You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/security/azure-private-link-traffic-filters.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -156,8 +156,7 @@ The Private Link connection will be approved automatically after the private con
156
156
Network security policies are bound to a single region, and can be assigned only to deployments in the same region. If you want to associate a policy with resources in multiple regions, then you have to create the same policy in all the regions you want to apply it to.
157
157
:::
158
158
7. Under **Connectivity**, select **Privatelink**.
159
-
8. Under **VPCE filter**, enter your Private Endpoint resource ID.
160
-
% where does name go
159
+
8. Enter your private endpoint **Resource name** and **Resource ID**. When applied to a deployment, this information will be used to filter traffic.
161
160
162
161
:::{tip}
163
162
You can assign multiple policies to a single deployment. The policies can be of different types. In case of multiple policies, traffic can match any associated policy to be forwarded to the resource. If none of the policies match, the request is rejected with `403 Forbidden`.
@@ -168,7 +167,7 @@ The Private Link connection will be approved automatically after the private con
168
167
9. Optional: Under **Apply to resources**, associate the new private connection policy with one or more deployments. After you associate the filter with a deployment, it starts filtering traffic.
169
168
10. To automatically attach this private connection policy to new deployments, select **Apply by default**.
170
169
11. Click **Create**.
171
-
12. (Optional) You can [claim your Private Endpoint resource ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a private connection policy.
170
+
12. (Optional) You can [claim your Private Endpoint resource name and ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a private connection policy.
172
171
173
172
Creating the filter approves the Private Link connection.
Copy file name to clipboardExpand all lines: deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,26 +8,26 @@ products:
8
8
- id: cloud-hosted
9
9
---
10
10
11
-
# Claim VCPE ID ownership [ec-claim-traffic-filter-link-id-through-the-api]
11
+
# Claim VCPE ID or Azure resource ownership [ec-claim-traffic-filter-link-id-through-the-api]
12
12
13
-
This example demonstrates how to use the {{ecloud}} RESTful API to claim different types of private link ID (AWS PrivateLink, Azure Private Link, and GCP Private Service Connect). We cover the following examples:
13
+
This example demonstrates how to use the {{ecloud}} RESTful API to claim different types of ID (AWS PrivateLink, Azure Private Link, and GCP Private Service Connect). We cover the following examples:
14
14
15
-
*[Claim a VCPE ID](#ec-claim-a-traffic-filter-link-id)
15
+
*[Claim a VCPE ID or Azure resource](#ec-claim-a-traffic-filter-link-id)
0 commit comments