You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/deploy/elastic-cloud/azure-native-isv-service.md
+6-11Lines changed: 6 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -349,7 +349,7 @@ $$$azure-integration-monitor$$$How do I monitor my existing Azure services?
349
349
350
350
351
351
::::{note}
352
-
If you want to send platform logs to a deployment that has [IP or Private Link traffic filters](../../security/traffic-filtering.md)enabled, then you need to contact [the Elastic Support Team](#azure-integration-support) to perform additional configurations. Refer support to the article [Azure++ Resource Logs blocked by Traffic Filters](https://support.elastic.co/knowledge/18603788).
352
+
If you want to send platform logs to a deployment that has [network security policies](../../security/traffic-filtering.md)applied, then you need to contact [the Elastic Support Team](#azure-integration-support) to perform additional configurations. Refer support to the article [Azure++ Resource Logs blocked by Traffic Filters](https://support.elastic.co/knowledge/18603788).
One possible cause of a deployment creation failure is the default traffic filtering rules. Deployments fail to create if a previously created traffic filter has enabled the **Include by default** option. When this option is enabled, traffic to the deployment is blocked, including traffic that is part of the {{ecloud}} Azure Native ISV Service. As a result, some of the integration components are not successfully provisioned and the deployment creation fails.
480
+
One possible cause of a deployment creation failure is the default network security policies. Deployments fail to create if a previously created network security policy has enabled the **Include by default** option. When this option is enabled, traffic to the deployment is blocked, including traffic that is part of the {{ecloud}} Azure Native ISV Service. As a result, some of the integration components are not successfully provisioned and the deployment creation fails.
481
481
482
482
Follow these steps to resolve the problem:
483
483
484
484
1. Login to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
485
-
2. Go to the [Traffic filters page](https://cloud.elastic.co/deployment-features/traffic-filters).
486
-
3. Edit the traffic filter and disable the **Include by default** option.
:alt: The Include by default option under Add to Deployments on the Traffic Filter page
490
-
:::
491
-
485
+
2. Go to the [Network security page](https://cloud.elastic.co/deployment-features/traffic-filters).
486
+
3. Edit the policy and disable the **Include by default** option.
492
487
4. In Azure, create a new {{ecloud}} deployment.
493
-
5. After the deployment has been created successfully, go back to the [Traffic filters page](https://cloud.elastic.co/deployment-features/traffic-filters) in {{ecloud}} and re-enable the **Include by default** option.
488
+
5. After the deployment has been created successfully, go back to the [Network security page](https://cloud.elastic.co/deployment-features/traffic-filters) in {{ecloud}} and re-enable the **Include by default** option.
494
489
495
490
496
491
If your deployment still does not create successfully, [contact the Elastic Support Team](#azure-integration-support) for assistance.
@@ -511,7 +506,7 @@ Mimicking this metadata by manually adding tags to an {{ecloud}} deployment will
511
506
512
507
$$$azure-integration-logs-not-ingested$$$My {{ecloud}} Azure Native ISV Service logs are not being ingested.
513
508
: * When you set up monitoring for your Azure services, if your Azure and Elastic resources are in different subscriptions, you need to make sure that the `Microsoft.Elastic` resource provider is registered in the subscription in which the Azure resources exist. Check [How do I monitor my existing Azure services?](#azure-integration-monitor) for details.
514
-
* If you are using [IP or Private Link traffic filters](../../security/traffic-filtering.md), reach out to [the Elastic Support Team](#azure-integration-support).
509
+
* If you are using [network security policies](../../security/traffic-filtering.md), reach out to [the Elastic Support Team](#azure-integration-support).
|**Network security**| Public IP traffic filtering, private connectivity (VPCs, PrivateLink) |**Planned**| - Traffic filtering anticipated in a future release <br>- Private connectivity options anticipated in a future release |
70
+
|**Network security**| Public IP filtering, private connectivity (VPCs, PrivateLink) |Public IP filtering | Private connectivity options anticipated in a future release |
71
71
|**Node management**| User-controlled | Managed | No node configuration access by design |
72
72
|**Snapshot/restore**| ✅ |**Planned**| User-initiated snapshots are anticipated in a future release |
Copy file name to clipboardExpand all lines: deploy-manage/deploy/elastic-cloud/ec-customize-deployment-components.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,7 +129,7 @@ Refer to [Manage your Integrations Server](manage-integrations-server.md) to lea
129
129
130
130
## Security [ec_security]
131
131
132
-
Here, you can configure features that keep your deployment secure: reset the password for the `elastic` user, set up traffic filters, and add settings to the {{es}} keystore. You can also set up remote connections to other deployments.
132
+
Here, you can configure features that keep your deployment secure: reset the password for the `elastic` user, set up network security policies, and add settings to the {{es}} keystore. You can also set up remote connections to other deployments.
Copy file name to clipboardExpand all lines: deploy-manage/deploy/elastic-cloud/heroku.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ You might want to add more layers of security to your deployment, such as:
82
82
83
83
* Add more users to the deployment with third-party authentication providers and services like [SAML](../../users-roles/cluster-or-deployment-auth/saml.md), [OpenID Connect](../../users-roles/cluster-or-deployment-auth/openid-connect.md), or [Kerberos](../../users-roles/cluster-or-deployment-auth/kerberos.md).
84
84
* Do not use clients that only support HTTP to connect to {{ecloud}}. If you need to do so, you should use a reverse proxy setup.
85
-
* Create [traffic filters](../../security/traffic-filtering.md) and apply them to your deployments.
85
+
* Create [network security policies](../../security/traffic-filtering.md) and apply them to your deployments.
86
86
* If needed, you can [reset](../../users-roles/cluster-or-deployment-auth/built-in-users.md) the `elastic` password.
87
87
88
88
### Scale or adjust your deployment [echscale_or_adjust_your_deployment]
Copy file name to clipboardExpand all lines: deploy-manage/deploy/elastic-cloud/restrictions-known-problems.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,8 +20,8 @@ When using {{ecloud}}, there are some limitations you should be aware of:
20
20
*[Private Link and SSO to {{kib}} URLs](#ec-restrictions-traffic-filters-kibana-sso)
21
21
*[PDF report generation using Alerts or Watcher webhooks](#ec-restrictions-traffic-filters-watcher)
22
22
*[Kibana](#ec-restrictions-kibana)
23
-
% * [APM Agent central configuration with Private Link or traffic filters](#ec-restrictions-apm-traffic-filters)
24
-
*[Fleet with Private Link or traffic filters](#ec-restrictions-fleet-traffic-filters)
23
+
% * [APM Agent central configuration with network security policies](#ec-restrictions-apm-traffic-filters)
24
+
*[Fleet with network security policies](#ec-restrictions-fleet-traffic-filters)
25
25
*[Restoring a snapshot across deployments](#ec-snapshot-restore-enterprise-search-kibana-across-deployments)
26
26
*[Migrate Fleet-managed {{agents}} across deployments by restoring a snapshot](#ec-migrate-elastic-agent)
27
27
*[Regions and Availability Zones](#ec-regions-and-availability-zone)
@@ -88,13 +88,13 @@ Alternatively, a custom mail server can be configured as described in [Configuri
88
88
89
89
## Private Link and SSO to {{kib}} URLs [ec-restrictions-traffic-filters-kibana-sso]
90
90
91
-
Currently you can’t use SSO to login directly from {{ecloud}} into {{kib}} endpoints that are protected by Private Link traffic filters. However, you can still SSO into Private Link protected {{kib}} endpoints individually using the [SAML](../../users-roles/cluster-or-deployment-auth/saml.md) or [OIDC](../../users-roles/cluster-or-deployment-auth/openid-connect.md) protocol from your own identity provider, just not through the {{ecloud}} console. Stack level authentication using the {{es}} username and password should also work with `{{kibana-id}}.{vpce|privatelink|psc}.domain` URLs.
91
+
Currently you can’t use SSO to login directly from {{ecloud}} into {{kib}} endpoints that are protected by Private Link network security policies. However, you can still SSO into Private Link protected {{kib}} endpoints individually using the [SAML](../../users-roles/cluster-or-deployment-auth/saml.md) or [OIDC](../../users-roles/cluster-or-deployment-auth/openid-connect.md) protocol from your own identity provider, just not through the {{ecloud}} console. Stack level authentication using the {{es}} username and password should also work with `{{kibana-id}}.{vpce|privatelink|psc}.domain` URLs.
92
92
93
93
94
94
## PDF report generation using Alerts or Watcher webhooks [ec-restrictions-traffic-filters-watcher]
95
95
96
96
* PDF report automatic generation via Alerts is not possible on {{ecloud}}.
97
-
* PDF report generation isn’t possible for deployments running on {{stack}} version 8.7.0 or before that are protected by traffic filters. This limitation doesn’t apply to public webhooks such as Slack, PagerDuty, and email. For deployments running on {{stack}} version 8.7.1 and beyond, [PDF report automatic generation via Watcher webhook](../../../explore-analyze/report-and-share/automating-report-generation.md#use-watcher) is possible using the `xpack.notification.webhook.additional_token_enabled` configuration setting to bypass traffic filters.
97
+
* PDF report generation isn’t possible for deployments running on {{stack}} version 8.7.0 or before that are protected by IP filters. This limitation doesn’t apply to public webhooks such as Slack, PagerDuty, and email. For deployments running on {{stack}} version 8.7.1 and beyond, [PDF report automatic generation via Watcher webhook](../../../explore-analyze/report-and-share/automating-report-generation.md#use-watcher) is possible using the `xpack.notification.webhook.additional_token_enabled` configuration setting to bypass IP filters.
98
98
99
99
100
100
## {{kib}} [ec-restrictions-kibana]
@@ -103,18 +103,18 @@ Currently you can’t use SSO to login directly from {{ecloud}} into {{kib}} end
103
103
* Running an external {{kib}} in parallel to {{ecloud}}’s {{kib}} instances may cause errors, for example [`Unable to decrypt attribute`](../../../explore-analyze/alerts-cases/alerts/alerting-common-issues.md#rule-cannot-decrypt-api-key), due to a mismatched [`xpack.encryptedSavedObjects.encryptionKey`](kibana://reference/configuration-reference/security-settings.md#security-encrypted-saved-objects-settings) as {{ecloud}} does not [allow users to set](edit-stack-settings.md) nor expose this value. While workarounds are possible, this is not officially supported nor generally recommended.
104
104
105
105
106
-
% ## APM Agent central configuration with PrivateLink or traffic filters[ec-restrictions-apm-traffic-filters]
106
+
% ## APM Agent central configuration with network security policies[ec-restrictions-apm-traffic-filters]
107
107
108
108
% If you are using APM 7.9.0 or older:
109
109
110
-
% * You cannot use [APM Agent central configuration](/solutions/observability/apm/apm-agent-central-configuration.md) if your deployment is secured by [traffic filters](../../security/traffic-filtering.md).
110
+
% * You cannot use [APM Agent central configuration](/solutions/observability/apm/apm-agent-central-configuration.md) if your deployment is secured by [network security policies](../../security/traffic-filtering.md).
111
111
% * If you access your APM deployment over [PrivateLink](../../security/aws-privatelink-traffic-filters.md), to use APM Agent central configuration you need to allow access to the APM deployment over public internet.
112
112
113
113
114
-
## Fleet with PrivateLink or traffic filters[ec-restrictions-fleet-traffic-filters]
114
+
## Fleet with network security policies[ec-restrictions-fleet-traffic-filters]
115
115
116
-
% * You cannot use Fleet 7.13.x if your deployment is secured by [traffic filters](../../security/traffic-filtering.md). Fleet 7.14.0 and later works with traffic filters (both Private Link and IP filters).
117
-
* If you are using Fleet 8.12+, using a remote {{es}} output with a target cluster that has [traffic filters](../../security/traffic-filtering.md)enabled is not currently supported.
116
+
% * You cannot use Fleet 7.13.x if your deployment is secured by [network security policies](../../security/traffic-filtering.md). Fleet 7.14.0 and later works with network security policies (both IP filters and private connection policies).
117
+
* If you are using Fleet 8.12+, using a remote {{es}} output with a target cluster that has [network security policies](../../security/traffic-filtering.md)applied is not currently supported.
118
118
119
119
## Restoring a snapshot across deployments [ec-snapshot-restore-enterprise-search-kibana-across-deployments]
Copy file name to clipboardExpand all lines: deploy-manage/deploy/elastic-cloud/tools-apis.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ The following REST APIs allow you to manage your {{ecloud}} organization, users,
30
30
31
31
| Area | API | Tasks |
32
32
| --- | --- | --- |
33
-
| {{ecloud}} organization<br><br>{{ech}} deployments |[{{ecloud}} API](https://www.elastic.co/docs/api/doc/cloud/)| Manage your Cloud organization, members, costs, billing, and more.<br><br>Manage your hosted deployments and all of the resources associated with them, including scaling or autoscaling resources, and managing traffic filters, deployment extensions, remote clusters, and {{stack}} versions.<br><br>Refer to [{{ecloud}} RESTful API](cloud://reference/cloud-hosted/ec-api-restful.md) for usage information and examples. |
33
+
| {{ecloud}} organization<br><br>{{ech}} deployments |[{{ecloud}} API](https://www.elastic.co/docs/api/doc/cloud/)| Manage your Cloud organization, members, costs, billing, and more.<br><br>Manage your hosted deployments and all of the resources associated with them, including scaling or autoscaling resources, and managing network security policies, deployment extensions, remote clusters, and {{stack}} versions.<br><br>Refer to [{{ecloud}} RESTful API](cloud://reference/cloud-hosted/ec-api-restful.md) for usage information and examples. |
Copy file name to clipboardExpand all lines: deploy-manage/remote-clusters/ec-enable-ccs.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,21 +52,21 @@ The steps, information, and authentication method required to configure CCS and
52
52
*[From an ECK environment](ec-enable-ccs-for-eck.md)
53
53
54
54
55
-
## Remote clusters and traffic filtering[ec-ccs-ccr-traffic-filtering]
55
+
## Remote clusters and network security[ec-ccs-ccr-traffic-filtering]
56
56
57
57
::::{note}
58
-
Traffic filtering isn’t supported for cross-cluster operations initiated from an {{ece}} environment to a remote {{ech}} deployment.
58
+
[Network security](../security/traffic-filtering.md) isn’t supported for cross-cluster operations initiated from an {{ece}} environment to a remote {{ech}} deployment.
59
59
::::
60
60
61
-
API key authentication for remote clusters cannot be used in combination with traffic filtering.
61
+
API key authentication for remote clusters cannot be used in combination with network security.
62
62
63
-
For remote clusters configured using TLS certificate authentication, [traffic filtering](../security/traffic-filtering.md) can be enabled to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
63
+
For remote clusters configured using TLS certificate authentication, [network security](../security/traffic-filtering.md) can be enabled to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
64
64
65
-
Traffic filtering for remote clusters supports 2 methods:
65
+
Network security for remote clusters supports 2 methods:
66
66
67
67
*[Filtering by IP addresses and Classless Inter-Domain Routing (CIDR) masks](../security/ip-traffic-filtering.md)
68
-
* Filtering by Organization or {{es}} cluster ID with a Remote cluster type filter. You can configure this type of filter from the **Features** > **Traffic filters** page of your organization or using the [{{ecloud}} RESTful API](https://www.elastic.co/docs/api/doc/cloud) and apply it from each deployment’s **Security** page.
68
+
* Filtering by Organization or {{es}} cluster ID with a Remote cluster private connection policy. You can configure this type of policy from the **Access and security** > **Network security** page of your organization or using the [{{ecloud}} RESTful API](https://www.elastic.co/docs/api/doc/cloud) and apply it from each deployment’s **Security** page.
69
69
70
70
::::{note}
71
-
When setting up traffic filters for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection.
71
+
When setting up network security for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection.
Copy file name to clipboardExpand all lines: deploy-manage/security/private-link-traffic-filters.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,3 +28,7 @@ To learn how private connection policies work, how they affect your deployment,
28
28
:::{tip}
29
29
{{ech}} and {{serverless-full}} also support [IP filters](/deploy-manage/security/ip-filtering-cloud.md). You can apply both IP filters and private connections to a single {{ecloud}} resource.
30
30
:::
31
+
32
+
:::{note}
33
+
Private connections were formerly referred to as PrivateLink filters.
0 commit comments