Configuring Amazon VPC support for Amazon Kendra connectors - Amazon Kendra

Configuring Amazon VPC support for Amazon Kendra connectors

To configure Amazon VPC for use with your Amazon Kendra connectors, take the following steps.

Step 1. Create Amazon VPC subnets for Amazon Kendra

Create or choose an existing Amazon VPC subnet that Amazon Kendra can use to access your data source. The prepared subnets must be in one of the following AWS Regions and Availability Zones:

  • US West (Oregon)/us-west-2—usw2-az1, usw2-az2, usw2-az3

  • US East (N. Virginia)/us-east-1—use1-az1, use1-az2, use1-az4

  • US East (Ohio)/us-east-2—use2-az1, use2-az2, use2-az3

  • Asia Pacific (Tokyo)/ap-northeast-1—apne1-az1, apne1-az2, apne1-az4

  • Asia Pacific (Mumbai)/ap-south-1—aps1-az1, aps1-az2, aps1-az3

  • Asia Pacific (Singapore)/ap-southeast-1—apse1-az1, apse1-az2, apse1-az3

  • Asia Pacific (Sydney)/ap-southeast-2—apse2-az1, apse2-az2, apse2-az3

  • Canada (Central)/ca-central-1—cac1-az1, cac1-az2, cac1-az4

  • Europe (Ireland)/eu-west-1—euw1-az1, uew1-az2, euw1-az3

  • Europe (London)/eu-west-2—usw2-az1, usw2-az2, usw2-az3

Your data source must be accessible from the subnets that you provided to Amazon Kendra connector.

For more information about how to configure Amazon VPC subnets, see Subnets for your Amazon VPC in the Amazon VPC User Guide.

If Amazon Kendra must route the connection between two or more subnets, you can prepare multiple subnets. For example, the subnet that contains your data source is out of IP addresses. In that case, you can provide Amazon Kendra with an additional subnet that has sufficient IP addresses and connected to the first subnet. If you list multiple subnets, the subnets must be able to communicate with each other.

Step 2. Create Amazon VPC security groups for Amazon Kendra

To connect your Amazon Kendra data source connector to Amazon VPC, you must prepare one or more security groups from your VPC to assign to Amazon Kendra. The security groups will be associated to the elastic network interface created by Amazon Kendra. This network interface controls inbound and outbound traffic to and from Amazon Kendra when accessing the Amazon VPC subnets.

Make sure that your security group's outbound rules allow the traffic from Amazon Kendra data source connectors to access the subnets and the data source that you are going to sync with. For example, you might use an MySQL connector to sync from a MySQL database. If you're using the default port, the security groups must allow Amazon Kendra to access port 3306 on the host that runs the database.

We recommend that you configure a default security group with the following values for Amazon Kendra to use:

  • Inbound rules – If you choose to leave this empty, all inbound traffic will be blocked.

  • Outbound rules – Add one rule to allow all outbound traffic so that Amazon Kendra can initiate the requests to sync from your data source.

    • IP version – IPv4

    • Type – All traffic

    • Protocol – All traffic

    • Port range – All

    • Destination – 0.0.0.0/0

For more information about how to configure Amazon VPC security groups, see Security group rules in the Amazon VPC User Guide.

Step 3. Configure your external data source and Amazon VPC

Make sure that your external data source has the correct permissions configuration and network settings for Amazon Kendra to access it. You can find detailed instructions on how to configure your data sources in the prerequisites section of each connector page.

Also, check your Amazon VPC settings and make sure that your external data source is reachable from the subnet you will assign to Amazon Kendra. To do this, we recommend that you create an Amazon EC2 instance in the same subnet with the same security groups and test access to your data source from this Amazon EC2 instance. For more information, see Troubleshooting Amazon VPC connection.