IP traffic filters
Traffic filtering, by IP address or CIDR block, is one of the security layers available in Elastic Cloud. It allows you to limit how your deployments can be accessed. We have two types of filters available for filtering by IP address or CIDR block: Ingress/Inbound and Egress/Outbound (Beta, API only).
- Ingress or inbound IP filters - These restrict access to your deployments from a set of IP addresses or CIDR blocks. These filters are available through the Elastic Cloud Console.
- Egress or outbound IP filters - These restrict the set of IP addresses or CIDR blocks accessible from your deployment. These might be used to restrict access to a certain region or service. This feature is in beta and is currently only available through the Traffic Filtering API.
Read more about Traffic Filtering for the general concepts behind traffic filtering in Elastic Cloud.
Follow the step described here to set up ingress or inbound IP filters through the Elastic Cloud Console.
You can combine any rules into a set, so we recommend that you group rules according to what they allow, and make sure to label them accordingly. Since multiple sets can be applied to a deployment, you can be as granular in your sets as you feel is necessary.
To create a rule set:
Log in to the Elastic Cloud Console.
Find your deployment on the home page in the Hosted deployments card and select Manage to access it directly. Or, select Hosted deployments to go to the Deployments page to view all of your deployments.
Under the Features tab, open the Traffic filters page.
Select Create filter.
Select IP filtering rule set.
Create your rule set, providing a meaningful name and description.
Select the region for the rule set.
Select if this rule set should be automatically attached to new deployments.
NoteEach rule set is bound to a particular region and can be only assigned to deployments in the same region.
Add one or more rules using IPv4, or a range of addresses with CIDR.
NoteDNS names are not supported in rules.
The next step is to associate one or more rule-sets with your deployments.
After you’ve created the rule set, you’ll need to associate IP filter rules with your deployment:
- Go to the deployment.
- On the Security page, under Traffic filters select Apply filter.
- Choose the filter you want to apply and select Apply filter.
If you want to remove any traffic restrictions from a deployment or delete a rule set, you’ll need to remove any rule set associations first. To remove an association through the UI:
- Go to the deployment.
- On the Security page, under Traffic filters select Remove.
You can edit a rule set name or change the allowed traffic sources using IPv4, or a range of addresses with CIDR.
- Log in to the Elastic Cloud Console.
- Find your deployment on the home page in the Hosted deployments card and select Manage to access it directly. Or, select Hosted deployments to go to the Deployments page to view all of your deployments.
- Under the Features tab, open the Traffic filters page.
- Find the rule set you want to edit.
- Select the Edit icon.
If you need to remove a rule set, you must first remove any associations with deployments.
To delete a rule set with all its rules:
- Remove any deployment associations.
- Under the Features tab, open the Traffic filters page.
- Find the rule set you want to edit.
- Select the Delete icon. The icon is inactive if there are deployments assigned to the rule set.