Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions deploy-manage/security/private-connectivity-aws.md
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ The process of setting up a private connection with AWS PrivateLink is split bet
| 2. [Create a DNS record pointing to the VPC endpoint.](#ec-aws-vpc-dns) | |
| | 3. **Optional**: [Create a private connection policy.](#ec-add-vpc-elastic)<br><br>A private connection policy is required to filter traffic using the VPC endpoint ID. |
| | 4. **Optional**: [Associate the private connection policy with deployments or projects](#associate-private-connection-policy). |
| | 5. **Optional**: [Add an IP filter to allow traffic to {{kib}}](#optional-add-an-ip-filter-to-allow-traffic-to-kib). |
| | 5. **Optional**: [Add an IP filter to allow SSO to {{kib}} from the {{ecloud}} console.](#sso-kib-ip-filter) |
| | 6. [Interact with your deployments or projects over PrivateLink](#ec-access-the-deployment-over-private-link). |

After you create your private connection policy, you can [edit](#edit-private-connection-policy), [disassociate](#remove-private-connection-policy), or [delete](#delete-private-connection-policy) it.
Expand Down Expand Up @@ -387,7 +387,7 @@ You can associate a private connection policy with your deployment or project fr
4. Under **Apply to resources**, associate the policy with one or more deployments or projects.
5. Click **Update** to save your changes.

## Optional: Add an IP filter to allow traffic to {{kib}}
## Optional: Add an IP filter to allow SSO to {{kib}} from the {{ecloud}} console [sso-kib-ip-filter]

:::{include} _snippets/ip-filter-for-pc.md
:::
Expand Down
4 changes: 2 additions & 2 deletions deploy-manage/security/private-connectivity-azure.md
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ The process of setting up the private connection with Azure Private link is spli
| 2. [Create a DNS record pointing to the private endpoint](#ec-private-link-azure-dns). | |
| | 3. [Create a private connection policy](#ec-azure-allow-traffic-from-link-id). |
| | 4. [Associate the Azure private connection policy with your deployments](#associate-private-connection-policy). |
| | 5. **Optional**: [Add an IP filter to allow traffic to {{kib}}](#optional-add-an-ip-filter-to-allow-traffic-to-kib). |
| | 5. **Optional**: [Add an IP filter to allow SSO to {{kib}} from the {{ecloud}} console.](#sso-kib-ip-filter) |
| | 6. [Interact with your deployments over Private Link](#ec-azure-access-the-deployment-over-private-link). |

After you create your private connection policy, you can [edit](#edit-private-connection-policy), [disassociate](#remove-private-connection-policy), or [delete](#delete-private-connection-policy) it.
Expand Down Expand Up @@ -285,7 +285,7 @@ Associating the policy with your deployments allows you to do the following:
4. Under **Apply to resources**, associate the policy with one or more deployments.
5. Click **Update** to save your changes.

## Optional: Add an IP filter to allow traffic to {{kib}}
## Optional: Add an IP filter to allow SSO to {{kib}} from the {{ecloud}} console [sso-kib-ip-filter]

:::{include} _snippets/ip-filter-for-pc.md
:::
Expand Down
6 changes: 3 additions & 3 deletions deploy-manage/security/private-connectivity-gcp.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ The process of setting up the Private link connection to your deployments is spl
| [2. Create a DNS record pointing to the Private Service Connect endpoint.](#ec-private-service-connect-enpoint-dns) | |
| | [3. Optional: Create a private connection policy with the PSC Connection ID.](#create-private-connection-policy) |
| | [4. Optional: Associate the private connection policy with your deployments.](#associate-private-connection-policy) |
| | [5. Optional: Add an IP filter to allow traffic to {{kib}}](#optional-add-an-ip-filter-to-allow-traffic-to-kib). |
| | [5. Optional: Add an IP filter to allow SSO to {{kib}} from the {{ecloud}} console.](#sso-kib-ip-filter) |
| | [6. Interact with your deployments over Private Service Connect.](#ec-psc-access-the-deployment-over-psc) |

After you create your private connection policy, you can [edit](#edit-private-connection-policy), [disassociate](#remove-private-connection-policy), or [delete](#delete-private-connection-policy) it.
Expand Down Expand Up @@ -134,7 +134,7 @@ To test the connection:
:::{include} _snippets/find-endpoint.md
:::

1. Access your cluster over Private Link:
2. Access your cluster over Private Link:

* If you have a [custom endpoint alias](/deploy-manage/deploy/elastic-cloud/custom-endpoint-aliases.md) configured, you can use the custom endpoint URL to connect.
* Test the setup using the following cURL command. Pass the username and password for a user that has access to the cluster. Make sure to replace the URL with your deployment's endpoint information and the private hosted zone domain name that you registered.
Expand Down Expand Up @@ -240,7 +240,7 @@ If the policy doesn't contain a VPC filter, then the association can serve as a
4. Under **Apply to resources**, associate the policy with one or more deployments.
5. Click **Update** to save your changes.

## Optional: Add an IP filter to allow traffic to {{kib}}
## Optional: Add an IP filter to allow SSO to {{kib}} from the {{ecloud}} console [sso-kib-ip-filter]

:::{include} _snippets/ip-filter-for-pc.md
:::
Expand Down
Loading