|
1 | | -# Manage traffic filtering through the API [ec-traffic-filtering-through-the-api] |
| 1 | +--- |
| 2 | +applies_to: |
| 3 | + deployment: |
| 4 | + ess: ga |
| 5 | +mapped_urls: |
| 6 | + - https://www.elastic.co/guide/en/cloud/current/ec-traffic-filtering-through-the-api.html |
| 7 | +--- |
| 8 | + |
| 9 | +# Manage traffic filtering through the {{ecloud}} API [ec-traffic-filtering-through-the-api] |
2 | 10 |
|
3 | 11 | This example demonstrates how to use the {{ecloud}} RESTful API to manage different types of traffic filters. We cover the following examples: |
4 | 12 |
|
5 | | -* [Create a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-create-a-traffic-filter-rule-set) |
| 13 | +* [Create a traffic filter rule set](ec-traffic-filtering-through-the-api.md#ec-create-a-traffic-filter-rule-set) |
6 | 14 |
|
7 | | - * [IP traffic filter ingress rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-ip-traffic-filters-ingress-rule-set) |
8 | | - * [IP traffic filter egress rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-ip-traffic-filters-egress-rule-set) |
9 | | - * [AWS Privatelink traffic filters](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-aws-privatelink-traffic-filters-rule-set) |
10 | | - * [Azure Private Link traffic filters](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-azure-privatelink-traffic-filters-rule-set) |
11 | | - * [GCP Private Service Connect traffic filters](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-gcp-private-service-connect-traffic-filters-rule-set) |
| 15 | + * [IP traffic filter ingress rule set](ec-traffic-filtering-through-the-api.md#ec-ip-traffic-filters-ingress-rule-set) |
| 16 | + * [IP traffic filter egress rule set](ec-traffic-filtering-through-the-api.md#ec-ip-traffic-filters-egress-rule-set) |
| 17 | + * [AWS Privatelink traffic filters](ec-traffic-filtering-through-the-api.md#ec-aws-privatelink-traffic-filters-rule-set) |
| 18 | + * [Azure Private Link traffic filters](ec-traffic-filtering-through-the-api.md#ec-azure-privatelink-traffic-filters-rule-set) |
| 19 | + * [GCP Private Service Connect traffic filters](ec-traffic-filtering-through-the-api.md#ec-gcp-private-service-connect-traffic-filters-rule-set) |
12 | 20 |
|
13 | | -* [Update a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-update-a-traffic-filter-rule-set) |
14 | | -* [Associate a rule set with a deployment](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-associate-rule-set-with-a-deployment) |
15 | | -* [Delete a rule set association with a deployment](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-delete-rule-set-association-with-a-deployment) |
16 | | -* [Delete a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-delete-a-rule-set) |
| 21 | +* [Update a traffic filter rule set](ec-traffic-filtering-through-the-api.md#ec-update-a-traffic-filter-rule-set) |
| 22 | +* [Associate a rule set with a deployment](ec-traffic-filtering-through-the-api.md#ec-associate-rule-set-with-a-deployment) |
| 23 | +* [Delete a rule set association with a deployment](ec-traffic-filtering-through-the-api.md#ec-delete-rule-set-association-with-a-deployment) |
| 24 | +* [Delete a traffic filter rule set](ec-traffic-filtering-through-the-api.md#ec-delete-a-rule-set) |
17 | 25 |
|
18 | | -Read through the main [Traffic Filtering](../../../deploy-manage/security/traffic-filtering.md) page to learn about the general concepts behind filtering access to your {{ech}} deployments. |
| 26 | +Read through the main [Traffic Filtering](traffic-filtering.md) page to learn about the general concepts behind filtering access to your {{ech}} deployments. |
19 | 27 |
|
20 | 28 |
|
21 | 29 | ## Create a traffic filter rule set [ec-create-a-traffic-filter-rule-set] |
@@ -133,7 +141,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/rulesets \ |
133 | 141 | ' |
134 | 142 | ``` |
135 | 143 |
|
136 | | -To find the value for `source` for type `vpce`, check [Find your VPC endpoint ID](../../../deploy-manage/security/aws-privatelink-traffic-filters.md#ec-find-your-endpoint). This setting is supported only in AWS regions. |
| 144 | +To find the value for `source` for type `vpce`, check [Find your VPC endpoint ID](aws-privatelink-traffic-filters.md#ec-find-your-endpoint). This setting is supported only in AWS regions. |
137 | 145 |
|
138 | 146 |
|
139 | 147 | ### Azure Private Link traffic filters [ec-azure-privatelink-traffic-filters-rule-set] |
@@ -162,7 +170,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/rulesets \ |
162 | 170 | ' |
163 | 171 | ``` |
164 | 172 |
|
165 | | -To find the value for `azure_endpoint_name` and `azure_endpoint_guid` for type `azure_private_endpoint`, check [Find your private endpoint resource name](../../../deploy-manage/security/azure-private-link-traffic-filters.md#ec-find-your-resource-name) and [Find your private endpoint resource ID](../../../deploy-manage/security/azure-private-link-traffic-filters.md#ec-find-your-resource-id). This setting is supported only in Azure regions. |
| 173 | +To find the value for `azure_endpoint_name` and `azure_endpoint_guid` for type `azure_private_endpoint`, check [Find your private endpoint resource name](azure-private-link-traffic-filters.md#ec-find-your-resource-name) and [Find your private endpoint resource ID](azure-private-link-traffic-filters.md#ec-find-your-resource-id). This setting is supported only in Azure regions. |
166 | 174 |
|
167 | 175 |
|
168 | 176 | ### GCP Private Service Connect traffic filters [ec-gcp-private-service-connect-traffic-filters-rule-set] |
@@ -190,7 +198,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/rulesets \ |
190 | 198 | ' |
191 | 199 | ``` |
192 | 200 |
|
193 | | -To find the value for `source` for type `gcp_private_service_connect_endpoint`, check [Find your Private Service Connect connection ID](../../../deploy-manage/security/gcp-private-service-connect-traffic-filters.md#ec-find-your-psc-connection-id). This setting is supported only in GCP regions. |
| 201 | +To find the value for `source` for type `gcp_private_service_connect_endpoint`, check [Find your Private Service Connect connection ID](gcp-private-service-connect-traffic-filters.md#ec-find-your-psc-connection-id). This setting is supported only in GCP regions. |
194 | 202 |
|
195 | 203 |
|
196 | 204 | ## Update a traffic filter rule set [ec-update-a-traffic-filter-rule-set] |
|
0 commit comments