Skip to content

Serverless AWS PrivateLink support#5075

Merged
shainaraskas merged 15 commits intomainfrom
pl-aws-srv
Feb 19, 2026
Merged

Serverless AWS PrivateLink support#5075
shainaraskas merged 15 commits intomainfrom
pl-aws-srv

Conversation

@shainaraskas
Copy link
Copy Markdown
Member

@shainaraskas shainaraskas commented Feb 9, 2026

Summary

Core changes

The rest are updating compatibility updates / wayfinding from the security > network security pages (see files changed)

Generative AI disclosure

  1. Did you use a generative AI (GenAI) tool to assist in creating this contribution?
  • Yes (ensuring consistent "deployments and projects" / mentions of private connectivity support across docset)
  • No
  1. If you answered "Yes" to the previous question, please specify the tool(s) and model(s) used (e.g., Google Gemini, OpenAI ChatGPT-4, etc.).

Tool(s) and model(s) used: cursor auto

Open questions

@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Feb 9, 2026

✅ Vale Linting Results

No issues found on modified lines!


The Vale linter checks documentation changes against the Elastic Docs style guide.

To use Vale locally or report issues, refer to Elastic style guide for Vale.

Comment on lines 165 to +167
The security group for the endpoint should, at minimum, allow for inbound connectivity from your instances' CIDR range on ports 443 and 9243. Security groups for the instances should allow for outbound connectivity to the endpoint on ports 443 and 9243.

<!--need to verify this for serverless-->
Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@alxchalkias can anyone help to clarify what the requirement for the endpoint security group (inbound/outbound connectivity on the endpoint)?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@bobbybho or @igor-kupczynski can you confirm please?

@shainaraskas shainaraskas marked this pull request as ready for review February 9, 2026 21:48
@shainaraskas shainaraskas requested a review from a team as a code owner February 9, 2026 21:48
@alxchalkias
Copy link
Copy Markdown
Contributor

@shainaraskas to be confirmed with @bobbybho, but I think we need to add the "Serverless" badge to the claim ownership API doc page if this is supported to work with projects.

Copy link
Copy Markdown
Contributor

@bobbybho bobbybho left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we also need to update the section "Create a DNS record" in https://www.elastic.co/docs/deploy-manage/security/private-connectivity-aws#ec-aws-vpc-dns. The sample screen capture is used for ECH, we should have a different screen capture (or a note) to show that the Host zone for serverless should be "private.us-east-1.aws.elastic.com"

**Request**
```sh
$ curl -v https://my-deployment-d53192.es.vpce.us-east-1.aws.elastic-cloud.com -u {username}:{password}
$ curl -v https://my-resource-d53192.es.vpce.us-east-1.aws.elastic-cloud.com -u {username}:{password}
Copy link
Copy Markdown
Contributor

@bobbybho bobbybho Feb 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

for serverless projects, the URL is

my-resource-d53192.es.private.us-east-1.aws.elastic.cloud

replace "vpce" with "private"

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will those be updated in the product? that's data that I got from the QA environment

assuming yes, just double-checking

image

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the data shown above is for ECH. In Serverless, the service name is vpce-svc-0197c33d7deffd2fa.eu-west-1.vpce.amazonaws.com.

@tpanagiot — could you check with the UI team whether they’re calling the network-api metadata-api endpoint to fetch the Serverless PrivateLink endpoints?

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@bobbybho @shainaraskas We verified that the UI team is not calling the network-api but they are working on fixing it.

@shainaraskas
Copy link
Copy Markdown
Member Author

shainaraskas commented Feb 10, 2026

@bobbybho

The sample screen capture is used for ECH, we should have a different screen capture (or a note) to show that the Host zone for serverless should be "private.us-east-1.aws.elastic.com"

I think the screenshot is ok here because we're telling them to enter the PHZ domain name for their region. I've added a quick tip to warn people away from just assuming the name in the screenshot (and a couple of other places) applies to them:

image

Copy link
Copy Markdown
Member

@kilfoyle kilfoyle left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! 🦕 Very nice!

Comment thread deploy-manage/security/network-security-api.md Outdated
Copy link
Copy Markdown
Contributor

@bobbybho bobbybho left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thanks for addressing my comments.

@bobbybho
Copy link
Copy Markdown
Contributor

think we need to add the "Serverless" badge to the claim ownership API doc page if this is supported to work with projects.

No—today, the Serverless project and network APIs don’t support the _claim endpoints.

@shainaraskas shainaraskas enabled auto-merge (squash) February 19, 2026 14:05
@shainaraskas shainaraskas merged commit e8dc384 into main Feb 19, 2026
7 of 8 checks passed
@shainaraskas shainaraskas deleted the pl-aws-srv branch February 19, 2026 15:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants