Skip to content

Commit ff60297

Browse files
committed
fix API content
1 parent 2190657 commit ff60297

File tree

3 files changed

+241
-124
lines changed

3 files changed

+241
-124
lines changed

deploy-manage/security/azure-private-link-traffic-filters.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -156,8 +156,7 @@ The Private Link connection will be approved automatically after the private con
156156
Network security policies are bound to a single region, and can be assigned only to deployments in the same region. If you want to associate a policy with resources in multiple regions, then you have to create the same policy in all the regions you want to apply it to.
157157
:::
158158
7. Under **Connectivity**, select **Privatelink**.
159-
8. Under **VPCE filter**, enter your Private Endpoint resource ID.
160-
% where does name go
159+
8. Enter your private endpoint **Resource name** and **Resource ID**. When applied to a deployment, this information will be used to filter traffic.
161160

162161
:::{tip}
163162
You can assign multiple policies to a single deployment. The policies can be of different types. In case of multiple policies, traffic can match any associated policy to be forwarded to the resource. If none of the policies match, the request is rejected with `403 Forbidden`.
@@ -168,7 +167,7 @@ The Private Link connection will be approved automatically after the private con
168167
9. Optional: Under **Apply to resources**, associate the new private connection policy with one or more deployments. After you associate the filter with a deployment, it starts filtering traffic.
169168
10. To automatically attach this private connection policy to new deployments, select **Apply by default**.
170169
11. Click **Create**.
171-
12. (Optional) You can [claim your Private Endpoint resource ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a private connection policy.
170+
12. (Optional) You can [claim your Private Endpoint resource name and ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a private connection policy.
172171

173172
Creating the filter approves the Private Link connection.
174173

deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,26 @@ products:
88
- id: cloud-hosted
99
---
1010

11-
# Claim VCPE ID ownership [ec-claim-traffic-filter-link-id-through-the-api]
11+
# Claim VCPE ID or Azure resource ownership [ec-claim-traffic-filter-link-id-through-the-api]
1212

13-
This example demonstrates how to use the {{ecloud}} RESTful API to claim different types of private link ID (AWS PrivateLink, Azure Private Link, and GCP Private Service Connect). We cover the following examples:
13+
This example demonstrates how to use the {{ecloud}} RESTful API to claim different types of ID (AWS PrivateLink, Azure Private Link, and GCP Private Service Connect). We cover the following examples:
1414

15-
* [Claim a VCPE ID](#ec-claim-a-traffic-filter-link-id)
15+
* [Claim a VCPE ID or Azure resource](#ec-claim-a-traffic-filter-link-id)
1616

1717
* [AWS PrivateLink](#ec-claim-aws-privatelink)
1818
* [Azure Private Link](#ec-claim-azure-private-link)
1919
* [GCP Private Service Connect](#ec-claim-gcp-private-service-connect)
2020

21-
* [List claimed VCPE IDs](#ec-list-claimed-traffic-filter-link-id)
22-
* [Unclaim a VCPE ID](#ec-unclaim-a-traffic-filter-link-id)
21+
* [List claimed IDs](#ec-list-claimed-traffic-filter-link-id)
22+
* [Unclaim a VCPE ID or Azure resource](#ec-unclaim-a-traffic-filter-link-id)
2323

2424
* [AWS PrivateLink](#ec-unclaim-aws-privatelink)
2525
* [Azure Private Link](#ec-unclaim-azure-private-link)
2626
* [GCP Private Service Connect](#ec-unclaim-gcp-private-service-connect)
2727

2828

2929

30-
## Claim a VCPE ID [ec-claim-a-traffic-filter-link-id]
30+
## Claim a VCPE ID or Azure resource [ec-claim-a-traffic-filter-link-id]
3131

3232

3333
### AWS PrivateLink [ec-claim-aws-privatelink]
@@ -79,7 +79,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_claim
7979
```
8080

8181

82-
## List claimed VCPE IDs [ec-list-claimed-traffic-filter-link-id]
82+
## List claimed IDs [ec-list-claimed-traffic-filter-link-id]
8383

8484
```sh
8585
curl \
@@ -89,7 +89,7 @@ https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids \
8989
```
9090

9191

92-
## Unclaim a VCPE ID [ec-unclaim-a-traffic-filter-link-id]
92+
## Claim a VCPE ID or Azure resource [ec-unclaim-a-traffic-filter-link-id]
9393

9494

9595
### AWS PrivateLink [ec-unclaim-aws-privatelink]

0 commit comments

Comments
 (0)