Skip to content

Network sec: rebrand and new cloud UX, IP filters in serverless #1785

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 40 commits into
base: main
Choose a base branch
from

Conversation

shainaraskas
Copy link
Collaborator

@shainaraskas shainaraskas commented Jun 18, 2025

This PR updates the core pages related to traffic filtering to reflect the new ux (issue: https://github.com/elastic/platform-docs-team/issues/682)

This is PR 1 of 2 or 3. The first PR will capture the core changes needed to ship the feature. Subsequent PRs will update references to traffic filters other places in the docs, do any necessary API reference cleanup, etc.

NOTE:
We currently don't have redirects working, so I can't update URLs right now. I can come back and update these URLs if needed after we get redirects up and running.

Summary

  • rebranded traffic filters feature area to network security
  • added IP filter support for serverless
  • rebranded privatelink filters as private connectivity / private connections
  • rebranded rules to policies
  • rebranded remote cluster traffic filters to remote cluster private connection policies
  • repositioned private connection policies to disconnect allowing traffic over PrivateLink from filtering traffic to deployments to specific VPCEs
  • split elastic cloud policy logic into its own page
  • split ECE traffic filter instructions and logic into its own page
  • updated all procedures impacted by ux changes
  • moved an API-centric page that applied to both IP filters and private connections higher in the nav for visibility + added serverless API procedures

This PR is pretty big, so you can use the links below to review it

Key changes

Network security and network security policies

Page (preview link) Changes Related files
Network security Rebranded the "umbrella" of features as network security, added IP filter support for serverless, rebranded PrivateLink filters as private connections

Pulled policy/rule logic out of this page and into dedicated pages for Elastic Cloud and ECE
deploy-manage/security/traffic-filtering.md
Network security policies in Elastic Cloud NEW PAGE split from the ECE version. Rebrand, slight reorganization for readability, changed flows impacted by UX changes, added serverless flows deploy-manage/security/network-security-policies.md
Manage network security through the API Rebrand for changed terms (provided a mapping due to unchanged endpoints), brought up a level so it would apply to both IP filters and private connections, added serverless examples based on the API design deploy-manage/security/ec-traffic-filtering-through-the-api.md

IP filters

Page (preview link) Changes Related files
IP filtering Scoped to serverless, linked to new split docs for Elastic Cloud / ECE, some organizational headings to support deploy-manage/security/ip-traffic-filtering.md
Manage IP filters in ECH or Serverless Scoped to ECH and serverless, removed ECE info to another doc

Rebranded as "IP filter network security policies"

Updated all flows impacted by UX changes
deploy-manage/security/ip-filtering-cloud.md

snippet: wayfinding to network security page

Private connections

Page (preview link) Changes Related files
Private connections (overview) Rebranded private link filters to private connections

repositioned them as a connectivity strategy with VCPE filtering optional for everything but Azure
deploy-manage/security/private-link-traffic-filters.md
AWS PrivateLink private connections Updated with new UX flows, clarified connection between private connection + VPCE filtering, split processes repeated across CSPs into snippets, readability + flow improvements, fixed testing examples to account for the "allow traffic over private link by default" change

used deployment aliases to test/connect privatelink for consistency
deploy-manage/security/aws-privatelink-traffic-filters.md

snippets: wayfinding to network security page, associate filter, private url structure, find endpoint, fleet
Azure Private Link private connections Updated with new UX flows, clarified connection between private connection + VPCE filtering, split processes repeated across CSPs into snippets, readability + flow improvements, fixed testing examples to account for the "allow traffic over private link by default" change

used deployment aliases to test/connect privatelink for consistency
deploy-manage/security/azure-private-link-traffic-filters.md

snippets: wayfinding to network security page, associate filter, private url structure, find endpoint, fleet
GCP Private Service Connect private connections Updated with new UX flows, clarified connection between private connection + VPCE filtering, split processes repeated across CSPs into snippets, readability + flow improvements, fixed testing examples to account for the "allow traffic over private link by default" change

used deployment aliases to test/connect privatelink for consistency
deploy-manage/security/gcp-private-service-connect-traffic-filters.md

snippets: wayfinding to network security page, associate filter, private url structure, find endpoint, fleet

Remote clusters

Page (preview link) Changes Related files
Remote clusters with Elastic Cloud Hosted

Access deployments of another Elastic Cloud organization
remote cluster traffic filters are now remote cluster private conenction policies deploy-manage/remote-clusters/ec-enable-ccs.md

deploy-manage/remote-clusters/ec-remote-cluster-other-ess.md

Secondary changes

todo: serverless reference doc URL

Page (preview link) Changes Related files
Deploy and manage > Security (overview) Scoped to serverless (this is the first configurable security feature)
Updated references to traffic filters to "network security" or "IP filtering and private connections" as needed, added IP filtering to the list of security features for serverless
deploy-manage/security.md

deploy-manage/_snippets/ecloud-security.md

snippets: security in elastic cloud, features for cluster communication and network security, feature comparison
Secure your cluster, deployment, or project Scoped to serverless, updated references to traffic filters to "network security" or "IP filtering and private connections" as needed, added IP filtering to the list of security features for serverless deploy-manage/security/secure-your-cluster-deployment.md

snippets: features for cluster communication and network security, feature comparison
Compare Elastic Cloud Hosted and Serverless Added public IP filtering as a serverless feature deploy-manage/deploy/elastic-cloud/differences-from-other-elasticsearch-offerings.md
Manage IP filters in ECE NEW PAGE split from the cloud (ECH/serverless) version. instructions remain the same, references to ECH/serverless removed deploy-manage/security/ip-filtering-ece.md
Traffic filter rules in Elastic Cloud Enterprise NEW PAGE split from the cloud (ECH/serverless) version. information and instructions remain the same, references to ECH/serverless removed. slight organizational improvements to break out logic info from restrictions deploy-manage/security/ece-filter-rules.md
Claim VCPE ID ownership Rebrand away from traffic filter link ID to VCPE ID deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md

Open questions

  • Is the umbrella term for private connection filters "VCPE filtering" (e.g. "add a private connection, then filter traffic to your deployment using VCPE filters")? Will this term be used for GCP?

    ANSWER: It's "VPC filtering"

  • For Azure, is associating a private connection policy with a deployment required, or optional?

    ANSWER: technically optional but strongly recommended

  • For Azure inter-region private links, what region should the associated policy be created in?

SR TODO

  • VCPE filter(ing) -> VCP filter(ing)
  • azure policy association is optional but should be done so you can track your secured resources
  • new "look up secured resources" procedure
  • terminology consistency assessment
  • more visibility to azure inter-region private links

@shainaraskas shainaraskas changed the title Network security: rebrand and new elastic cloud UX Network sec: rebrand and new cloud UX, IP filters in serverless Jun 18, 2025
@shainaraskas shainaraskas marked this pull request as ready for review June 19, 2025 20:07
@shainaraskas shainaraskas requested a review from a team as a code owner June 19, 2025 20:07
@shainaraskas shainaraskas requested a review from alxchalkias June 19, 2025 20:07
@shainaraskas
Copy link
Collaborator Author

hey @alxchalkias, this is ready for review. Please loop in any devs who you'd like to review it as well. I left some open questions at the bottom of the PR description that you might be able to help me with.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

todo: add "looking up secured resources" process

@@ -3,5 +3,5 @@
* **The transport layer**: Used mainly for inter-node communications, and in certain cases for cluster to cluster communication.
* In self-managed {{es}} clusters, you can also [Configure {{kib}} and {{es}} to use mutual TLS](/deploy-manage/security/kibana-es-mutual-tls.md).
* [Enable cipher suites for stronger encryption](/deploy-manage/security/enabling-cipher-suites-for-stronger-encryption.md): The TLS and SSL protocols use a cipher suite that determines the strength of encryption used to protect the data. You may want to enable the use of additional cipher suites, so you can use different cipher suites for your TLS communications or communications with authentication providers.
* [Restrict connections using traffic filtering](/deploy-manage/security/traffic-filtering.md): Traffic filtering allows you to limit how your deployments can be accessed. Add another layer of security to your installation and deployments by restricting inbound traffic to only the sources that you trust. Restrict access based on IP addresses or CIDR ranges, or, in {{ech}} deployments, secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
* [Secure your network using IP filtering and private connectivity](/deploy-manage/security/traffic-filtering.md): Network security allows you to limit how your deployments can be accessed. Add another layer of security to your installation and deployments by restricting inbound traffic to only the sources that you trust. Restrict access based on IP addresses or CIDR ranges, or, in {{ech}} deployments, secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

add vcp filtering here

@alxchalkias
Copy link
Contributor

Is the umbrella term for private connection filters "VCPE filtering" (e.g. "add a private connection, then filter traffic to your deployment using VCPE filters")? Will this term be used for GCP?

Umbrella term: "VPC filtering/ers". For CSP-specific, we could use what they document, i.e. AWS VPCE ID, Azure resource name/ID, GCP connection ID

For Azure, is associating a private connection policy with a deployment required, or optional?

Optional, however, we should push users to apply the policies for book-keeping/monitoring.

For Azure inter-region private links, what region should the associated policy be created in?

I think it's the region where the resource lives, but @igor-kupczynski or @cargious can chime in here.

@@ -1,7 +1,9 @@
{{ecloud}} has built-in security. For example, HTTPS communications between {{ecloud}} and the internet, as well as inter-node communications, are secured automatically, and cluster data is encrypted at rest.

In both {{ech}} amd {{serverless-full}}, you can also configure [IP filtering network security policies](/deploy-manage/security/ip-filtering-cloud.md) to prevent unauthorized access to your deployments and projects.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

could this be just "IP filtering" to avoid the mouthful?

In {{ech}}, you can augment these security features in the following ways:
* Configure [traffic filtering](/deploy-manage/security/traffic-filtering.md) to prevent unauthorized access to your deployments.
* [Configure private connectivity and apply VCPE filtering](/deploy-manage/security/traffic-filtering.md) to establish a secure connection for your {{ecloud}} deployments to communicate with other cloud services, and restrict traffic to deployments based on those private connections.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will the URL be refactored to remove the "traffic filtering" reference?


For remote clusters configured using TLS certificate authentication, [traffic filtering](../security/traffic-filtering.md) can be enabled to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
For remote clusters configured using TLS certificate authentication, [network security policies](../security/traffic-filtering.md) can be applies to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
For remote clusters configured using TLS certificate authentication, [network security policies](../security/traffic-filtering.md) can be applies to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
For remote clusters configured using TLS certificate authentication, [network security policies](../security/traffic-filtering.md) can be applied to restrict access to deployments that are used as a local or remote cluster without any impact on cross-cluster search or cross-cluster replication.

::::

API key authentication for remote clusters cannot be used in combination with traffic filtering.
API key authentication for remote clusters cannot be used in combination with network security.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
API key authentication for remote clusters cannot be used in combination with network security.
API key authentication for remote clusters cannot be used in combination with network security policies.

@@ -14,7 +14,7 @@ products:
This section explains how to configure a deployment to connect remotely to clusters belonging to a different {{ecloud}} organization.

::::{note}
If traffic filtering is enabled on the remote cluster, the remote cluster administrator must configure a traffic filter of type remote cluster, using either the organization ID or the Elasticsearch cluster ID as the filtering criteria. For detailed instructions, refer to [Remote clusters and traffic filtering](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-traffic-filtering).
If network security policies are applied to the remote cluster, the remote cluster administrator must configure a network security private connection policy of type remote cluster, using either the organization ID or the Elasticsearch cluster ID as the filtering criteria. For detailed instructions, refer to [Remote clusters and traffic filtering](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-traffic-filtering).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
If network security policies are applied to the remote cluster, the remote cluster administrator must configure a network security private connection policy of type remote cluster, using either the organization ID or the Elasticsearch cluster ID as the filtering criteria. For detailed instructions, refer to [Remote clusters and traffic filtering](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-traffic-filtering).
If network security policies are applied to the remote cluster, the remote cluster administrator must configure a private connection of type remote cluster, using either the organization ID or the Elasticsearch cluster ID as the filtering criteria. For detailed instructions, refer to [Remote clusters and traffic filtering](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-traffic-filtering).

@@ -79,7 +79,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_claim
```


## List claimed traffic filter link id [ec-list-claimed-traffic-filter-link-id]
## List claimed IDs [ec-list-claimed-traffic-filter-link-id]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
## List claimed IDs [ec-list-claimed-traffic-filter-link-id]
## List claimed private connection IDs [ec-list-claimed-traffic-filter-link-id]

@@ -89,7 +89,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids \
```


## Unclaim a traffic filter link id [ec-unclaim-a-traffic-filter-link-id]
## Claim a VCPE ID or Azure resource [ec-unclaim-a-traffic-filter-link-id]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
## Claim a VCPE ID or Azure resource [ec-unclaim-a-traffic-filter-link-id]
## Unclaim a VCP ID or Azure resource [ec-unclaim-a-traffic-filter-link-id]


To create a rule set:
### Step 1: Create an IP filter policy
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### Step 1: Create an IP filter policy
### Step 1: Create an IP filter


1. Navigate to the traffic filters list:
You can combine multiple IP address and CIDR block traffic sources into a single IP filter policy, so we recommend that you group sources according to what they allow, and make sure to label them accordingly. Because multiple sets can be applied to a deployment, you can be as granular in your policies as you feel is necessary.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
You can combine multiple IP address and CIDR block traffic sources into a single IP filter policy, so we recommend that you group sources according to what they allow, and make sure to label them accordingly. Because multiple sets can be applied to a deployment, you can be as granular in your policies as you feel is necessary.
You can combine multiple IP addresses and CIDR block traffic sources into a single IP filter, so we recommend that you group sources according to what they allow, and make sure to label them accordingly. Because multiple IP filters can be applied to a deployment, you can be as granular in your policies as you deem necessary.

@@ -8,26 +8,26 @@ products:
- id: cloud-hosted
---

# Claim traffic filter link ID ownership through the API [ec-claim-traffic-filter-link-id-through-the-api]
# Claim VCPE ID or Azure resource ownership [ec-claim-traffic-filter-link-id-through-the-api]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
# Claim VCPE ID or Azure resource ownership [ec-claim-traffic-filter-link-id-through-the-api]
# Claim VCP ID or Azure resource ownership [ec-claim-traffic-filter-link-id-through-the-api]


Network security policies are created at the organization level, and then are associated with one or more resources, such as a deployment or project, to take effect. After you associate at least one policy with a resource, traffic that does not match the policy or any other policy associated with the resource is denied.

Policies apply to external traffic only. Internal traffic is managed by the deployment or project. For example, in {{ech}}, {{kib}} can connect to {{es}}, as well as internal services which manage the deployment, Other deployments can’t connect to deployments protected by network security policies.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Policies apply to external traffic only. Internal traffic is managed by the deployment or project. For example, in {{ech}}, {{kib}} can connect to {{es}}, as well as internal services which manage the deployment, Other deployments can’t connect to deployments protected by network security policies.
Policies apply to external traffic only. Internal traffic is managed by the deployment or project. For example, in {{ech}}, {{kib}} can connect to {{es}}, as well as internal services which manage the deployment. Other deployments can’t connect to deployments protected by network security policies.


In {{ech}}, you can allow traffic between {{es}} and other resources hosted by the same cloud provider using private link services.
Private connectivity is a secure way for your {{ecloud}} deployments and projects to communicate with other cloud provider services over your cloud provider's private network. You can create a virtual private connection endpoint (VCPE) using your provider's private link service. You can also optionally filter traffic to your deployments and projects by creating ingress filters for your VCPE in {{ecloud}}.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Private connectivity is a secure way for your {{ecloud}} deployments and projects to communicate with other cloud provider services over your cloud provider's private network. You can create a virtual private connection endpoint (VCPE) using your provider's private link service. You can also optionally filter traffic to your deployments and projects by creating ingress filters for your VCPE in {{ecloud}}.
Private connectivity is a secure way for your {{ecloud}} deployments and projects to communicate with other cloud provider services over your cloud provider's private network. You can create a virtual private connection (VPC) using your provider's private link service. You can also optionally filter traffic to your deployments and projects by creating ingress filters for your VPC in {{ecloud}}.

@@ -16,8 +18,14 @@ Choose the relevant option for your cloud service provider:
| Azure | [Azure Private Link](/deploy-manage/security/azure-private-link-traffic-filters.md) |
| GCP | [GCP Private Service Connect](/deploy-manage/security/gcp-private-service-connect-traffic-filters.md) |

After you set up your private link, you can [claim ownership of your filter link ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md) to prevent other organizations from using it in a traffic filter ruleset.
After you set up your private connection, you can [claim ownership of your VCPE ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md) to prevent other organizations from using it.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
After you set up your private connection, you can [claim ownership of your VCPE ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md) to prevent other organizations from using it.
After you set up your private connection, you can [claim ownership of your VCP ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md) to prevent other organizations from using it.

:::

:::{note}
Private connection policies were formerly referred to as PrivateLink filters.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Private connection policies were formerly referred to as PrivateLink filters.
Private connection policies were formerly referred to as PrivateLink traffic filters.


Ensuring that your VPC is in all supported {{ecloud}} availability zones for a particular region avoids potential for a traffic imbalance. That imbalance may saturate some coordinating nodes and underutilize others in the deployment, eventually impacting performance. Enabling all supported {{ecloud}} zones ensures that traffic is balanced optimally.
* Record that you've established private connectivity between AWS and Elastic in the applicable region.
* Filter traffic to your deployment using VCPE filters.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Filter traffic to your deployment using VCPE filters.
* Filter traffic to your deployment using VPC filters.


Follow these high-level steps to add private link rules to your deployments.
* Record that you've established private connectivity between AWS and Elastic in the applicable region.
* Filter traffic to your deployment using VCPE filters.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Filter traffic to your deployment using VCPE filters.
* Filter traffic to your deployment using VPC filters.

### Find your VPC endpoint ID [ec-find-your-endpoint]
### Optional: Find your VPC endpoint ID [ec-find-your-endpoint]

The VPC endpoint ID is only required if you want to filter traffic to your deployment using VCPE filters.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The VPC endpoint ID is only required if you want to filter traffic to your deployment using VCPE filters.
The VPC endpoint ID is only required if you want to filter traffic to your deployment using VPC filters.


### Associate a PrivateLink rule set with your deployment [ec-associate-traffic-filter-private-link-rule-set]
If the policy doesn't contain a VCPE filter, then the association can serve as a reminder that a VCP endpoint exists for the deployment's region.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
If the policy doesn't contain a VCPE filter, then the association can serve as a reminder that a VCP endpoint exists for the deployment's region.
If the policy doesn't contain a VCPE filter, then the association can serve as a reminder that a VPC endpoint exists for the deployment's region.


For traffic to connect with the deployment over a PrivateLink, the client making the request needs to be located within the VPC where you’ve created the VPC endpoint. You can also setup network traffic to flow through the originating VPC from somewhere else, such as another VPC or VPN from your corporate network. This assumes that the VPC endpoint and the DNS record are also available within that context. Check your service provider documentation for setup instructions.
For traffic to connect with the deployment over a PrivateLink, the client making the request needs to be located within the VPC where you’ve created the VPC endpoint. You can also set up network traffic to flow through the originating VPC from somewhere else, such as another VPC or VPN from your corporate network. This assumes that the VPC endpoint and the DNS record are also available within that context. Check your service provider documentation for setup instructions.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
For traffic to connect with the deployment over a PrivateLink, the client making the request needs to be located within the VPC where you’ve created the VPC endpoint. You can also set up network traffic to flow through the originating VPC from somewhere else, such as another VPC or VPN from your corporate network. This assumes that the VPC endpoint and the DNS record are also available within that context. Check your service provider documentation for setup instructions.
For traffic to connect with the deployment over a private connection, the client making the request needs to be located within the VPC where you’ve created the VPC endpoint. You can also set up network traffic to flow through the originating VPC from somewhere else, such as another VPC or VPN from your corporate network. This assumes that the VPC endpoint and the DNS record are also available within that context. Check your service provider documentation for setup instructions.


## Considerations

Azure Private Link filtering is supported only for Azure regions.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Azure Private Link filtering is supported only for Azure regions.
Private connectivity with Azure Private Link is only supported in Azure regions.


AWS PrivateLink filtering is supported only for AWS regions. Elastic does not yet support cross-region AWS PrivateLink connections. Your PrivateLink endpoint needs to be in the same region as your target deployments. Additional details can be found in the [AWS VPCE Documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-limitations).
Private connections over AWS PrivateLink are only supported only for AWS regions. Elastic does not yet support cross-region AWS PrivateLink connections. Your PrivateLink endpoint needs to be in the same region as your target deployments. Additional details can be found in the [AWS VPCE Documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-limitations).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Private connections over AWS PrivateLink are only supported only for AWS regions. Elastic does not yet support cross-region AWS PrivateLink connections. Your PrivateLink endpoint needs to be in the same region as your target deployments. Additional details can be found in the [AWS VPCE Documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-limitations).
Private connectivity with AWS PrivateLink is only supported in AWS regions. Elastic does not yet support cross-region AWS PrivateLink connections. Your PrivateLink endpoint needs to be in the same region as your target deployments. Additional details can be found in the [AWS VPCE Documentation](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#vpce-interface-limitations).


When you have your private endpoint name and ID, you can create a Private Link traffic filter rule set.
When you have your private endpoint ID, you can create a private connection policy.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
When you have your private endpoint ID, you can create a private connection policy.
When you have your private endpoint name and ID, you can create a private connection policy.


* Private Service Connect filtering is supported only for Google Cloud regions.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Private Service Connect filtering is supported only for Google Cloud regions.
* Private connectivity with Private Service Connect is only supported in Google Cloud regions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Website]: IP traffic filtering doc including examples for Virtual private links
2 participants