-
Notifications
You must be signed in to change notification settings - Fork 199
Serverless AWS PrivateLink support #5075
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
✅ Vale Linting ResultsNo issues found on modified lines! The Vale linter checks documentation changes against the Elastic Docs style guide. To use Vale locally or report issues, refer to Elastic style guide for Vale. |
| The security group for the endpoint should, at minimum, allow for inbound connectivity from your instances' CIDR range on ports 443 and 9243. Security groups for the instances should allow for outbound connectivity to the endpoint on ports 443 and 9243. | ||
|
|
||
| <!--need to verify this for serverless--> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@alxchalkias can anyone help to clarify what the requirement for the endpoint security group (inbound/outbound connectivity on the endpoint)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@bobbybho or @igor-kupczynski can you confirm please?
|
@shainaraskas to be confirmed with @bobbybho, but I think we need to add the "Serverless" badge to the claim ownership API doc page if this is supported to work with projects. |
deploy-manage/deploy/elastic-cloud/differences-from-other-elasticsearch-offerings.md
Outdated
Show resolved
Hide resolved
bobbybho
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we also need to update the section "Create a DNS record" in https://www.elastic.co/docs/deploy-manage/security/private-connectivity-aws#ec-aws-vpc-dns. The sample screen capture is used for ECH, we should have a different screen capture (or a note) to show that the Host zone for serverless should be "private.us-east-1.aws.elastic.com"
| **Request** | ||
| ```sh | ||
| $ curl -v https://my-deployment-d53192.es.vpce.us-east-1.aws.elastic-cloud.com -u {username}:{password} | ||
| $ curl -v https://my-resource-d53192.es.vpce.us-east-1.aws.elastic-cloud.com -u {username}:{password} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
for serverless projects, the URL is
my-resource-d53192.es.private.us-east-1.aws.elastic.cloud
replace "vpce" with "private"
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.


Summary
Core changes
The rest are updating compatibility updates / wayfinding from the security > network security pages (see files changed)
Generative AI disclosure
Tool(s) and model(s) used: cursor auto
Open questions