This feature is available as part of the Honeycomb Enterprise plan.

- Limits API traffic over the internet as requests to our API server are transparently handled within AWS networks
- If your infrastructure relies on outbound firewalls, you can manage access to the Honeycomb API with security groups (or rules on your firewall appliance)
- Reduced costs for high volume traffic with other services on PrivateLink. Contact your Honeycomb account team for details.
Before You Begin
Honeycomb must grant access to each AWS account that requires access to the Honeycomb API via AWS PrivateLink. Contact your Honeycomb account team for details. Honeycomb offers AWS PrivateLink to our US instance from theus-east-1 region and to our EU instance from the eu-west-1 region.
VPCs within each region may access it directly, while outside VPCs can use VPC Peering.
Honeycomb also offers cross-region endpoint support.
Configuration Using the AWS Console
These instructions configure AWS PrivateLink via the AWS Console.Configuration of AWS PrivateLink through infrastructure-as-code tools like Terraform or CloudFormation is recommended but not shown.
Refer to the Terraform example below.
- Visit the Amazon VPC console in the appropriate region:
- US instance:
us-east-1 - EU instance:
eu-west-1
- US instance:
- From the left navigation, select Endpoints and choose Create endpoint.

- For Service category, choose PrivateLink Ready partner services.
- For the Service name, enter the name of the service:
- US instance:
com.amazonaws.vpce.us-east-1.vpce-svc-0878e9afcbb4c4333 - EU instance:
com.amazonaws.vpce.eu-west-1.vpce-svc-077ead63dd7ebe330
- US instance:
- If you are establishing the endpoint from a different region than the Honeycomb instance it will run in, check the Enable Cross Region endpoint box, and specify the right region
- US instance:
us-east-1 - EU instance:
eu-west-1
- US instance:
- Select Validate.
If the service fails to validate, reach out to your Honeycomb account team.


- From the Select a VPC list, select the VPCs that contain the services sending traffic to Honeycomb.
- From the Additional settings dropdown, ensure that Enable DNS name is enabled. This requires that “Enable DNS hostnames” and “Enable DNS support” are enabled for this VPC.
- Select one subnet per Availability Zone that the PrivateLink Endpoint will be created in. This subnet must contain your services or the ability to route to all subnets where your services are run.
- Select a security group that allows inbound access on port
443from your VPC’s network block, such as10.0.0.0/8. If you do not see a security group, you may need to create one. - Choose Create endpoint. The Endpoint console shows a “Pending” status until it is “Available.” Once available, your infrastructure transparently sends data through the connection.
Cross-Region Endpoint Support
Cross-Region endpoints are supported in the following regions:af-south-1ap-east-1ap-northeast-1ap-northeast-2ap-northeast-3ap-south-1ap-south-2ap-southeast-1ap-southeast-2ap-southeast-3ap-southeast-4ca-central-1eu-central-1eu-central-2eu-north-1eu-south-1eu-south-2eu-west-1eu-west-2eu-west-3me-central-1me-south-1sa-east-1us-east-1us-east-2us-west-1us-west-2
Example Configuration Using Terraform
Monitoring the PrivateLink Endpoint
AWS captures metrics for each VPC endpoint. These metrics are accessible through the AWS Console and published to CloudWatch. Learn how to send AWS CloudWatch metrics to Honeycomb. From the AWS Console:- Visit the Amazon VPC console in the appropriate region:
- US instance:
us-east-1 - EU instance:
eu-west-1
- US instance:
- From the left navigation, select Endpoints and choose the endpoint ID.
- Select the Monitoring tab.