You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
cloud: mark Step 3 as optional in serverless private endpoint doc
Clarify that authorizing private endpoints is only needed when restricting
access, and that leaving Authorized Networks empty allows all connections.
Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
Then you can connect to the endpoint service with the private DNS name.
105
105
106
-
### Step 3. Authorize your private endpoint in TiDB Cloud
106
+
### Step 3. Authorize your private endpoint in TiDB Cloud (Optional)
107
107
108
-
After creating the AWS interface endpoint, you must add it to the allowlist of your target {{{ .starter }}} or {{{ .essential }}} instance.
108
+
<Info>
109
+
110
+
This step is optional. You only need to configure authorized networks when you want to restrict access to specific private endpoint connections. If no rules are configured, all private endpoint connections are allowed by default.
111
+
112
+
</Info>
113
+
114
+
After creating the AWS interface endpoint, you can add it to the allowlist of your target {{{ .starter }}} or {{{ .essential }}} instance to restrict access.
109
115
110
116
1. On the [**My TiDB**](https://tidbcloud.com/tidbs) page, click the name of your target {{{ .starter }}} or {{{ .essential }}} instance to go to its overview page.
111
117
2. Click **Settings** > **Networking** in the left navigation pane.
@@ -117,8 +123,9 @@ After creating the AWS interface endpoint, you must add it to the allowlist of y
117
123
-**Your VPC Endpoint ID**: paste your 22-character VPC Endpoint ID from the AWS Management Console (starts with `vpce-`).
118
124
119
125
> **Tip:**
120
-
>
121
-
> To allow all Private Endpoint connections from your cloud region (for testing or open access), enter a single asterisk (`*`) in the **Your VPC Endpoint ID** field.
126
+
>
127
+
> - If you leave the **Authorized Networks** table empty (that is, no rules are added), all private endpoint connections are allowed by default. You only need to add rules when you want to restrict access to specific private endpoint connections.
128
+
> - To allow all Private Endpoint connections from your cloud region (for testing or open access), enter a single asterisk (`*`) in the **Your VPC Endpoint ID** field.
0 commit comments