This topic uses private connectivity as a general term for AWS PrivateLink and Azure Private Link.
Prerequisites
AWS requirements:- VPC with private subnets
- Network Load Balancer for connections into the customer environment
- IAM permissions to create VPC endpoints, security groups, and Route 53 records
- Virtual network with subnets configured for private endpoints
- Private endpoint network policies disabled on target subnets
- Standard Load Balancer for connections into the customer environment
DNS requirements
Private connectivity requires DNS configuration to route traffic through private endpoints:- AWS: Route 53 Private Hosted Zone, and on-premises DNS forwarding if needed
- Azure: Azure Private DNS Zone linked to the customer VNet
- Both: CNAME records that point to the private endpoint
<company>.privatelink.unstructuredapp.io. For dedicated instances without private connectivity, the DNS name is in the format <company>.unstructuredapp.io.
Known limitations
| Limitation | Notes |
|---|---|
| Cross-Region private connectivity | Not supported. Your VPC Endpoints must be in the same region as your dedicated instance. |
| Cross-CSP private connectivity | Not supported, for example AWS to Azure |
| VPC Peering | Not supported as an alternative to private connectivity |

