Unify and manage your data

Configure networking rules on AWS

Learn how to set up networking rules within AWS for PrivateLink.

Configure security groups and networking rules for your AWS VPC endpoint so that your Reltio PrivateLink connection allows secure HTTPS traffic. It involves the following steps:
  1. Create a security group for the VPC endpoint: Before you configure the VPC endpoint, create a security group to control inbound and outbound traffic for the endpoint's network interfaces.

  2. Configure the Security group rules: After you create the security group, define inbound and outbound rules.

  3. Attach security group to the VPC endpoint

  4. Verify network configuration

To Configure networking rules on AWS:
  1. Create a security group for the VPC endpoint:
    1. Open the Amazon VPC console.
    2. In the navigation pane, choose Security Groups.
    3. Select Create security group.
    4. Enter a name. For example, reltio-privatelink-sg.
    5. Enter a description.
    6. Select your VPC from the dropdown.
    7. Select Create security group.

  2. Configure security group rules by defining inbound and outbound rules:
    Inbound rules

    Add an inbound rule that allows HTTPS traffic from your VPC to the Reltio PrivateLink endpoint:

    SettingValue
    TypeHTTPS
    ProtocolTCP
    Port range443
    SourceYour VPC CIDR block (for example, 10.0.0.0/16)
    DescriptionAllow HTTPS traffic from VPC to Reltio PrivateLink endpoint

    Outbound rules

    Ensure outbound traffic is allowed:

    SettingValue
    TypeAll traffic
    ProtocolAll
    Port rangeAll
    Destination0.0.0.0/0
    DescriptionAllow all outbound traffic
  3. Attach the security group to the VPC endpoint:
    1. In the Amazon VPC console, navigate to VPCEndpoints.
    2. Select your Reltio PrivateLink endpoint.
    3. Open the Security groups tab.
    4. Choose Manage security groups.
    5. Select the security group you created.
    6. Choose Save changes.
      You can also use the AWS CLI:
      aws ec2 modify-vpc-endpoint \
        --vpc-endpoint-id vpce-YOUR-ENDPOINT-ID \
        --add-security-group-ids sg-YOUR-SECURITY-GROUP-ID
  4. Verify network configuration:
    Test connectivity from an EC2 instance in your VPC:
    curl -v https://{environment}.reltio.com

Your networking configuration is now ready to support DNS override and private connectivity to Reltio services. The next step is to create DNS records for Reltio services. For more information, see Create DNS records for Reltio services.