The AWS PrivateLink integration is only available to customers on select plans. To learn more, read about our pricing. To upgrade your plan, contact Sales.
This topic explains how to configure and use the PrivateLink integration for LaunchDarkly.
The PrivateLink integration lets you configure AWS PrivateLink to route your event egress traffic through the AWS network backbone. Sending event egress traffic through PrivateLink can significantly reduce NAT Gateway and internet data transfer costs. Additionally, it lets you enforce stricter egress firewalls because none of the traffic to LaunchDarkly will traverse the public internet.
Only event egress traffic is supported for PrivateLink. This traffic is generated by LaunchDarkly SDKs to track various behaviors, such as which contexts have received which variant of a feature flag. PrivateLink is most useful for customers using LaunchDarkly for experimentation or guarded rollouts because these products can generate significant amounts of event egress traffic. If you want to limit ingress traffic for flags, consider using the Relay Proxy.
Before you can configure PrivateLink, you must add your AWS account to our allowlist. Contact your LaunchDarkly account manager or our Support team to get started.
The LaunchDarkly PrivateLink integration is available in all US AWS regions and availability zones.
For other regions, you can use VPC Peering.
By default, the LaunchDarkly PrivateLink service runs in the us-east-1 region. AWS supports cross-region PrivateLink connectivity, which lets you create endpoints in other regions that connect to this service.
You can create PrivateLink endpoints in any of the following AWS regions:
When creating an endpoint outside of us-east-1, do the following:
us-east-1.When using the AWS CLI, include the --service-region us-east-1 argument when creating endpoints outside of us-east-1. Do not include this argument when creating endpoints in us-east-1.
For example:
This section describes how you use the AWS Console to configure the integration. You can also use Terraform or CloudFormation to configure the integration.
To configure the integration in the AWS Console:
us-east-1 region. If you are configuring an endpoint in another region, follow the steps in Configuring endpoints in different AWS regions.com.amazonaws.vpce.us-east-1.vpce-svc-02ce0367b7e976a75 as the service name, and click Verify Service.
events.launchdarkly.com to resolve to this endpoint from within this VPC.
443 from the VPC.Pending state. When the endpoint has been provisioned and becomes Available, traffic will begin to route through it.