23 C
Canberra
Wednesday, March 4, 2026

Designing centralized and distributed community connectivity patterns for Amazon OpenSearch Serverless


Amazon OpenSearch Serverless is a completely managed search and analytics service that mechanically provisions and scales infrastructure that will help you run search and analytics workloads with out cluster administration. With OpenSearch Serverless, you possibly can rapidly construct search and analytics capabilities into your functions.

As organizations scale their use of OpenSearch Serverless, understanding community structure and DNS administration turns into more and more necessary. Constructing upon the connectivity patterns mentioned in our earlier submit Community connectivity patterns for Amazon OpenSearch Serverless, this submit covers superior deployment eventualities centered on centralized and distributed entry patterns—particularly, how enterprises can simplify community connectivity throughout a number of AWS accounts and lengthen entry to on-premises environments for his or her OpenSearch Serverless deployments.

We define two key deployment patterns:

  • Sample 1 – A centralized endpoint mannequin the place interface digital personal cloud (VPC) endpoints for OpenSearch Serverless are deployed in a shared companies VPC, permitting spoke VPCs from different AWS accounts and on premises to entry OpenSearch Serverless collections by means of these consolidated endpoints.
  • Sample 2 – A distributed endpoint mannequin the place interface VPC endpoints are created in particular person spoke VPCs, with a number of shoppers (central account, on-premises networks, and different spoke accounts) accessing these endpoints by means of centralized DNS administration. This strategy supplies direct connectivity inside every spoke VPC whereas sustaining centralized DNS management and administration throughout the group.

Earlier than diving into superior deployment patterns, let’s overview the DNS conduct of OpenSearch Serverless when accessed by means of an interface VPC endpoint (AWS PrivateLink). Understanding this foundational side will help make clear the connectivity patterns we discover on this submit.

OpenSearch Serverless interface VPC endpoint DNS decision

When creating an OpenSearch Serverless interface VPC endpoint, the service mechanically provisions three personal hosted zones: one seen personal hosted zone us-east-1.aoss.amazonaws.com that handles area decision for the OpenSearch Serverless assortment and dashboard, one other seen personal hosted zone us-east-1.opensearch.amazonaws.com that manages decision for the OpenSearch UI (OpenSearch Dashboards), and one hidden inner personal hosted zone that manages the ultimate DNS decision to personal IP addresses.

Our goal on this submit is to discover how the 2 personal hosted zones for OpenSearch Serverless work collectively: the seen personal hosted zone us-east-1.aoss.amazonaws.com for collections and dashboards, and the hidden personal hosted zone for ultimate DNS decision to personal IP addresses. We look at how these personal hosted zones allow scalable DNS decision in each centralized and distributed architectures. The next workflow diagram reveals the DNS decision move for the us-east-1 AWS Area. The identical sample applies to different Areas, with the Area identifiers within the DNS data altering accordingly.

DNS Workflow Diagram AOSS

The workflow consists of the next steps:

  1. A person requests entry to a set URL (for instance, abc.us-east-1.aoss.amazonaws.com).
  2. The DNS request is shipped to the Amazon Route 53 Resolver, which checks the seen personal hosted zone us-east-1.aoss.amazonaws.com and finds a CNAME file pointing to the endpoint-specific area.
  3. The Route 53 Resolver makes use of the hidden inner personal hosted zone to resolve this endpoint-specific area to the VPC endpoint’s personal IP tackle.
  4. Visitors is allowed provided that it originates from the interface VPC endpoint authorized by OpenSearch Serverless community insurance policies.

Though this DNS Decision Course of supplies versatile and safe personal entry, it turns into complicated if you want connectivity from a number of VPCs, completely different AWS accounts, or on-premises networks. The next patterns tackle these challenges and description methods to simplify community entry and DNS administration for OpenSearch Serverless in such environments.

Sample 1: Centralized interface VPC endpoint for OpenSearch Serverless

This sample makes use of a centralized strategy the place a shared companies AWS account with a shared companies VPC hosts the OpenSearch Serverless interface VPC endpoint and OpenSearch Serverless assortment. From there, different AWS accounts with Amazon VPCs (spoke VPCs) want to have the ability to entry OpenSearch Serverless collections by means of this central endpoint. Organizations generally implement this setup in hub-and-spoke community designs that join their VPCs utilizing both AWS Transit Gateway or AWS Cloud WAN. The next diagram illustrates this structure.

AOSS Centralized Account

Problem

When accessing from on-premises networks, each community entry and DNS decision for the OpenSearch Serverless interface VPC endpoint work efficiently. Nonetheless, though the endpoint is network-accessible from spoke VPCs (for instance, by means of Transit Gateway or AWS Cloud WAN), DNS decision from these VPCs fail.

This occurs as a result of OpenSearch Serverless creates and makes use of a non-public hosted zone us-east-1.aoss.amazonaws.com that’s solely related to the VPC containing the endpoint, on this case, the Shared Providers VPC. Merely sharing this personal hosted zone with the spoke VPCs doesn’t resolve the issue, as a result of the wildcard CNAME file references a DNS identify privatelink.c0X.sgw.iad.prod.aoss.searchservices.aws.dev. This DNS identify can’t be resolved from different VPCs with out extra configuration, as a result of it belongs to a non-public hosted zone privatelink.c0X.sgw.iad.prod.aoss.searchservices.aws.dev that’s solely related to the shared companies VPC. This personal hosted zone isn’t seen in your account and is managed by AWS.

Answer: Use Amazon Route 53 Profiles for cross-VPC DNS decision

To allow centralized DNS decision, you should use Amazon Route 53 Profiles. With Route 53 Profiles, you possibly can handle and apply DNS-related Amazon Route 53 configurations throughout a number of VPCs and AWS accounts. The next diagram illustrates the answer structure.

AOSS Centralized Account Route53 Profile

The answer consists of the next steps:

  1. Create an OpenSearch Serverless interface VPC endpoint within the shared companies VPC. This mechanically creates and associates the next:
      1. Two default personal hosted zones.
      2. One hidden personal hosted zone with this VPC.
  2. Create a Route 53 Profile within the shared companies account.
  3. Affiliate the interface VPC endpoint for OpenSearch Serverless with the Route 53 Profile.
    1. The Route 53 Profile mechanically associates the hidden personal hosted zone with the profile.
  4. Affiliate the personal hosted zone us-east-1.aoss.amazonaws.com that was mechanically created by OpenSearch Serverless with the Route 53 Profile.
  5. Share the Route 53 Profile together with your different AWS accounts in your group utilizing AWS Useful resource Entry Supervisor (AWS RAM).
  6. Affiliate the spoke VPCs (positioned in numerous accounts) with the Route 53 Profile.

You probably have an present Route 53 Profile in your shared companies account that’s already related to spoke VPCs, you possibly can merely affiliate the OpenSearch Serverless interface VPC endpoint and the personal hosted zone us-east-1.aoss.amazonaws.com to this profile.

After finishing these steps, the DNS decision for the OpenSearch Serverless assortment and dashboard endpoints works seamlessly from spoke VPCs related to the Route 53 Profile. Purchasers in spoke VPCs can resolve and entry OpenSearch Serverless collections and dashboards by means of the centralized VPC endpoint.

Sample 2: Distributed interface VPC endpoint for OpenSearch Serverless

Every spoke VPC, residing in its respective AWS account, hosts its personal OpenSearch Serverless assortment and interface VPC endpoint. We now need to obtain the next:

  • Centralize DNS administration in a shared companies VPC to offer constant decision for OpenSearch Serverless collections deployed throughout a number of spoke accounts
  • Present on-premises sources with DNS decision functionality for all OpenSearch Serverless collections throughout the group by means of a Route 53 Resolver inbound endpoint within the shared companies VPC

The next diagram illustrates this structure.

AOSS Distributed

Problem

Managing DNS decision for OpenSearch Serverless collections and dashboards turns into complicated on this distributed mannequin as a result of every interface VPC endpoint creates its personal set of personal hosted zones which are solely related to their respective VPCs. This creates a fragmented DNS panorama the place the shared companies VPC and on-premises networks want a consolidated technique to resolve domains of OpenSearch Serverless collections and dashboards throughout a number of spoke accounts.

Answer: Use a self-managed personal hosted zone within the shared companies VPC for on-prem DNS decision

To allow centralized DNS decision for distributed endpoints, create a self-managed personal hosted zone within the shared companies account and affiliate it with the shared companies VPC. Inside this personal hosted zone, you possibly can create CNAME data that map every OpenSearch Serverless assortment endpoint to its respective interface VPC endpoint DNS names within the spoke accounts. The next diagram illustrates this structure.

AOSS Distributed Centralized DNS On Prem and VPC

Implementation consists of the next steps:

  1. Create a self-managed personal hosted zone within the shared companies account with the area identify us-east-1.aoss.amazonaws.com and affiliate it with the shared companies VPC. For every OpenSearch Serverless assortment, create a CNAME file that factors to the Regional DNS identify of its corresponding interface VPC endpoint.

This configuration allows each on-premises sources and sources within the shared companies VPC to resolve OpenSearch Serverless endpoints which are within the spoke accounts.

After you full these steps, every OpenSearch Serverless interface VPC endpoint stays inside its authentic AWS account, sustaining safety boundaries and account-level autonomy. On-premises methods can entry OpenSearch Serverless collections and dashboards utilizing authentic assortment DNS names (for instance, {collection-name}.us-east-1.aoss.amazonaws.com) by means of DNS decision supplied by the personal hosted zone within the shared companies VPC.

Conclusion

As organizations scale their adoption of OpenSearch Serverless, establishing safe and centralized community entry turns into more and more necessary. On this submit, we explored two architectural patterns particularly round DNS administration:

  • Centralized endpoint mannequin – This sample is right when a shared companies account manages the OpenSearch Serverless interface VPC endpoints, permitting a number of spoke accounts to entry OpenSearch Serverless collections and dashboards by means of a centralized set of community sources.
  • Distributed endpoint mannequin with centralized DNS – This sample is appropriate for organizations that require account-level autonomy, the place every AWS account manages its personal OpenSearch Serverless interface VPC endpoints, whereas DNS decision is centralized by means of a shared self-managed personal hosted zone in a shared companies account.

By understanding the DNS structure of OpenSearch Serverless and utilizing companies like Route 53 Profiles and AWS RAM, organizations can construct safe and strong entry patterns that align with their organizational construction and desires.


Concerning the Authors

Ankush GoyalAnkush Goyal is a Enterprise Assist Lead in AWS Enterprise Assist who helps prospects streamline their cloud operations on AWS. He’s a results-driven IT skilled with over 20 years of expertise.

Anvesh KogantiAnvesh Koganti is a Options Architect at AWS specializing in Networking. He focuses on serving to prospects construct networking architectures for extremely scalable and resilient AWS environments. Exterior of labor, Anvesh is captivated with client know-how and enjoys listening to podcasts on tech and enterprise. When disconnecting from the digital world, Anvesh spends time outside climbing and biking.

Salman AhmedSalman Ahmed is a Senior Technical Account Supervisor in AWS Enterprise Assist. He makes a speciality of guiding prospects by means of the design, implementation, and help of AWS options. Combining his networking experience with a drive to discover new applied sciences, he helps organizations efficiently navigate their cloud journey. Exterior of labor, he enjoys images, touring, and watching his favourite sports activities groups.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles