-
Notifications
You must be signed in to change notification settings - Fork 107
Network sec: rebrand and new cloud UX, IP filters in serverless #1785
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
language update @alxchalkias
could consider changing IP filters to "IP filter policies" for consistency |
…to network-sec-core
|
92b07f3
to
23e197a
Compare
@bobbybho @igor-kupczynski @cargious this is ready for a dev review. I think your attention is best focused on these pages:
the PR overview points out the files related to these changes for ease of review. feel free to review any other bits of this PR and provide feedback in whatever way is easiest. |
Part of elastic/platform-docs-team#682 Rebrands "traffic filters" to "network security" Depends on the following PRs: * elastic/docs-content#1785 * elastic/docs-content#2047
This PR updates the core pages related to traffic filtering to reflect the new ux (issue: https://github.com/elastic/platform-docs-team/issues/682)
This is PR 1 of 2 or 3. The first PR will capture the core changes needed to ship the feature. Subsequent PRs will update references to traffic filters other places in the docs, do any necessary API reference cleanup, etc.
Followup PRs to merge right after:
any order after:
todo:
Summary
This PR is pretty big, so you can use the links below to review it
Key changes
Network security and network security policies
Pulled policy/rule logic out of this page and into dedicated pages for Elastic Cloud and ECE
IP filters
Rebranded as "IP filter network security policies"
Updated all flows impacted by UX changes
snippet: wayfinding to network security page
Private connections
repositioned them as a connectivity strategy with VCPE filtering optional for everything but Azure
used deployment aliases to test/connect privatelink for consistency
snippets: wayfinding to network security page, associate filter, private url structure, find endpoint, fleet
used deployment aliases to test/connect privatelink for consistency
snippets: wayfinding to network security page, associate filter, private url structure, find endpoint, fleet
used deployment aliases to test/connect privatelink for consistency
snippets: wayfinding to network security page, associate filter, private url structure, find endpoint, fleet
Remote clusters
Access deployments of another Elastic Cloud organization
deploy-manage/remote-clusters/ec-remote-cluster-other-ess.md
Secondary changes
todo: serverless reference doc URL
Updated references to traffic filters to "network security" or "IP filtering and private connections" as needed, added IP filtering to the list of security features for serverless
deploy-manage/_snippets/ecloud-security.md
snippets: security in elastic cloud, features for cluster communication and network security, feature comparison
snippets: features for cluster communication and network security, feature comparison
Open questions
Is the umbrella term for private connection filters "VCPE filtering" (e.g. "add a private connection, then filter traffic to your deployment using VCPE filters")? Will this term be used for GCP?ANSWER: It's "VPC filtering"
For Azure, is associating a private connection policy with a deployment required, or optional?ANSWER: technically optional but strongly recommended
For Azure inter-region private links, what region should the associated policy be created in?
SR TODO