Hi!
We have been successfully using Terraform to set up Elasticcloud instances, and using traffic filtering to allow only access via private link to our own Azure serup - almost too successful, as it turns out, as it means we cannot access the cluster with Kibana from the cloud portal- - we just get
{"ok":false,"message":"Forbidden"}
This kind of makes sense - but for support and development we'd like to be able to query our indexes directly.
I assume this means we need to add an additional filter to effectively whitelist the cloud Kibana instance. What would this look like in terraform?
Thanks
Tim