<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HEC HWF behind AWS Loadbalancer. ELB or ALB? in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/HEC-HWF-behind-AWS-Loadbalancer-ELB-or-ALB/m-p/613299#M26144</link>
    <description>&lt;P&gt;From personal experience I use application loadbalancers for all of my HEC endpoints exposed to the internet. Via loadbalancer configuration I expose TCP port 443 to the internet and forward TCP port 8088 (standard HEC port) to backend EC2 instances acting as Heavy Forwarders.&lt;/P&gt;&lt;P&gt;The security group attached to the loadbalancer allows inbound traffic from the external sources I expect (mainly AWS Kinesis Firehose address space) and the outbound portion of the security group rule allows communication with the subnets my EC2 instances sit in.&lt;/P&gt;&lt;P&gt;For healthcheck monitoring on the target group I monitor this endpoint "/services/collector/health" over HTTPS for successful HTTP response codes 200-299 with a 5 second timeout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Sep 2022 21:40:32 GMT</pubDate>
    <dc:creator>TheColorBlack</dc:creator>
    <dc:date>2022-09-15T21:40:32Z</dc:date>
    <item>
      <title>HEC HWF behind AWS Loadbalancer. ELB or ALB?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/HEC-HWF-behind-AWS-Loadbalancer-ELB-or-ALB/m-p/532566#M18322</link>
      <description>&lt;P&gt;Hello all. I am wondering what’s the best choice for putting the HTTP event collector behind an AWS load balancer. It would seem to me that an application load balancer would be appropriate for HTTP traffic, as opposed to a traditional load balancer.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 00:58:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/HEC-HWF-behind-AWS-Loadbalancer-ELB-or-ALB/m-p/532566#M18322</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2020-12-10T00:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: HEC HWF behind AWS Loadbalancer. ELB or ALB?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/HEC-HWF-behind-AWS-Loadbalancer-ELB-or-ALB/m-p/612016#M26105</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/72642"&gt;@brent_weaver&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Just wondering what you ended up using and how it went?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 03:48:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/HEC-HWF-behind-AWS-Loadbalancer-ELB-or-ALB/m-p/612016#M26105</guid>
      <dc:creator>MKozanic</dc:creator>
      <dc:date>2022-09-06T03:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: HEC HWF behind AWS Loadbalancer. ELB or ALB?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/HEC-HWF-behind-AWS-Loadbalancer-ELB-or-ALB/m-p/613299#M26144</link>
      <description>&lt;P&gt;From personal experience I use application loadbalancers for all of my HEC endpoints exposed to the internet. Via loadbalancer configuration I expose TCP port 443 to the internet and forward TCP port 8088 (standard HEC port) to backend EC2 instances acting as Heavy Forwarders.&lt;/P&gt;&lt;P&gt;The security group attached to the loadbalancer allows inbound traffic from the external sources I expect (mainly AWS Kinesis Firehose address space) and the outbound portion of the security group rule allows communication with the subnets my EC2 instances sit in.&lt;/P&gt;&lt;P&gt;For healthcheck monitoring on the target group I monitor this endpoint "/services/collector/health" over HTTPS for successful HTTP response codes 200-299 with a 5 second timeout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 21:40:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/HEC-HWF-behind-AWS-Loadbalancer-ELB-or-ALB/m-p/613299#M26144</guid>
      <dc:creator>TheColorBlack</dc:creator>
      <dc:date>2022-09-15T21:40:32Z</dc:date>
    </item>
  </channel>
</rss>

