Connectivity Models

The data plane can be connected to public and private environments for:

  1. Consumption of the public backend for the integration, as shown in diagram 1:

    infra connectivity model 1

  2. Consumption of the private backend, as shown in diagram 2:

    infra connectivity model 2

Supported connectivity models

Allow list (default)

  • Pros

    • Most recommended model for practicality and resilience.

    • Each data plane has at least 2 fixed outbound IPs. These IPs can/should be used for client-side firewall controls.

    • Cost is included in standard offerings.

  • Limitations

    • Cannot access backends without externalization through a proxy or similar technology.

The diagram below represents connectivity via allow list:

infra connectivity allow list

VPN (upon request)

  • Pros

    • Provides private access.

  • Considerations

    • Shared responsibility.

    • Different SLA for environments with VPN due to high incidence of issues.

    • Higher cost for setup, maintenance, and troubleshooting.

  • Limitations

    • Each data plane can connect to up to 4 networks, limited to 8190 IPs.

    • BGP is currently not supported.

The diagram below represents connectivity via VPN:

infra connectivity vpn

VPC peering (upon request)

  • Pros

    • Stability and resilience.

    • Simplified setup.

  • Considerations

    • Available only for clients whose backend is also hosted on AWS.

  • Limitations

    • Each data plane can connect to up to 4 networks, limited to 8190 IPs.

The diagram below represents connectivity via VPC peering:

infra connectivity vpc

Transit gateway (upon request)

  • Pros

    • Allows access to backends through a private link.

    • No need for a VPN.

    • Greater flexibility in communication between VPCs.

    • Within AWS limits, essential points related to the transit gateway and connectivity are adjustable.

  • Considerations

    • The client must share the AWS transit gateway with the Sensedia account.

    • Route creation is required on both Sensedia’s and the client’s sides.

    • AWS charges apply on both sides (Client and Sensedia) for VPCs attached to the AWS transit gateway.

  • Limitations

    • Each data plane can receive up to 5 unique AWS transit gateway attachments.

    • AWS transit gateway limits also apply.

The diagram below represents connectivity via transit gateway:

infra connectivity transit gateway

For more information, access the documentation about the establishment of connectivity with AWS transit gateway.

Direct connect (upon request)

  • Pros

    • Allows access to backends through a private link.

  • Considerations

    • Cost.

    • Shared responsibility model between Sensedia, the client, and the link provider.

  • Limitations

    • Each data plane can connect to up to 4 networks, limited to 8190 IPs.

The diagram below represents connectivity via direct connect:

infra connectivity direct connect

Networks exceeding 8190 hosts (/19) are not supported.
  • Pros

    • Facilitates communication between components on AWS.

    • Ensures private access with high resilience.

  • Cons

    • Requires exposure through an NLB on the client side.

  • Private DNS name

    • According to AWS documentation, it is possible to use a custom domain name for the endpoint service, such as <service>.customer.com.br. This name is private as AWS registers it in a local DNS zone for the VPCs connected to the endpoint service.

    • The advantage is consolidating service exposure under a single name for different service consumers.

    • Clients wishing to use this feature need to enable and validate the endpoint service to use the selected name. Once configured, the client should open a ticket with Sensedia support to activate the private DNS name, providing the endpoint service details.

  • Limitations

    • Up to 4 VPC endpoints (powered by AWS PrivateLink) are supported per data plane.

The diagram below represents connectivity using a VPC endpoint enabled by AWS PrivateLink:

infra connectivity private link

Additionally, the same VPC endpoint associated with a single load balancer can be used with multiple ports and target groups.

The diagram below represents this model:

infra connectivity private link load balancer

For more information, consult the official AWS documentation on PrivateLink.
Thanks for your feedback!
EDIT

Share your suggestions with us!
Click here and then [+ Submit idea]