Skip to content

Commit 04c0cbd

Browse files
authored
Merge branch 'main' into leemthompo-patch-1
2 parents a5b4c90 + 1414409 commit 04c0cbd

27 files changed

+1291
-2445
lines changed

deploy-manage/security/aws-privatelink-traffic-filters.md

Lines changed: 277 additions & 11 deletions
Large diffs are not rendered by default.

deploy-manage/security/azure-private-link-traffic-filters.md

Lines changed: 286 additions & 11 deletions
Large diffs are not rendered by default.

deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
---
2+
applies_to:
3+
deployment:
4+
ess: ga
25
mapped_pages:
36
- https://www.elastic.co/guide/en/cloud/current/ec-claim-traffic-filter-link-id-through-the-api.html
47
---

raw-migrated-files/cloud/cloud/ec-traffic-filtering-through-the-api.md renamed to deploy-manage/security/ec-traffic-filtering-through-the-api.md

Lines changed: 23 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,29 @@
1-
# Manage traffic filtering through the API [ec-traffic-filtering-through-the-api]
1+
---
2+
applies_to:
3+
deployment:
4+
ess: ga
5+
mapped_urls:
6+
- https://www.elastic.co/guide/en/cloud/current/ec-traffic-filtering-through-the-api.html
7+
---
8+
9+
# Manage traffic filtering through the {{ecloud}} API [ec-traffic-filtering-through-the-api]
210

311
This example demonstrates how to use the {{ecloud}} RESTful API to manage different types of traffic filters. We cover the following examples:
412

5-
* [Create a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-create-a-traffic-filter-rule-set)
13+
* [Create a traffic filter rule set](ec-traffic-filtering-through-the-api.md#ec-create-a-traffic-filter-rule-set)
614

7-
* [IP traffic filter ingress rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-ip-traffic-filters-ingress-rule-set)
8-
* [IP traffic filter egress rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-ip-traffic-filters-egress-rule-set)
9-
* [AWS Privatelink traffic filters](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-aws-privatelink-traffic-filters-rule-set)
10-
* [Azure Private Link traffic filters](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-azure-privatelink-traffic-filters-rule-set)
11-
* [GCP Private Service Connect traffic filters](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-gcp-private-service-connect-traffic-filters-rule-set)
15+
* [IP traffic filter ingress rule set](ec-traffic-filtering-through-the-api.md#ec-ip-traffic-filters-ingress-rule-set)
16+
* [IP traffic filter egress rule set](ec-traffic-filtering-through-the-api.md#ec-ip-traffic-filters-egress-rule-set)
17+
* [AWS Privatelink traffic filters](ec-traffic-filtering-through-the-api.md#ec-aws-privatelink-traffic-filters-rule-set)
18+
* [Azure Private Link traffic filters](ec-traffic-filtering-through-the-api.md#ec-azure-privatelink-traffic-filters-rule-set)
19+
* [GCP Private Service Connect traffic filters](ec-traffic-filtering-through-the-api.md#ec-gcp-private-service-connect-traffic-filters-rule-set)
1220

13-
* [Update a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-update-a-traffic-filter-rule-set)
14-
* [Associate a rule set with a deployment](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-associate-rule-set-with-a-deployment)
15-
* [Delete a rule set association with a deployment](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-delete-rule-set-association-with-a-deployment)
16-
* [Delete a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ec-delete-a-rule-set)
21+
* [Update a traffic filter rule set](ec-traffic-filtering-through-the-api.md#ec-update-a-traffic-filter-rule-set)
22+
* [Associate a rule set with a deployment](ec-traffic-filtering-through-the-api.md#ec-associate-rule-set-with-a-deployment)
23+
* [Delete a rule set association with a deployment](ec-traffic-filtering-through-the-api.md#ec-delete-rule-set-association-with-a-deployment)
24+
* [Delete a traffic filter rule set](ec-traffic-filtering-through-the-api.md#ec-delete-a-rule-set)
1725

18-
Read through the main [Traffic Filtering](../../../deploy-manage/security/traffic-filtering.md) page to learn about the general concepts behind filtering access to your {{ech}} deployments.
26+
Read through the main [Traffic Filtering](traffic-filtering.md) page to learn about the general concepts behind filtering access to your {{ech}} deployments.
1927

2028

2129
## Create a traffic filter rule set [ec-create-a-traffic-filter-rule-set]
@@ -133,7 +141,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/rulesets \
133141
'
134142
```
135143

136-
To find the value for `source` for type `vpce`, check [Find your VPC endpoint ID](../../../deploy-manage/security/aws-privatelink-traffic-filters.md#ec-find-your-endpoint). This setting is supported only in AWS regions.
144+
To find the value for `source` for type `vpce`, check [Find your VPC endpoint ID](aws-privatelink-traffic-filters.md#ec-find-your-endpoint). This setting is supported only in AWS regions.
137145

138146

139147
### Azure Private Link traffic filters [ec-azure-privatelink-traffic-filters-rule-set]
@@ -162,7 +170,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/rulesets \
162170
'
163171
```
164172

165-
To find the value for `azure_endpoint_name` and `azure_endpoint_guid` for type `azure_private_endpoint`, check [Find your private endpoint resource name](../../../deploy-manage/security/azure-private-link-traffic-filters.md#ec-find-your-resource-name) and [Find your private endpoint resource ID](../../../deploy-manage/security/azure-private-link-traffic-filters.md#ec-find-your-resource-id). This setting is supported only in Azure regions.
173+
To find the value for `azure_endpoint_name` and `azure_endpoint_guid` for type `azure_private_endpoint`, check [Find your private endpoint resource name](azure-private-link-traffic-filters.md#ec-find-your-resource-name) and [Find your private endpoint resource ID](azure-private-link-traffic-filters.md#ec-find-your-resource-id). This setting is supported only in Azure regions.
166174

167175

168176
### GCP Private Service Connect traffic filters [ec-gcp-private-service-connect-traffic-filters-rule-set]
@@ -190,7 +198,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/rulesets \
190198
'
191199
```
192200

193-
To find the value for `source` for type `gcp_private_service_connect_endpoint`, check [Find your Private Service Connect connection ID](../../../deploy-manage/security/gcp-private-service-connect-traffic-filters.md#ec-find-your-psc-connection-id). This setting is supported only in GCP regions.
201+
To find the value for `source` for type `gcp_private_service_connect_endpoint`, check [Find your Private Service Connect connection ID](gcp-private-service-connect-traffic-filters.md#ec-find-your-psc-connection-id). This setting is supported only in GCP regions.
194202

195203

196204
## Update a traffic filter rule set [ec-update-a-traffic-filter-rule-set]
Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,25 @@
1-
# Manage traffic filtering through the API [ece-traffic-filtering-through-the-api]
1+
---
2+
applies_to:
3+
deployment:
4+
ece: ga
5+
mapped_urls:
6+
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-traffic-filtering-through-the-api.html
7+
---
8+
9+
# Manage traffic filtering through the ECE API [ece-traffic-filtering-through-the-api]
210

311
This example demonstrates how to use the Elastic Cloud Enterprise RESTful API to manage different types of traffic filters. We cover the following examples:
412

5-
* [Create a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ece-create-a-traffic-filter-rule-set)
13+
* [Create a traffic filter rule set](ece-traffic-filtering-through-the-api.md#ece-create-a-traffic-filter-rule-set)
614

7-
* [IP traffic filter ingress rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ece-ip-traffic-filters-ingress-rule-set)
15+
* [IP traffic filter ingress rule set](ece-traffic-filtering-through-the-api.md#ece-ip-traffic-filters-ingress-rule-set)
816

9-
* [Update a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ece-update-a-traffic-filter-rule-set)
10-
* [Associate a rule set with a deployment](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ece-associate-rule-set-with-a-deployment)
11-
* [Delete a rule set association with a deployment](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ece-delete-rule-set-association-with-a-deployment)
12-
* [Delete a traffic filter rule set](../../../deploy-manage/security/manage-traffic-filtering-through-api.md#ece-delete-a-rule-set)
17+
* [Update a traffic filter rule set](ece-traffic-filtering-through-the-api.md#ece-update-a-traffic-filter-rule-set)
18+
* [Associate a rule set with a deployment](ece-traffic-filtering-through-the-api.md#ece-associate-rule-set-with-a-deployment)
19+
* [Delete a rule set association with a deployment](ece-traffic-filtering-through-the-api.md#ece-delete-rule-set-association-with-a-deployment)
20+
* [Delete a traffic filter rule set](ece-traffic-filtering-through-the-api.md#ece-delete-a-rule-set)
1321

14-
Read through the main [Traffic Filtering](../../../deploy-manage/security/traffic-filtering.md) page to learn about the general concepts behind filtering access to your Elastic Cloud Enterprise deployments.
22+
Read through the main [Traffic Filtering](traffic-filtering.md) page to learn about the general concepts behind filtering access to your Elastic Cloud Enterprise deployments.
1523

1624

1725
## Create a traffic filter rule set [ece-create-a-traffic-filter-rule-set]

deploy-manage/security/elastic-cloud-static-ips.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
---
2+
applies_to:
3+
deployment:
4+
ess: ga
25
mapped_pages:
36
- https://www.elastic.co/guide/en/cloud/current/ec-static-ips.html
47
---
@@ -35,7 +38,7 @@ Not suitable usage of egress static IPs to introduce network controls:
3538

3639
## Supported Regions [ec-regions]
3740

38-
::::{dropdown} **AWS**
41+
::::{dropdown} AWS
3942
| | | |
4043
| --- | --- | --- |
4144
| **Region** | **Ingress Static IPs** | **Egress Static IPs** |
@@ -63,7 +66,7 @@ Not suitable usage of egress static IPs to introduce network controls:
6366
::::
6467

6568

66-
::::{dropdown} **Azure**
69+
::::{dropdown} Azure
6770
| | | |
6871
| --- | --- | --- |
6972
| **Region** | **Ingress Static IPs** | **Egress Static IPs** |
@@ -87,7 +90,7 @@ Not suitable usage of egress static IPs to introduce network controls:
8790
::::
8891

8992

90-
::::{dropdown} **GCP**
93+
::::{dropdown} GCP
9194
| | | |
9295
| --- | --- | --- |
9396
| **Region** | **Ingress Static IPs** | **Egress Static IPs** |

0 commit comments

Comments
 (0)