Skip to content

Commit 4fe41eb

Browse files
[DOCS-10730] Add note and verification section to AWS PrivateLink (#30465)
* add note and verification section * Update content/en/agent/guide/private-link.md * Update content/en/agent/guide/private-link.md * apply suggestions --------- Co-authored-by: Michael Cretzman <[email protected]>
1 parent 750b97d commit 4fe41eb

File tree

1 file changed

+34
-1
lines changed

1 file changed

+34
-1
lines changed

content/en/agent/guide/private-link.md

Lines changed: 34 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,10 @@ After the endpoint status is updated to **Available**, you can use this endpoint
144144
| Database Monitoring | {{< region-param key="aws_private_link_dbm_service_name" code="true" >}} | {{< region-param key="dbm_endpoint_private_link" code="true" >}} |
145145
| Remote Configuration | {{< region-param key="aws_private_link_remote_config_service_name" code="true" >}} | {{< region-param key="remote_config_endpoint_private_link" code="true" >}} |
146146

147+
**Note**: Cross-region PrivateLink doesn't emit CloudWatch metrics. See [CloudWatch metrics for AWS PrivateLink][2] for more information.
148+
147149
[1]: /help/
150+
[2]: https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-cloudwatch-metrics.html
148151
{{% /tab %}}
149152

150153
{{% tab "VPC Peering" %}}
@@ -278,7 +281,6 @@ The VPCs with Private Hosted Zone (PHZ) attached need to have a couple of settin
278281

279282
3. [Restart the Agent][7].
280283

281-
282284
[1]: /help/
283285
[2]: https://docs.aws.amazon.com/vpc/latest/peering/working-with-vpc-peering.html
284286
[3]: https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/hosted-zones-private.html
@@ -302,6 +304,37 @@ The VPCs with Private Hosted Zone (PHZ) attached need to have a couple of settin
302304

303305
{{% /site-region %}}
304306

307+
## Verify that data is being sent using PrivateLink
308+
309+
After setting up PrivateLink, to verify that data is getting sent using PrivateLink, run the `dig` command on a machine that is on that VPC. For example, run this command if you had set up a PrivateLink for the endpoint `http-intake.logs.datadoghq.com`:
310+
311+
```
312+
dig http-intake.logs.datadoghq.com
313+
```
314+
315+
If logs are being sent over PrivateLink, the `ANSWER Section` section of the output shows `http-intake.logs.datadoghq.com` like in the following example. **Note**: The IP addresses you get back should be in [private IP space][1].
316+
317+
```
318+
;; ANSWER SECTION:
319+
http-intake.logs.datadoghq.com. 60 IN A 172.31.57.3
320+
http-intake.logs.datadoghq.com. 60 IN A 172.31.3.10
321+
http-intake.logs.datadoghq.com. 60 IN A 172.31.20.174
322+
http-intake.logs.datadoghq.com. 60 IN A 172.31.34.135
323+
```
324+
325+
If logs are not being sent over PrivateLink, the `ANSWER SECTION` of the output shows the load balancer (`4-logs-http-s1-e721f9c2a0e65948.elb.us-east-1.amazonaws.com`) to which the logs are getting sent.
326+
327+
```
328+
;; ANSWER SECTION:
329+
http-intake.logs.datadoghq.com. 177 IN CNAME http-intake-l4.logs.datadoghq.com.
330+
http-intake-l4.logs.datadoghq.com. 173 IN CNAME l4-logs-http-s1-e721f9c2a0e65948.elb.us-east-1.amazonaws.com.
331+
l4-logs-http-s1-e721f9c2a0e65948.elb.us-east-1.amazonaws.com. 42 IN A 3.233.158.48
332+
l4-logs-http-s1-e721f9c2a0e65948.elb.us-east-1.amazonaws.com. 42 IN A 3.233.158.49
333+
l4-logs-http-s1-e721f9c2a0e65948.elb.us-east-1.amazonaws.com. 42 IN A 3.233.158.50
334+
```
335+
305336
## Further reading
306337
307338
{{< partial name="whats-next/whats-next.html" >}}
339+
340+
[1]: https://en.wikipedia.org/wiki/Private_network#Private_IPv4_addresses

0 commit comments

Comments
 (0)