IP traffic filters
editIP traffic filters
editTraffic filtering, by IP address or CIDR block, is one of the security layers available in Elasticsearch Service. It allows you to limit how your deployments can be accessed. We have two types of filters available for filtering by IP address or CIDR block: Ingress/Inbound and Egress/Outbound (Beta, API only).
- Ingress or inbound IP filters - These restrict access to your deployments from a set of IP addresses or CIDR blocks. These filters are available through the Elasticsearch Service console.
- Egress or outbound IP filters - These restrict the set of IP addresses or CIDR blocks accessible from your deployment. These might be used to restrict access to a certain region or service. This feature is in beta and is currently only available through the Traffic Filtering API.
Read more about Traffic Filtering for the general concepts behind traffic filtering in Elasticsearch Service.
Follow the step described here to set up ingress or inbound IP filters through the Elasticsearch Service console.
Create an IP filter rule set
editYou can combine any rules into a set, so we recommend that you group rules according to what they allow, and make sure to label them accordingly. Since multiple sets can be applied to a deployment, you can be as granular in your sets as you feel is necessary.
To create a rule set:
- Log in to the Elasticsearch Service Console.
- Find your deployment on the home page in the Elasticsearch Service card and select Manage to access it directly. Or, select Hosted deployments to go to the deployments page to view all of your deployments.
- Under the Features tab, open the Traffic filters page.
- Select Create filter.
- Select IP filtering rule set.
- Create your rule set, providing a meaningful name and description.
- Select the region for the rule set.
-
Select if this rule set should be automatically attached to new deployments.
Each rule set is bound to a particular region and can be only assigned to deployments in the same region.
-
Add one or more rules using IPv4, or a range of addresses with CIDR.
DNS names are not supported in rules.
The next step is to associate one or more rule-sets with your deployments.
Associate an IP filter rule set with your deployment
editAfter you’ve created the rule set, you’ll need to associate IP filter rules with your deployment:
- Go to the deployment.
- On the Security page, under Traffic filters select Apply filter.
- Choose the filter you want to apply and select Apply filter.
Remove an IP filter rule set association from your deployment
editIf you want to remove any traffic restrictions from a deployment or delete a rule set, you’ll need to remove any rule set associations first. To remove an association through the UI:
- Go to the deployment.
- On the Security page, under Traffic filters select Remove.
Edit an IP filter rule set
editYou can edit a rule set name or change the allowed traffic sources using IPv4, or a range of addresses with CIDR.
- Log in to the Elasticsearch Service Console.
- Find your deployment on the home page in the Elasticsearch Service card and select Manage to access it directly. Or, select Hosted deployments to go to the deployments page to view all of your deployments.
- Under the Features tab, open the Traffic filters page.
- Find the rule set you want to edit.
- Select the Edit icon.
Delete an IP filter rule set
editIf you need to remove a rule set, you must first remove any associations with deployments.
To delete a rule set with all its rules:
- Remove any deployment associations.
- Under the Features tab, open the Traffic filters page.
- Find the rule set you want to edit.
- Select the Delete icon. The icon is inactive if there are deployments assigned to the rule set.