This page explains how to enrich your Axiom experience with AWS PrivateLink.
us-east-1
AWS region. To route traffic from other AWS regions, follow the setup in us-east-1
and then configure Amazon VPC peering.us-east-1
and create a VPC. For more information, see the AWS documentation.com.amazonaws.vpce.us-east-1.vpce-svc-05a64735cdf68866b
to establish AWS PrivateLink for api.axiom.co
.443
.us-east-1
from other AWS regions, use inter-region Amazon VPC peering. Inter-region VPC peering allows you to establish connections between VPCs across different AWS regions. This allows VPC resources in different regions to communicate with each other using private IP addresses.
After following the setup in us-east-1
, configure VPC peering to make the PrivateLink endpoint available in another region to send logs to Axiom over PrivateLink. For more information, see the AWS documentation.
When configuring PrivateLink with VPC peering, Amazon Route 53 is useful for resolving private DNS hostnames within your VPCs. Amazon Route 53 allows you to create private hosted zones within your VPC. These private hosted zones allow you to use custom domain names for your resources, such as EC2 instances, ELB load balancers, or RDS instances, without exposing them to the public internet. For more information, see the AWS documentation.