Before you can deploy Conversions API Gateway or Signals Gateway, you’ll need the following properties and access:
Businesses can choose to deploy one of the “Gateway Products” Conversions API Gateway or Signals Gateway on their existing third-party cloud account, or on a new cloud account separated from their main assets. Both options provide infrastructure isolation, as Gateway Products are designed to have no interaction with business’ server-side assets. Gateway Products are provisioned within the default Virtual Private Cloud network (VPC).
To function correctly, Gateway Products require the following inbound and outbound network traffic to be open. The default configuration only allows the required traffic.
Source | Destination | Protocol/Port | Description |
---|---|---|---|
Gateway Product instance | 0.0.0.0/0 | All | Allow outbound connection to the internet from Gateway Product to pass events to Meta and download packages from external repositories such as:
|
0.0.0.0/0 | Gateway Product instance | TCP/80 | Allow inbound HTTP connection to Gateway Products This port is automatically redirected to TCP/443 |
0.0.0.0/0 | Gateway Product instance | TCP/443 | Allow inbound HTTPS connection to Gateway Products Used by browsers to send events through websockets secure (WSS) or HTTPS |
Endpoints are secured via TLS and SSL, and in-transit data is encrypted. Gateway Products expose two internet-facing endpoints:
These endpoints are secured through TLS (TLS 1.2 and 1.3 are supported) and by using an SSL (default cipher list) certificate generated automatically during the server provisioning. The default certificate has a one year life time and renews regularly as long as two DNS records set up during installation are unchanged.
The default domain uses AWS Cloudfront endpoint. If a user sets up a custom domain, it uses AWS managed certificates. TLS is terminated at load balancer level before forwarding to private VPC.
To help reinforce the protections of Gateway Products endpoints, businesses can use their preferred cloud-based security solutions (Web Application Firewall, anti-DDOS) from AWS or other third-party providers. Such protections are configured by proxying the Gateway Products traffic through the corresponding service provider and allowing inbound traffic only from this service provider.
Gateway Products store configuration data and operational logs such as event statistics, and uses the instance disk storage for storing logs.
nstances using AWS as their third-party cloud provider will have logs stored in CloudWatch, and access to these logs is determined by AWS data access policies and any additional policies implemented within their organization. You may choose to share operational logs with your support contact. Learn more about extracting logs.
Gateway Products server capacity is determined by the scale limit. It can be decided on the Gateway Products Admin UI after installation.
Note that: