Skip to content

Commit bb6a5ca

Browse files
committed
fixes
1 parent 4734dbe commit bb6a5ca

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

deploy-manage/security/aws-privatelink-traffic-filters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The process of setting up a private connection with AWS PrivateLink is split bet
9898
| --- | --- |
9999
| 1. [Create a VPC endpoint using {{ecloud}} service name.](#ec-aws-vpc-dns) | |
100100
| 2. [Create a DNS record pointing to the VPC endpoint.](#ec-aws-vpc-dns) | |
101-
| | 3. **Optional**: [Create a private connection policy.](ec-add-vpc-elastic)<br><br>A private connection policy is required to filter traffic using the VCP endpoint ID. |
101+
| | 3. **Optional**: [Create a private connection policy.](#ec-add-vpc-elastic)<br><br>A private connection policy is required to filter traffic using the VCP endpoint ID. |
102102
| | 4. **Optional**: [Associate the private connection policy with deployments](#ec-associate-traffic-filter-private-link-rule-set). |
103103
| | 5. [Interact with your deployments over PrivateLink](#ec-access-the-deployment-over-private-link). |
104104

deploy-manage/security/ec-traffic-filtering-through-the-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/rulesets \
236236
'
237237
```
238238

239-
To find the value for `azure_endpoint_name` and `azure_endpoint_guid` for type `azure_private_endpoint`, check [Find your private endpoint resource name](azure-private-link-traffic-filters.md#ec-find-your-resource-name) and [Find your private endpoint resource ID](azure-private-link-traffic-filters.md#ec-find-your-resource-id). This setting is supported only in Azure regions.
239+
To find the value for `azure_endpoint_name` and `azure_endpoint_guid` for type `azure_private_endpoint`, check [Find your private endpoint resource name]() and [Find your private endpoint resource ID](azure-private-link-traffic-filters.md#ec-find-your-resource-id). This setting is supported only in Azure regions.
240240

241241

242242
### GCP Private Service Connect traffic filters [ec-gcp-private-service-connect-traffic-filters-rule-set]

deploy-manage/security/ip-traffic-filtering.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ If you use {{ech}} or {{eck}}, then other [network security](/deploy-manage/secu
2424
In {{serverless-full}} and {{ech}}, network security policies are created at the organization level, and then applied at the deployment level. Follow these guides to learn how to create, apply, and manage these policies using your preferred method:
2525

2626
* [In the {{ecloud}} console](/deploy-manage/security/ip-filtering-cloud.md)
27-
* [Using the {{ecloud}} API](/deploy-manage/security/ec-traffic-filtering-through-the-api)
27+
* [Using the {{ecloud}} API](/deploy-manage/security/ec-traffic-filtering-through-the-api.md)
2828

2929
To learn how multiple IP filter policies are processed, and how IP filters and [private connections](/deploy-manage/security/private-link-traffic-filters.md) work together in ECH, refer to [](/deploy-manage/security/network-security-policies.md).
3030

@@ -33,9 +33,9 @@ To learn how multiple IP filter policies are processed, and how IP filters and [
3333
In {{ece}}, filter rules are created at the platform level, and then applied at the deployment level. Follow these guides to learn how to create, apply, and manage these policies using your preferred method:
3434

3535
* [In the Cloud UI](/deploy-manage/security/ip-filtering-ece.md)
36-
* [Using the {{ecloud}} API](/deploy-manage/security/ec-traffic-filtering-through-the-api)
36+
* [Using the {{ecloud}} API](/deploy-manage/security/ec-traffic-filtering-through-the-api.md)
3737

38-
To learn how multiple rules are processed, refer to [Traffic filter rules](/deploy-manage/security/traffic-filter-rules.md).
38+
To learn how multiple rules are processed, refer to [](/deploy-manage/security/ece-filter-rules.md).
3939

4040
## ECK and self managed
4141

0 commit comments

Comments
 (0)