Skip to content

Commit 4734dbe

Browse files
committed
vcp -> vcpe
1 parent 1512943 commit 4734dbe

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,22 +12,22 @@ products:
1212

1313
This example demonstrates how to use the {{ecloud}} RESTful API to claim different types of private link ID (AWS PrivateLink, Azure Private Link, and GCP Private Service Connect). We cover the following examples:
1414

15-
* [Claim a VCP ID](#ec-claim-a-traffic-filter-link-id)
15+
* [Claim a VCPE ID](#ec-claim-a-traffic-filter-link-id)
1616

1717
* [AWS PrivateLink](#ec-claim-aws-privatelink)
1818
* [Azure Private Link](#ec-claim-azure-private-link)
1919
* [GCP Private Service Connect](#ec-claim-gcp-private-service-connect)
2020

21-
* [List claimed VCP IDs](#ec-list-claimed-traffic-filter-link-id)
22-
* [Unclaim a VCP ID](#ec-unclaim-a-traffic-filter-link-id)
21+
* [List claimed VCPE IDs](#ec-list-claimed-traffic-filter-link-id)
22+
* [Unclaim a VCPE ID](#ec-unclaim-a-traffic-filter-link-id)
2323

2424
* [AWS PrivateLink](#ec-unclaim-aws-privatelink)
2525
* [Azure Private Link](#ec-unclaim-azure-private-link)
2626
* [GCP Private Service Connect](#ec-unclaim-gcp-private-service-connect)
2727

2828

2929

30-
## Claim a VCP ID [ec-claim-a-traffic-filter-link-id]
30+
## Claim a VCPE ID [ec-claim-a-traffic-filter-link-id]
3131

3232

3333
### AWS PrivateLink [ec-claim-aws-privatelink]
@@ -79,7 +79,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_claim
7979
```
8080

8181

82-
## List claimed VCP IDs [ec-list-claimed-traffic-filter-link-id]
82+
## List claimed VCPE IDs [ec-list-claimed-traffic-filter-link-id]
8383

8484
```sh
8585
curl \
@@ -89,7 +89,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids \
8989
```
9090

9191

92-
## Unclaim a VCP ID [ec-unclaim-a-traffic-filter-link-id]
92+
## Unclaim a VCPE ID [ec-unclaim-a-traffic-filter-link-id]
9393

9494

9595
### AWS PrivateLink [ec-unclaim-aws-privatelink]

deploy-manage/security/ip-filtering-ece.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ products:
1313

1414
Filtering by IP address or CIDR block is one of the security layers available in {{ece}}. It allows you to limit how your deployments can be accessed.
1515

16-
You can only configure ingress or inbound IP filters**. These restrict access to your deployments from a set of IP addresses or CIDR blocks.
16+
You can only configure ingress or inbound IP filters. These restrict access to your deployments from a set of IP addresses or CIDR blocks.
1717

1818
Follow the step described here to set up ingress or inbound IP filters through the Cloud UI.
1919

0 commit comments

Comments
 (0)