Overview
Use this page to understand how AWS PrivateLink works with Coralogix and to choose the correct connectivity model before starting configuration.
AWS PrivateLink provides private, highly available connectivity between your VPC and Coralogix services, as if Coralogix were hosted directly inside your network. In this model, Coralogix acts as the service provider, and your AWS account acts as the consumer.
flowchart TD
subgraph ConsumerVPC["Your VPC"]
direction LR
EC2["EC2 / ECS / EKS"]
Lambda["AWS Lambda"]
OnPrem["On-premises"]
end
EC2 & Lambda & OnPrem --> ENI["VPC Endpoint ENI"]
ENI --> PL["AWS PrivateLink"]
PL --> EP["Endpoint Service"]
subgraph ProviderVPC["Provider VPC (Coralogix)"]
direction LR
EP --> Ingestion
EP --> API
EP --> Syslog
end
PrivateLink supports connectivity from:
- EC2 and container-based workloads running in a VPC
- AWS Lambda functions configured for VPC access
- On-premises networks connecting through a VPN or AWS Direct Connect, allowing them to access services as if they were hosted directly in the local network.
- Other AWS Services and SaaS products, which can act as consumers connecting to endpoint services
Core concepts
Private connectivity
All traffic stays within the AWS network and does not traverse the public internet. Internet gateways, NAT gateways, and public IPs are not required.
Interface VPC endpoints
Coralogix uses Interface type VPC endpoints. When you create an endpoint, AWS creates endpoint network interfaces (ENIs) with private IP addresses in the subnets you select. These ENIs are the private entry points to Coralogix.
Workloads such as EC2, containers, and Lambda functions send traffic to Coralogix through these endpoint ENIs.
Security and policy controls
Access is controlled using:
- Security groups attached to ENIs
- VPC endpoint policies (IAM resource policies)
What you will configure
All connectivity models follow the same high-level flow:
- Identify the Coralogix PrivateLink service that matches your Coralogix domain. Learn more in our Coralogix PrivateLink endpoints and deployment guide.
- Create an Interface VPC endpoint.
- Enable private DNS resolution.
- Validate connectivity from workloads inside your VPC.
Choose your connectivity model
Use the following flowchart to determine which PrivateLink setup guide best suits your needs.
graph TD
Start[Where are your AWS resources located?] -->|Same region as Coralogix| SR[<b>Primary setup:</b><br/>Same-region configuration]
Start -->|Different region| Part{Are both regions in the<br/>same AWS partition?}
Part -->|Yes| Native[<b>Recommended:</b><br>Native cross-region]
Part -->|No / Complex needs| Legacy[<b>Legacy workaround:</b><br>VPC Peering]
SR --> EndSR[Follow same-region guide]
Native --> EndNCR[Follow native cross-region guide]
Legacy --> EndVP[Follow VPC Peering guide]
%% Post-Connectivity Convergence
EndSR --> Valid[Validate Connectivity]
EndNCR --> Valid
EndVP --> Valid
%% Lambda Integration Step
Valid --> IsLambda{Using AWS Lambda?}
IsLambda -->|Yes| LambdaConfig[Follow Lambda configuration guide]
IsLambda -->|No| Done[Configuration Complete]
style SR fill:#d4edda,stroke:#a3d9b1
style Native fill:#d4edda,stroke:#a3d9b1
style Legacy fill:#f8d7da,stroke:#e8aeb3
style LambdaConfig fill:#fff3cd,stroke:#e8d8a0
%% CLICKABLE LINKS
click SR "../same-region-connectivity/" "Open same-region configuration"
click EndSR "../same-region-connectivity/" "Open same-region configuration"
click Native "../aws-privatelink-cross-region-connection/" "Open native cross-region configuration"
click EndNCR "../aws-privatelink-cross-region-connection/" "Open native cross-region configuration"
click Legacy "../aws-privatelink-vpc-peering-configuration/" "Open VPC peering configuration"
click EndVP "../aws-privatelink-vpc-peering-configuration/" "Open VPC peering configuration"
click Valid "../endpoints-deployment/" "Open endpoints and deployment validation"
click LambdaConfig "../aws-privatelink-lambda-configuration/" "Open Lambda configuration"Lambda-specific considerations (high level)
When using AWS Lambda with PrivateLink:
- The Lambda function must be attached to a VPC
- Lambda creates requester-managed ENIs in the selected subnets
- Additional endpoints may be required:
- S3 Gateway Endpoint (if the integration uses Amazon S3)
- Secrets Manager Interface Endpoint (if using AWS Secrets Manager)
Detailed Lambda configuration steps are covered in the Lambda Configuration guide.
Native cross-region considerations
When using native cross-region PrivateLink:
- The IAM principal creating the endpoint must have the
vpce:AllowMultiRegionpermission - Both regions must belong to the same AWS partition
- Availability Zones do not need to match Coralogix’s AZs
- Inter-AZ traffic via PrivateLink endpoints is free, which can significantly reduce costs for high-volume telemetry
Use PrivateLink with Coralogix integrations
Visit the k8s and ecs-ec2 integration pages to learn how to enable PrivateLink in the integrations using a single toggle.