You can send telemetry data from your AWS Virtual Private Cloud (VPC) to New Relic via AWS PrivateLink.
Overview
Sending your New Relic data via AWS PrivateLink can:
- Reduce your AWS egress costs
- Improve security by keeping your data within the Amazon network
PrivateLink works for sending telemetry data to a variety of New Relic endpoints. It can't be used for our NerdGraph API or other non-ingest APIs.
To use this feature, you'll need to configure an interface endpoint in your VPC that your local New Relic agents and integrations will use to route data to New Relic via AWS PrivateLink.
Requirements
PrivateLink requires the New Relic Data Plus option. If you attempt to send data without Data Plus, traffic sent via PrivateLink will be rejected and returned with a 402 error.
Supported regions and zones
New Relic exposes AWS PrivateLink endpoints for the following:
Region | Zone |
---|---|
|
|
|
|
|
|
|
|
An endpoint service is available only in the region where it was created (see the Amazon docs), but it can be accessed from other regions using inter-region peering.
This means that if your VPC is in the above supported regions (us-east-1
, us-east-2
, us-west-2
, and eu-central-1
) the only thing you need to do is to create the necessary internal VPC endpoint, as described below. But if you're in a region outside of the supported regions, you'll need to also set up a peering connection after that step.
The endpoints
These are the New Relic endpoint services available via AWS PrivateLink:
Data source | Hostname(s) | Endpoint service name(s) |
---|---|---|
APM |
|
|
Event API |
|
|
Metric API (including Prometheus and other integrations) |
|
|
Logging |
|
|
Distributed tracing |
|
|
AWS Lambda and Cloudwatch Logs monitoring |
|
|
Infrastructure monitoring and on-host integrations |
|
|
|
| |
OpenTelemetry |
|
|
New Relic REST API |
|
|
Synthetics job manager |
|
|
Importante
The endpoint services for api.newrelic.com
, identity-api.newrelic.com
, infrastructure-command-api.newrelic.com
, and synthetics-horde.nr-data.net
do not have associated DNS private names.
- To configure access to these services, create a PrivateLink connection to each service endpoint.
- For each hostname listed above, create a corresponding Private Hosted Zone (PHZ).
Data source | Hostname(s) | Endpoint service name |
---|---|---|
APM |
|
|
Event API |
|
|
Metric API (including Prometheus and other integrations) |
|
|
Logging |
|
|
Distributed tracing |
|
|
AWS Lambda and Cloudwatch Logs monitoring |
|
|
Infrastructure monitoring and on-host integrations |
|
|
|
| |
OpenTelemetry |
|
|
New Relic REST API |
|
|
Synthetics job manager |
|
|
Importante
The endpoint services for api.newrelic.com
, identity-api.newrelic.com
, infrastructure-command-api.newrelic.com
, and synthetics-horde.nr-data.net
do not have associated DNS private names.
- To configure access to these services, create a PrivateLink connection to each service endpoint.
- For each hostname listed above, create a corresponding Private Hosted Zone (PHZ).
Data source | Hostname(s) | Endpoint service name |
---|---|---|
APM |
|
|
Event API |
|
|
Metric API (including Prometheus and other integrations) |
|
|
Logging |
|
|
Distributed tracing |
|
|
AWS Lambda and Cloudwatch Logs monitoring |
|
|
Infrastructure monitoring and on-host integrations |
|
|
|
| |
OpenTelemetry |
|
|
New Relic REST API |
|
|
Synthetics job manager |
|
|
Importante
The endpoint services for api.newrelic.com
, identity-api.newrelic.com
, infrastructure-command-api.newrelic.com
, and synthetics-horde.nr-data.net
do not have associated DNS private names.
- To configure access to these services, create a PrivateLink connection to each service endpoint.
- For each hostname listed above, create a corresponding Private Hosted Zone (PHZ).
Data source | Hostname(s) | Endpoint service name |
---|---|---|
APM |
|
|
Event API |
|
|
Metric API (including Prometheus and other integrations) |
|
|
Logging |
|
|
Distributed tracing |
|
|
AWS Lambda and Cloudwatch Logs monitoring |
|
|
Infrastructure monitoring and on-host integrations |
|
|
|
| |
OpenTelemetry |
|
|
New Relic REST API |
|
|
Synthetics job manager |
|
|
Importante
The endpoint services for api.eu.newrelic.com
, identity-api.eu.newrelic.com
, infrastructure-command-api.eu.newrelic.com
, and synthetics-horde.eu01.nr-data.net
do not have associated DNS private names.
- To configure access to these services, create a PrivateLink connection to each service endpoint.
- For each hostname listed above, create a corresponding Private Hosted Zone (PHZ).
Sugerencia
Endpoints are not yet available for:
- FedRAMP data
- New Relic Infinite Tracing
- Syslog TCP traffic
CloudWatch Metric Streams
Create VPC endpoints
For each of the New Relic endpoint services you're using from the table above, create and attach a VPC endpoint within your VPC. When creating these endpoints, you'll need to configure the VPC subnets and security groups corresponding to the availability zones that New Relic has configured with the endpoint service.
Use the table and screenshot below as a guide to create and attach the VPC endpoint:
Field | Description |
---|---|
Name tag | Optional. |
Service category | Select Other endpoint services. |
Service settings | For Service name, find the value in the table and click Verify. |
VPC | Select the VPC from the dropdown. |
Additional settings | Select the following:
|
Subnets | Select the zones. For IP address type, select IPv4. |
Security groups | Select the Group ID. |
Tags | Insert optional key/value pairs. |
Here's a screenshot of some sample settings:
Set up a peering connection
This is required only if you're using a region other than the current supported regions: us-east-1
(Virginia), us-east-2
(Ohio), us-west-2
(Oregon), or eu-central-1
.
VPC peering
Follow the instructions to create inter-region VPC peering connections, specifying the VPC ID of the endpoint connections you created.
Transit Gateway peering
Follow the instructions to create a Route 53 PHZ and share it between VPCs, specifying the VPC ID of the endpoint connections you created.