Claim traffic filter link ID ownership through the API
This example demonstrates how to use the Elasticsearch Service RESTful API to claim different types of private link ID (AWS PrivateLink, Azure Private Link, and GCP Private Service Connect). We cover the following examples:
Claim a traffic filter link id ¶
AWS PrivateLink ¶
curl \
-H "Authorization: ApiKey $API_KEY" \
-H 'content-type: application/json' \
https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_claim \
-d '
{
"region": "eu-west-1",
"link_id": "$VPC_ENDPOINT_ID"
}
'
GCP Private Service Connect ¶
curl \
-H "Authorization: ApiKey $API_KEY" \
-H 'content-type: application/json' \
https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_claim \
-d '
{
"region": "gcp-us-central1",
"link_id": "$PSC_CONNECTION_ID"
}
'
Azure Private Link ¶
curl \
-H "Authorization: ApiKey $API_KEY" \
-H 'content-type: application/json' \
https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_claim \
-d '
{
"region": "azure-eastus2",
"azure_endpoint_name": "$AZURE_ENDPOINT_NAME",
"azure_endpoint_guid": "$AZURE_ENDPOINT_GUID"
}
'
List claimed traffic filter link id ¶
curl \
-H "Authorization: ApiKey $API_KEY" \
-H 'content-type: application/json' \
https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids \
Unclaim a traffic filter link id ¶
AWS PrivateLink ¶
curl \
-H "Authorization: ApiKey $API_KEY" \
-H 'content-type: application/json' \
https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_unclaim \
-d '
{
"region": "eu-west-1",
"link_id": "$VPC_ENDPOINT_ID"
}
'
GCP Private Service Connect ¶
curl \
-H "Authorization: ApiKey $API_KEY" \
-H 'content-type: application/json' \
https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_unclaim \
-d '
{
"region": "gcp-us-central1",
"link_id": "$PSC_CONNECTION_ID"
}
'
Azure Private Link ¶
curl \
-H "Authorization: ApiKey $API_KEY" \
-H 'content-type: application/json' \
https://api.elastic-cloud.com/api/v1/deployments/traffic-filter/link-ids/_unclaim \
-d '
{
"region": "azure-eastus2",
"azure_endpoint_name": "$AZURE_ENDPOINT_NAME",
"azure_endpoint_guid": "$AZURE_ENDPOINT_GUID"
}
'