From c8e1a6af783c3c859609b733961d36dd91e786ba Mon Sep 17 00:00:00 2001 From: shainaraskas <58563081+shainaraskas@users.noreply.github.com> Date: Mon, 14 Apr 2025 15:54:35 -0400 Subject: [PATCH] Update aws-privatelink-traffic-filters.md typo --- deploy-manage/security/aws-privatelink-traffic-filters.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/deploy-manage/security/aws-privatelink-traffic-filters.md b/deploy-manage/security/aws-privatelink-traffic-filters.md index dcba8d29a5..c59da54fcc 100644 --- a/deploy-manage/security/aws-privatelink-traffic-filters.md +++ b/deploy-manage/security/aws-privatelink-traffic-filters.md @@ -130,7 +130,7 @@ The mapping will be different for your region. Our production VPC Service for `u :screenshot: ::: - The security group for the endpoint should at minimum allow for inbound connectivity from your instances CIDR range on ports 443 and 9243. Security groups for the instances should allow for outbound connnectibity to the endpoint on ports 443 and 9243. + The security group for the endpoint should at minimum allow for inbound connectivity from your instances CIDR range on ports 443 and 9243. Security groups for the instances should allow for outbound connectivity to the endpoint on ports 443 and 9243. 2. Create a DNS record.