Terraform, Traffic Filters and Kibana

Hi!

We have been successfully using Terraform to set up Elasticcloud instances, and using traffic filtering to allow only access via private link to our own Azure serup - almost too successful, as it turns out, as it means we cannot access the cluster with Kibana from the cloud portal- - we just get
{"ok":false,"message":"Forbidden"}

This kind of makes sense - but for support and development we'd like to be able to query our indexes directly.

I assume this means we need to add an additional filter to effectively whitelist the cloud Kibana instance. What would this look like in terraform?

Thanks

Tim

1 Like

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.