Skip to content

traffic filters > network security: file renames and xlinks #2047

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 92 commits into from
Jul 22, 2025
Merged
Show file tree
Hide file tree
Changes from 91 commits
Commits
Show all changes
92 commits
Select commit Hold shift + click to select a range
fe63b4c
little start
shainaraskas Jun 6, 2025
25d3e65
more stuff
shainaraskas Jun 9, 2025
accbfce
logic pages and ece pages cleanup
shainaraskas Jun 14, 2025
3f704b2
cleanup
shainaraskas Jun 14, 2025
d8dac25
ip filtering procedures fixed
shainaraskas Jun 14, 2025
43e9fd8
more
shainaraskas Jun 16, 2025
94637e1
more
shainaraskas Jun 16, 2025
8e2e5ea
more
shainaraskas Jun 16, 2025
76e1375
more
shainaraskas Jun 16, 2025
a7e24f1
more
shainaraskas Jun 16, 2025
b41dc72
more
shainaraskas Jun 16, 2025
56b2c93
aws done
shainaraskas Jun 17, 2025
a4a0bb4
more
shainaraskas Jun 17, 2025
70214f1
gcp
shainaraskas Jun 17, 2025
ada20de
more
shainaraskas Jun 17, 2025
b1a8263
restore file to quiet ci
shainaraskas Jun 17, 2025
422b7c7
more
shainaraskas Jun 17, 2025
a95efe9
checkpoint
shainaraskas Jun 17, 2025
8cb424f
more
shainaraskas Jun 17, 2025
4a6e170
more
shainaraskas Jun 17, 2025
f385170
azure
shainaraskas Jun 17, 2025
128c3e4
private connection almost done
shainaraskas Jun 17, 2025
695079b
cleanup
shainaraskas Jun 17, 2025
1c268c6
more
shainaraskas Jun 18, 2025
3e17a59
fix
shainaraskas Jun 18, 2025
d85e4e8
fixes
shainaraskas Jun 18, 2025
ed383b1
Update deploy-manage/_snippets/ecloud-security.md
shainaraskas Jun 18, 2025
7b7f501
fix title
shainaraskas Jun 18, 2025
dc36e5b
title fix
shainaraskas Jun 18, 2025
1512943
fixes
shainaraskas Jun 19, 2025
4734dbe
vcp -> vcpe
shainaraskas Jun 19, 2025
bb6a5ca
fixes
shainaraskas Jun 19, 2025
12cf541
fix better
shainaraskas Jun 19, 2025
a9f3446
fix curl tests
shainaraskas Jun 19, 2025
ca784e5
fix
shainaraskas Jun 19, 2025
2190657
badge fixes
shainaraskas Jun 19, 2025
ff60297
fix API content
shainaraskas Jun 19, 2025
5ede8be
Merge branch 'main' into network-sec-core
shainaraskas Jun 19, 2025
dc614fa
bad annotation
shainaraskas Jun 19, 2025
0670ccb
Merge branch 'network-sec-core' of github.com:elastic/docs-content in…
shainaraskas Jun 19, 2025
1062b40
fix VPC terminology, clarify optional steps for azure, add policy ben…
shainaraskas Jul 4, 2025
b069051
Apply suggestions from code review
shainaraskas Jul 4, 2025
cdc507f
feedback changes
shainaraskas Jul 4, 2025
d6c2619
Merge branch 'network-sec-core' of github.com:elastic/docs-content in…
shainaraskas Jul 4, 2025
a25b042
Apply suggestions from code review
shainaraskas Jul 4, 2025
f4be2a9
spelling
shainaraskas Jul 4, 2025
c42fd41
term cleanup, review protected resources process, icons
shainaraskas Jul 4, 2025
f8f42e2
language second pass
shainaraskas Jul 4, 2025
7bd13af
cleanup
shainaraskas Jul 4, 2025
9603d69
clarify
shainaraskas Jul 4, 2025
5e5d60f
Merge branch 'main' into network-sec-core
shainaraskas Jul 4, 2025
e94ab4f
vpc filter
shainaraskas Jul 4, 2025
23e197a
Merge branch 'network-sec-core' of github.com:elastic/docs-content in…
shainaraskas Jul 4, 2025
de83ae8
new filenames, redirects, toc updates
shainaraskas Jul 4, 2025
6c9e6d7
batch
shainaraskas Jul 4, 2025
5bf99b2
more cleanup
shainaraskas Jul 4, 2025
587c075
more cleanup
shainaraskas Jul 4, 2025
622d7e9
fixies
shainaraskas Jul 4, 2025
84cc0fe
more tidying
shainaraskas Jul 4, 2025
4ca1143
tiny cleanup
shainaraskas Jul 7, 2025
eadefd8
Merge branch 'network-sec-core' into network-sec-file-renames-xlinks
shainaraskas Jul 7, 2025
cfa15d7
anchors and consistency
shainaraskas Jul 7, 2025
7af326a
bobby feedback
shainaraskas Jul 8, 2025
a1d40a4
typo
shainaraskas Jul 8, 2025
21ce4cf
Merge branch 'network-sec-core' into network-sec-file-renames-xlinks
shainaraskas Jul 8, 2025
707d704
Merge branch 'main' into network-sec-core
shainaraskas Jul 8, 2025
7011f73
Merge branch 'network-sec-core' into network-sec-file-renames-xlinks
shainaraskas Jul 8, 2025
986f6df
spacing and double instruction
shainaraskas Jul 10, 2025
31e34f0
remove obvious assumption
shainaraskas Jul 10, 2025
563d6e2
Merge branch 'main' into network-sec-core
shainaraskas Jul 10, 2025
0de4954
Merge branch 'network-sec-core' into network-sec-file-renames-xlinks
shainaraskas Jul 10, 2025
aacaa96
rebrand anchors too
shainaraskas Jul 10, 2025
acc0924
more anchor rebrand
shainaraskas Jul 10, 2025
d830e40
typo
shainaraskas Jul 11, 2025
4f624b6
order
shainaraskas Jul 11, 2025
e6f9e59
Apply suggestions from code review
shainaraskas Jul 11, 2025
b832649
clearer nav titles
shainaraskas Jul 11, 2025
b454f95
Merge branch 'network-sec-core' of github.com:elastic/docs-content in…
shainaraskas Jul 11, 2025
b07e3cf
ece language pass
shainaraskas Jul 11, 2025
2215ed7
remove proxy logs info
shainaraskas Jul 11, 2025
843b202
Update deploy-manage/security/ece-filter-rules.md
shainaraskas Jul 11, 2025
59edf50
applies tag"
shainaraskas Jul 11, 2025
c741940
Merge branch 'network-sec-core' of github.com:elastic/docs-content in…
shainaraskas Jul 11, 2025
76bae1f
Merge branch 'network-sec-core' into network-sec-file-renames-xlinks
shainaraskas Jul 11, 2025
4136738
work around restrictive redirect logic
shainaraskas Jul 11, 2025
532a051
refix anchor
shainaraskas Jul 11, 2025
f9dad37
edu feedback pt 1
shainaraskas Jul 14, 2025
9658098
clarifications
shainaraskas Jul 14, 2025
5a00e13
bad link
shainaraskas Jul 14, 2025
55fefe1
Merge branch 'main' into network-sec-core
shainaraskas Jul 14, 2025
c0eca4f
Merge branch 'network-sec-core' into network-sec-file-renames-xlinks
shainaraskas Jul 14, 2025
a930032
Merge branch 'main' into network-sec-file-renames-xlinks
shainaraskas Jul 22, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion deploy-manage/_snippets/ecloud-security.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{{ecloud}} has built-in security. For example, HTTPS communications between {{ecloud}} and the internet, as well as inter-node communications, are secured automatically, and cluster data is encrypted at rest.

In both {{ech}} and {{serverless-full}}, you can also configure [IP filters](/deploy-manage/security/ip-filtering-cloud.md) to prevent unauthorized access to your deployments and projects.

In {{ech}}, you can augment these security features in the following ways:
* Configure [traffic filtering](/deploy-manage/security/traffic-filtering.md) to prevent unauthorized access to your deployments.
* [Configure private connectivity and apply VPC filtering](/deploy-manage/security/private-connectivity.md) to establish a secure connection for your {{ecloud}} deployments to communicate with other cloud services, and restrict traffic to deployments based on those private connections.
* Encrypt your deployment with a [customer-managed encryption key](/deploy-manage/security/encrypt-deployment-with-customer-managed-encryption-key.md).
* [Secure your settings](/deploy-manage/security/secure-settings.md) using {{es}} and {{kib}} keystores.
* Use the list of [{{ecloud}} static IPs](/deploy-manage/security/elastic-cloud-static-ips.md) to allow or restrict communications in your infrastructure.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ From the deployment main page, you can quickly access the following configuratio
From the **Deployment > Security** view, you can manage security settings, authentication, and access controls. Refer to [Secure your clusters](../../../deploy-manage/users-roles/cluster-or-deployment-auth.md) for more details on security options for your deployments.

* [Reset the `elastic` user password](../../users-roles/cluster-or-deployment-auth/manage-elastic-user-cloud.md)
* [Set up traffic filters](../../security/traffic-filtering.md) to restrict traffic to your deployment
* [Set up IP filters](../../security/ip-filtering-ece.md) to restrict traffic to your deployment
* Configure {{es}} keystore settings, also known as [secure settings](../../security/secure-settings.md)
* Configure trust relationships for [remote clusters](../../remote-clusters/ece-enable-ccs.md)

Expand Down
32 changes: 8 additions & 24 deletions deploy-manage/deploy/elastic-cloud/azure-native-isv-service.md
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ Check the following sections to learn more about the Azure Native ISV Service:
* **Troubleshooting**

* [I receive an error message about not having required authorization.](#azure-integration-authorization-access)
* [My {{ecloud}} deployment creation failed.](#azure-integration-deployment-failed-traffic-filter)
* [My {{ecloud}} deployment creation failed.](#azure-integration-deployment-failed-network-security)
* [I can’t SSO into my {{ecloud}} deployment.](#azure-integration-failed-sso)
* [I see some deployments in the {{ecloud}} console but not in the Azure Portal.](#azure-integration-cant-see-deployment)
* [My {{ecloud}} Azure Native ISV Service logs are not being ingested.](#azure-integration-logs-not-ingested)
Expand Down Expand Up @@ -319,18 +319,7 @@ $$$azure-integration-how-to-access$$$How can I access my {{ecloud}} deployment?


$$$azure-integration-modify-deployment$$$How can I modify my {{ecloud}} deployment?
: Modify your {{ecloud}} deployment in the {{ecloud}} console, which is accessed from the Azure UI through the **Advanced Settings** link on the deployment overview page. In the {{ecloud}} console you can perform a number of actions against your deployment, including:

* [Re-size](ec-customize-deployment-components.md) to increase or decrease the amount of RAM, CPU, and storage available to your deployment, or to add additional availability zones.
* [Upgrade](../../upgrade/deployment-or-cluster.md) your deployment to a new {{stack}} version.
* Enable or disable individual {{stack}} components such as APM and Machine Learning.
* [Update {{stack}} user settings](edit-stack-settings.md) in the component YML files.
* [Add or remove custom plugins](add-plugins-extensions.md).
* [Configure IP filtering](../../security/traffic-filtering.md).
* [Monitor your {{ecloud}} deployment](../../monitor/stack-monitoring/ece-ech-stack-monitoring.md) to ensure it remains healthy.
* Add or remove API keys to use the [REST API](cloud://reference/cloud-hosted/ec-api-restful.md).
* [And more](cloud-hosted.md)

: Modify your {{ecloud}} deployment in the {{ecloud}} console, which is accessed from the Azure UI through the **Advanced Settings** link on the deployment overview page. In the {{ecloud}} console you can perform [a number of actions against your deployment](/deploy-manage/deploy/elastic-cloud/cloud-hosted.md#ec_how_to_operate_elasticsearch_service).

$$$azure-integration-delete-deployment$$$How can I delete my {{ecloud}} deployment?
: Delete the deployment directly from the Azure console. The delete operation performs clean-up activities in the Elastic console to ensure any running components are removed, so that no additional charges occur.
Expand All @@ -349,7 +338,7 @@ $$$azure-integration-monitor$$$How do I monitor my existing Azure services?


::::{note}
If you want to send platform logs to a deployment that has [IP or Private Link traffic filters](../../security/traffic-filtering.md) enabled, then you need to contact [the Elastic Support Team](#azure-integration-support) to perform additional configurations. Refer support to the article [Azure++ Resource Logs blocked by Traffic Filters](https://support.elastic.co/knowledge/18603788).
If you want to send platform logs to a deployment that has [network security policies](/deploy-manage/security/network-security.md) applied, then you need to contact [the Elastic Support Team](#azure-integration-support) to perform additional configurations. Refer support to the article [Azure++ Resource Logs blocked by Traffic Filters](https://support.elastic.co/knowledge/18603788).

::::

Expand Down Expand Up @@ -462,7 +451,7 @@ $$$azure-integration-authorization-access$$$I receive an error message about not
Elastic is not currently integrated with Azure user management, so sharing deployment resources through the Cloud console with other Azure users is not possible. However, sharing direct access to these resources is possible. For details, check [Is the {{ecloud}} Azure Native ISV Service connected with Azure user management?](#azure-integration-azure-user-management).


$$$azure-integration-deployment-failed-traffic-filter$$$My {{ecloud}} deployment creation failed.
$$$azure-integration-deployment-failed-network-security$$$My {{ecloud}} deployment creation failed.
: When creating a new {{ecloud}} deployment, the deployment creation may fail with a `Your deployment failed` error. The process results with a status message such as:

```txt
Expand All @@ -477,20 +466,15 @@ $$$azure-integration-deployment-failed-traffic-filter$$$My {{ecloud}} deployment
]
```

One possible cause of a deployment creation failure is the default traffic filtering rules. Deployments fail to create if a previously created traffic filter has enabled the **Include by default** option. When this option is enabled, traffic to the deployment is blocked, including traffic that is part of the {{ecloud}} Azure Native ISV Service. As a result, some of the integration components are not successfully provisioned and the deployment creation fails.
One possible cause of a deployment creation failure is the default network security policies. Deployments fail to create if a previously created network security policy has enabled the **Include by default** option. When this option is enabled, traffic to the deployment is blocked, including traffic that is part of the {{ecloud}} Azure Native ISV Service. As a result, some of the integration components are not successfully provisioned and the deployment creation fails.

Follow these steps to resolve the problem:

1. Login to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
2. Go to the [Traffic filters page](https://cloud.elastic.co/deployment-features/traffic-filters).
2. Go to the [Network security page](https://cloud.elastic.co/deployment-features/traffic-filters).
3. Edit the traffic filter and disable the **Include by default** option.

:::{image} /deploy-manage/images/cloud-ec-marketplace-azure-traffic-filter-option.png
:alt: The Include by default option under Add to Deployments on the Traffic Filter page
:::

4. In Azure, create a new {{ecloud}} deployment.
5. After the deployment has been created successfully, go back to the [Traffic filters page](https://cloud.elastic.co/deployment-features/traffic-filters) in {{ecloud}} and re-enable the **Include by default** option.
5. After the deployment has been created successfully, go back to the [Network security page](https://cloud.elastic.co/deployment-features/traffic-filters) in {{ecloud}} and re-enable the **Include by default** option.


If your deployment still does not create successfully, [contact the Elastic Support Team](#azure-integration-support) for assistance.
Expand All @@ -511,7 +495,7 @@ Mimicking this metadata by manually adding tags to an {{ecloud}} deployment will

$$$azure-integration-logs-not-ingested$$$My {{ecloud}} Azure Native ISV Service logs are not being ingested.
: * When you set up monitoring for your Azure services, if your Azure and Elastic resources are in different subscriptions, you need to make sure that the `Microsoft.Elastic` resource provider is registered in the subscription in which the Azure resources exist. Check [How do I monitor my existing Azure services?](#azure-integration-monitor) for details.
* If you are using [IP or Private Link traffic filters](../../security/traffic-filtering.md), reach out to [the Elastic Support Team](#azure-integration-support).
* If you are using [network security policies](/deploy-manage/security/network-security.md), reach out to [the Elastic Support Team](#azure-integration-support).



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ This table compares the core platform capabilities between {{ech}} deployments a
| **Email service** | ✅ | ✅ | Preconfigured email connector available - [Learn more about limits and usage](/deploy-manage/deploy/elastic-cloud/tools-apis.md#elastic-cloud-email-service) |
| **Hardware configuration** | Limited control | Managed | Hardware choices are managed by Elastic |
| **High availability** | ✅ | ✅ | Automatic resilience |
| **Network security** | Public IP traffic filtering, private connectivity (VPCs, PrivateLink) | **Planned** | - Traffic filtering anticipated in a future release <br>- Private connectivity options anticipated in a future release |
| **Network security** | IP filtering, private connectivity (VPCs, PrivateLink) | IP filtering | Private connectivity options anticipated in a future release |
| **Node management** | User-controlled | Managed | No node configuration access by design |
| **Snapshot/restore** | ✅ | **Planned** | User-initiated snapshots are anticipated in a future release |

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ Refer to [Manage your Integrations Server](manage-integrations-server.md) to lea

## Security [ec_security]

Here, you can configure features that keep your deployment secure: reset the password for the `elastic` user, set up traffic filters, and add settings to the {{es}} keystore. You can also set up remote connections to other deployments.
Here, you can configure features that keep your deployment secure: reset the password for the `elastic` user, set up network security, and add settings to the {{es}} keystore. You can also set up remote connections to other deployments.


## Actions [ec_actions]
Expand Down
2 changes: 1 addition & 1 deletion deploy-manage/deploy/elastic-cloud/heroku.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ You might want to add more layers of security to your deployment, such as:

* Add more users to the deployment with third-party authentication providers and services like [SAML](../../users-roles/cluster-or-deployment-auth/saml.md), [OpenID Connect](../../users-roles/cluster-or-deployment-auth/openid-connect.md), or [Kerberos](../../users-roles/cluster-or-deployment-auth/kerberos.md).
* Do not use clients that only support HTTP to connect to {{ecloud}}. If you need to do so, you should use a reverse proxy setup.
* Create [traffic filters](../../security/traffic-filtering.md) and apply them to your deployments.
* Create [network security policies](/deploy-manage/security/network-security.md) and apply them to your deployments.
* If needed, you can [reset](../../users-roles/cluster-or-deployment-auth/built-in-users.md) the `elastic` password.

### Scale or adjust your deployment [echscale_or_adjust_your_deployment]
Expand Down
Loading
Loading