Skip to content

Commit ca784e5

Browse files
committed
fix
1 parent a9f3446 commit ca784e5

11 files changed

+24
-28
lines changed

deploy-manage/_snippets/ecloud-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
In both {{ech}} amd {{serverless-full}}, you can also configure [IP filtering network security policies](/deploy-manage/security/ip-filtering-cloud.md) to prevent unauthorized access to your deployments and projects.
44

55
In {{ech}}, you can augment these security features in the following ways:
6-
* [Configure private connections and apply VCPE filtering](/deploy-manage/security/traffic-filtering.md) to establish a secure connection for your {{ecloud}} deployments to communicate with other cloud services, and restrict traffic to deployments based on those private connections.
6+
* [Configure private connectivity and apply VCPE filtering](/deploy-manage/security/traffic-filtering.md) to establish a secure connection for your {{ecloud}} deployments to communicate with other cloud services, and restrict traffic to deployments based on those private connections.
77
* Encrypt your deployment with a [customer-managed encryption key](/deploy-manage/security/encrypt-deployment-with-customer-managed-encryption-key.md).
88
* [Secure your settings](/deploy-manage/security/secure-settings.md) using {{es}} and {{kib}} keystores.
99
* Use the list of [{{ecloud}} static IPs](/deploy-manage/security/elastic-cloud-static-ips.md) to allow or restrict communications in your infrastructure.

deploy-manage/security/_snippets/cluster-communication-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,5 +3,5 @@
33
* **The transport layer**: Used mainly for inter-node communications, and in certain cases for cluster to cluster communication.
44
* In self-managed {{es}} clusters, you can also [Configure {{kib}} and {{es}} to use mutual TLS](/deploy-manage/security/kibana-es-mutual-tls.md).
55
* [Enable cipher suites for stronger encryption](/deploy-manage/security/enabling-cipher-suites-for-stronger-encryption.md): The TLS and SSL protocols use a cipher suite that determines the strength of encryption used to protect the data. You may want to enable the use of additional cipher suites, so you can use different cipher suites for your TLS communications or communications with authentication providers.
6-
* [Secure your network using IP filtering and private connections](/deploy-manage/security/traffic-filtering.md): Network security allows you to limit how your deployments can be accessed. Add another layer of security to your installation and deployments by restricting inbound traffic to only the sources that you trust. Restrict access based on IP addresses or CIDR ranges, or, in {{ech}} deployments, secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
6+
* [Secure your network using IP filtering and private connectivity](/deploy-manage/security/traffic-filtering.md): Network security allows you to limit how your deployments can be accessed. Add another layer of security to your installation and deployments by restricting inbound traffic to only the sources that you trust. Restrict access based on IP addresses or CIDR ranges, or, in {{ech}} deployments, secure connectivity through AWS PrivateLink, Azure Private Link, or GCP Private Service Connect.
77
* [Allow or deny {{ech}} IP ranges](/deploy-manage/security/elastic-cloud-static-ips.md): {{ecloud}} publishes a list of IP addresses used by its {{ech}} services for both incoming and outgoing traffic. Users can use these lists to configure their network firewalls as needed to allow or restrict traffic related to {{ech}} services.

deploy-manage/security/_snippets/cluster-comparison.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Select your deployment type below to see what's available and how implementation
2020
| **Communication** | TLS (HTTP layer) | Fully managed | Automatically configured by Elastic |
2121
| | TLS (Transport layer) | Fully managed | Automatically configured by Elastic |
2222
| **Network** | IP filtering | Configurable | [Configure IP-based access restrictions](/deploy-manage/security/ip-filtering-cloud.md) |
23-
| | Private connections and VPC filtering | Configurable | [Establish a secure VPC connection](/deploy-manage/security/private-link-traffic-filters.md) |
23+
| | Private connectivity and VPC filtering | Configurable | [Establish a secure VPC connection](/deploy-manage/security/private-link-traffic-filters.md) |
2424
| | Kubernetes network policies | N/A | |
2525
| **Data** | Encryption at rest | Managed | You can [bring your own encryption key](/deploy-manage/security/encrypt-deployment-with-customer-managed-encryption-key.md) |
2626
| | Secure settings | Configurable | [Configure secure settings](/deploy-manage/security/secure-settings.md) |
@@ -37,7 +37,7 @@ Select your deployment type below to see what's available and how implementation
3737
| **Communication** | TLS (HTTP layer) | Fully managed | Automatically configured by Elastic |
3838
| | TLS (Transport layer) | Fully managed | Automatically configured by Elastic |
3939
| **Network** | IP filtering | Configurable | [Configure IP-based access restrictions](/deploy-manage/security/ip-filtering-cloud.md) |
40-
| | Private connections and VPC filtering | N/A | |
40+
| | Private connectivity and VPC filtering | N/A | |
4141
| | Kubernetes network policies | N/A | |
4242
| **Data** | Encryption at rest | Fully managed | Automatically encrypted by Elastic |
4343
| | Secure settings | N/A | |
@@ -54,7 +54,7 @@ Select your deployment type below to see what's available and how implementation
5454
| **Communication** | TLS (HTTP layer) | Managed | You can [configure custom certificates](/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md) |
5555
| | TLS (Transport layer) | Fully managed | Automatically configured by Elastic |
5656
| **Network** | IP filtering | Configurable | [Configure IP-based access restrictions](/deploy-manage/security/ip-filtering-cloud.md) |
57-
| | Private connections and VPC filtering | N/A | |
57+
| | Private connectivity and VPC filtering | N/A | |
5858
| | Kubernetes network policies | N/A | |
5959
| **Data** | Encryption at rest | N/A | |
6060
| | Secure settings | Configurable | [Configure secure settings](/deploy-manage/security/secure-settings.md) |
@@ -71,7 +71,7 @@ Select your deployment type below to see what's available and how implementation
7171
| **Communication** | TLS (HTTP layer) | Managed | [Multiple options](/deploy-manage/security/k8s-https-settings.md) for customization |
7272
| | TLS (Transport layer) | Managed | [Multiple options](/deploy-manage/security/k8s-transport-settings.md) for customization |
7373
| **Network** | IP filtering | Configurable | [Configure IP-based access restrictions](/deploy-manage/security/ip-filtering-basic.md) |
74-
| | Private connections and VPC filtering | N/A | |
74+
| | Private connectivity and VPC filtering | N/A | |
7575
| | Kubernetes network policies | Configurable | [Apply network policies to your Pods](/deploy-manage/security/k8s-network-policies.md) |
7676
| **Data** | Encryption at rest | N/A | |
7777
| | Secure settings | Configurable | [Configure secure settings](/deploy-manage/security/k8s-secure-settings.md) |
@@ -89,7 +89,7 @@ Select your deployment type below to see what's available and how implementation
8989
| **Communication** | TLS (HTTP layer) | Configurable | Can be automatically or manually configured. See [Initial security setup](/deploy-manage/security/self-setup.md) |
9090
| | TLS (Transport layer) | Configurable | Can be automatically or manually configured. See [Initial security setup](/deploy-manage/security/self-setup.md) |
9191
| **Network** | IP filtering | Configurable | [Configure IP-based access restrictions](/deploy-manage/security/ip-filtering-basic.md) |
92-
| | Private connections and VPC filtering | N/A | |
92+
| | Private connectivity and VPC filtering | N/A | |
9393
| | Kubernetes network policies | N/A | |
9494
| **Data** | Encryption at rest | N/A | |
9595
| | Keystore security | Configurable | [Configure secure settings](/deploy-manage/security/secure-settings.md) |
Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1 @@
1-
If you want to remove any traffic restrictions from a deployment or delete a rule set, you’ll need to remove any rule set associations first. To remove an association through the UI:
2-
3-
1. Go to the deployment.
4-
2. On the **Security** page, under **Traffic filters** select **Remove**.
1+
% no longer used

deploy-manage/security/aws-privatelink-traffic-filters.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ sub:
1515
example-default-dn: "us-east-1.aws.elastic-cloud.com"
1616
---
1717

18-
# AWS PrivateLink private connections
18+
# AWS PrivateLink private connectivity
1919

2020
You can use AWS PrivateLink to establish a secure connection for your {{ecloud}} deployments to communicate with other AWS services. AWS routes the PrivateLink traffic within the AWS data center and never exposes it to the public internet.
2121

@@ -225,7 +225,7 @@ Creating a private connection policy and associating it with your deployments al
225225
Follow these high-level steps to add a private connection policy that can be associated with your deployments.
226226
227227
1. Optional: [Find your VPC endpoint ID](#ec-find-your-endpoint).
228-
2. [Create rules using the VPC endpoint](#ec-create-traffic-filter-private-link-rule-set).
228+
2. [Create a private connection policy using the VPC endpoint](#ec-create-traffic-filter-private-link-rule-set).
229229
3. [Associate the VPC endpoint with your deployment](#ec-associate-traffic-filter-private-link-rule-set).
230230
231231
### Optional: Find your VPC endpoint ID [ec-find-your-endpoint]
@@ -266,7 +266,7 @@ Create a new private connection policy.
266266
13. Optional: Under **Apply to resources**, associate the new private connection policy with one or more deployments. If you specified a VPCE filter, then after you associate the filter with a deployment, it starts filtering traffic.
267267
14. To automatically attach this private connection policy to new deployments, select **Apply by default**.
268268
15. Click **Create**.
269-
16. (Optional) You can [claim your VPC endpoint ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a traffic filter ruleset.
269+
16. (Optional) You can [claim your VPC endpoint ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a private connection policy.
270270
271271
The next step is to [associate the policy](#ec-associate-traffic-filter-private-link-rule-set) with your deployment.
272272

deploy-manage/security/azure-private-link-traffic-filters.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ sub:
1515
example-default-dn: "eastus2.azure.elastic-cloud.com"
1616
---
1717

18-
# Azure Private Link private connections
18+
# Azure Private Link private connectivity
1919

2020
You can use Azure Private Link to establish a secure connection for your {{ecloud}} deployments to communicate with other Azure services. Azure routes the Private Link traffic within the Azure data center and never exposes it to the public internet.
2121

@@ -67,11 +67,11 @@ The process of setting up the private connection with Azure Private link is spli
6767

6868
| Azure portal | {{ecloud}} |
6969
| --- | --- |
70-
| 1. [Create a private endpoint using {{ecloud}} service alias.](#ec-private-link-azure-dns) | |
70+
| 1. [Create a private endpoint using {{ecloud}} service alias](#ec-private-link-azure-dns). | |
7171
| 2. [Create a DNS record pointing to the private endpoint](#ec-private-link-azure-dns). | |
72-
| | 3. [Create a private connection policy.](#ec-azure-allow-traffic-from-link-id) |
73-
| | 4. [Associate the Azure Private Link rule set with your deployments](#ec-associate-traffic-filter-private-link-rule-set). |
74-
| | 5. [Interact with your deployments over Private Link.](#ec-azure-access-the-deployment-over-private-link) |
72+
| | 3. [Create a private connection policy](#ec-azure-allow-traffic-from-link-id). |
73+
| | 4. [Associate the Azure private connection policy with your deployments](#ec-associate-traffic-filter-private-link-rule-set). |
74+
| | 5. [Interact with your deployments over Private Link](#ec-azure-access-the-deployment-over-private-link). |
7575

7676

7777
### Create your private endpoint and DNS entries in Azure [ec-private-link-azure-dns]

deploy-manage/security/gcp-private-service-connect-traffic-filters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ sub:
1616
example-default-dn: "us-central1.gcp.cloud.es.io"
1717
---
1818

19-
# GCP Private Service Connect private connections
19+
# GCP Private Service Connect private connectivity
2020

2121
You can use GCP Private Service Connect to establish a secure connection for your {{ecloud}} deployments to communicate with other GCP services. GCP routes the Private Link traffic within the GCP data center and never exposes it to the public internet.
2222

deploy-manage/security/ip-filtering-cloud.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ applies_to:
88
deployment:
99
ess: ga
1010
ece: ga
11-
serverless: ga
11+
serverless: ga
1212
products:
1313
- id: cloud-hosted
1414
- id: cloud-serverless
@@ -39,7 +39,7 @@ To learn how to create IP filters for self-managed clusters or {{eck}} deploymen
3939

4040
## Apply an IP filter to a deployment or project
4141

42-
To apply an IP filter to a deployment or project, you must first create a rule set at the organization or platform level, and then apply the rule set to your deployment.
42+
To apply an IP filter to a deployment or project, you must first create a policy at the organization or platform level, and then apply the policy to your deployment.
4343

4444
### Step 1: Create an IP filter policy
4545

deploy-manage/security/network-security-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Policies operate on the proxy. Requests rejected by the policies are not forward
2828
- You can have a maximum of 1024 policies per organization and 128 sources in each policy.
2929
- Policies must be created for a specific resource type. If you want to associate a policy to both hosted deployments and Serverless projects, then you have to create the same policy for each resource types.
3030
- Policies are bound to a single region, and can be assigned only to deployments or projects in the same region. If you want to associate a policy with resources in multiple regions, then you have to create the same policy in all the regions you want to apply it to.
31-
- Domain-based filtering rules are not allowed for network security policies, because the original IP is hidden behind the proxy. Only IP-based filtering rules are allowed.
31+
- Domain-based filtering sources are not allowed for network security policies, because the original IP is hidden behind the proxy. Only IP-based filtering sources are allowed.
3232

3333
## Default network security policies
3434

deploy-manage/security/private-link-traffic-filters.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,14 @@ applies_to:
33
deployment:
44
ess: ga
55
serverless: ga
6-
navigation_title: "Add private connections"
76
products:
87
- id: cloud-hosted
98
- id: cloud-serverless
109
---
1110

12-
# Private connections
11+
# Private connectivity
1312

14-
A private connection is a secure way for your {{ecloud}} deployments and projects to communicate with other cloud provider services over your cloud provider's private network. You can create a virtual private connection endpoint (VCPE) using your provider's private link service. You can also optionally filter traffic to your deployments and projects by creating ingress filters for your VCPE in {{ecloud}}.
13+
Private connectivity is a secure way for your {{ecloud}} deployments and projects to communicate with other cloud provider services over your cloud provider's private network. You can create a virtual private connection endpoint (VCPE) using your provider's private link service. You can also optionally filter traffic to your deployments and projects by creating ingress filters for your VCPE in {{ecloud}}.
1514

1615
Choose the relevant option for your cloud service provider:
1716

@@ -30,5 +29,5 @@ To learn how private connection policies work, how they affect your deployment,
3029
:::
3130

3231
:::{note}
33-
Private connections were formerly referred to as PrivateLink filters.
32+
Private connection policies were formerly referred to as PrivateLink filters.
3433
:::

0 commit comments

Comments
 (0)