Network Load Balancer (NLB) to route traffic to your Postgres database: Segment recommends creating a NLB that has target group IP address synchronization, using a solution like AWS Lambda. If any updates are made to the Availability Zones (AZs) enabled for your NLB, please let your CSM know so that Segment can update the AZs of your VPC endpoint.
  • Configure your NLB with one of the following settings:
    • Disable the Enforce inbound rules on PrivateLink traffic setting
    • If you must enforce inbound rules on PrivateLink traffic, add an inbound rule that allows traffic belonging to Segment's PrivateLink/Edge CIDR: 10.0.0.0/8

The following Redshift integrations support PrivateLink:

Before you can implement AWS PrivateLink for Redshift, complete the following prerequisites:


The following Snowflake integrations support PrivateLink:

Before you can implement AWS PrivateLink for Snowflake, complete the following prerequisites: