Use this section to help your teams evaluate, secure, and implement a dedicated instance in the Unstructured platform.
This section covers:
- Supported cloud providers and regions.
- Dedicated instance architecture.
- Who to involve and what to prepare before onboarding begins.
- Requirements and known limitations.
- Security model, shared responsibility, and compliance considerations.
Cloud service provider (CSP) support
Unstructured supports dedicated instances on Amazon Web Services (AWS) and Microsoft Azure (Azure). This section covers architecture and configuration information that generally applies to dedicated instances on both cloud providers. For provider-specific onboarding guidance, see:- AWS — Onboarding your dedicated instance + AWS PrivateLink
- Azure — Onboarding your dedicated instance + Azure Private Link
Supported cloud providers and regions
| Cloud provider | Availability |
|---|---|
| Amazon Web Services (AWS) | General availability |
| Microsoft Azure | General availability |
| Google Cloud Platform (GCP) | Not currently supported |
| Region name | Region code |
|---|---|
| US East (N. Virginia) | us-east-1 |
| US East (Ohio) | us-east-2 |
| US West (Oregon) | us-west-2 |
| Europe (Ireland) | eu-west-1 |
| Europe (Stockholm) | eu-north-1 |
| Europe (Frankfurt) | eu-central-1 |
| Asia Pacific (Sydney) | ap-southeast-2 |
| Asia Pacific (Mumbai) | ap-south-1 |
| Asia Pacific (Seoul) | ap-northeast-2 |
| Region name | Region code |
|---|---|
| East US 2 (Virginia) | eastus2 |
| West US 2 (Washington) | westus2 |
| North Europe (Ireland) | northeurope |
| West Europe (Netherlands) | westeurope |
| Southeast Asia (Singapore) | southeastasia |
| Japan East (Tokyo, Saitama) | japaneast |
A dedicated instance is a regional service. It runs entirely in a single cloud region. Your private connectivity endpoints must be in the same region as your dedicated instance.
This section uses private connectivity as a general term for AWS PrivateLink and Azure Private Link.
Private connectivity for your dedicated instance
Both AWS and Azure let you privately connect your Virtual Private Cloud (VPC) or Virtual Network (VNet) to your dedicated instance on the Unstructured platform without traversing the public internet. Network filtering lets you block inbound and outbound internet traffic entirely or restrict it to specific IP addresses or CIDR ranges. Benefits- Eliminate public exposure - Traffic between your VPC or VNet and Unstructured stays on cloud-provider private networking instead of the public internet.
- Stronger network isolation for sensitive workloads - Support internal security and compliance requirements where private network access is preferred or required.
- Simpler enterprise network integration - Align with existing private connectivity patterns, including VPC or VNet isolation and private connectivity to on-premises networks.
- Control and visibility - Use private endpoints and private DNS to control traffic flow, enforce network-level access policies, and improve visibility into traffic paths and access patterns.

