Skip to content

Commit 0c31464

Browse files
Merge branch 'main' into add-auth-provider-origin-config
2 parents b6a2bdc + 54a9c71 commit 0c31464

File tree

25 files changed

+186
-158
lines changed

25 files changed

+186
-158
lines changed
22.4 KB
Loading
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
1. {{agent}} connects to your ECE, ECK, or self-managed {{es}} cluster.
2+
2. The agent registers your cluster with {{ecloud}} using the Cloud Connect API.
3+
3. The agent begins to send metrics from your cluster to AutoOps in your selected CSP region.

deploy-manage/monitor/autoops/cc-autoops-as-cloud-connected.md

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,26 @@ products:
1212

1313
# AutoOps for self-managed clusters
1414

15-
For ECE ({{ece}}), ECK ({{eck}}), and self-managed clusters, AutoOps can be set up in all supported [regions](ec-autoops-regions.md#autoops-for-self-managed-clusters-regions) through [Cloud Connect](/deploy-manage/cloud-connect.md). More regions are coming soon.
15+
For ECE ({{ece}}), ECK ({{eck}}), and self-managed {{es}} clusters, AutoOps can be set up in all supported [regions](ec-autoops-regions.md#autoops-for-self-managed-clusters-regions) through [Cloud Connect](/deploy-manage/cloud-connect.md). More regions are coming soon.
1616

1717
Cloud Connect enables users of ECE, ECK, and self-managed clusters to use {{ecloud}} services. This means you can take advantage of the simplified cluster monitoring, real-time issue detection, and performance recommendations of AutoOps without having to run and manage the underlying infrastructure.
1818

19+
## How your self-managed cluster connects to AutoOps
20+
21+
To connect your ECE, ECK, or self-managed cluster to AutoOps, you have to use your {{ecloud}} account to install {{agent}}. After that, the process can be broken down into three components:
22+
23+
:::{include} /deploy-manage/monitor/_snippets/autoops-cc-components.md
24+
:::
25+
26+
:::{image} /deploy-manage/images/self-managed-autoops-diagram.png
27+
:alt: Diagram depicting how AutoOps for self-managed clusters works
28+
:::
29+
30+
For instructions on how to get started, refer to [](/deploy-manage/monitor/autoops/cc-connect-self-managed-to-autoops.md).
31+
32+
After this setup is complete, you can start using AutoOps to monitor your cluster. Learn more about what you can do with AutoOps in [views](/deploy-manage/monitor/autoops/views.md) and [events](/deploy-manage/monitor/autoops/ec-autoops-events.md).
33+
34+
1935
## Section overview
2036

2137
In this section, you'll find the following information:
@@ -26,4 +42,5 @@ In this section, you'll find the following information:
2642
* A [troubleshooting guide](/deploy-manage/monitor/autoops/cc-cloud-connect-autoops-troubleshooting.md) to help you with any issues you may encounter
2743

2844
:::{tip}
29-
Refer to our [FAQ](/deploy-manage/monitor/autoops/ec-autoops-faq.md#questions-about-autoops-for-self-managed-clusters) for answers to commonly asked questions about AutoOps for self-managed clusters.
45+
Refer to our [FAQ](/deploy-manage/monitor/autoops/ec-autoops-faq.md#questions-about-autoops-for-self-managed-clusters) for answers to commonly asked questions about AutoOps for self-managed clusters.
46+
:::

deploy-manage/monitor/autoops/cc-cloud-connect-autoops-troubleshooting.md

Lines changed: 31 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -44,42 +44,12 @@ $$$firewall$$$**My organization's firewall may be preventing {{agent}} from coll
4444
Run the following tests within the context of your execution environment. That is, if your chosen installation method is Kubernetes, run the commands from within the pod; for Docker, run the commands from within the container, and so on.
4545
:::
4646

47-
There are three main components of {{agent}}'s connection with your system:
47+
There are [three main components](/deploy-manage/monitor/autoops/cc-autoops-as-cloud-connected.md#how-your-self-managed-cluster-connects-to-autoops) of {{agent}}'s connection with your system:
4848

49-
1. {{agent}} registers your cluster with {{ecloud}}
50-
2. {{agent}} connects to your cluster
51-
3. {{agent}} sends metrics from your cluster to {{ecloud}}
52-
53-
If there is an issue with the first component, the agent will stop working and your logs might look like:
54-
55-
```sh
56-
... failed to register Cloud Connected Mode: ... Post \"https://api.elastic-cloud.com/api/v1/cloud-connected/clusters\": ...
57-
```
58-
59-
To test if your organization is not allowing the agent to register your cluster with {{ecloud}}, run the following command:
60-
61-
```json
62-
curl -XPOST -i \
63-
https://api.elastic-cloud.com/api/v1/cloud-connected/clusters \
64-
-H 'Content-Type: application/json' \
65-
-d '{"self_managed_cluster": {"id": "my-cluster-uuid", "name": "my-cluster-name", "version": "9.1.0"}, "license": {"uid": "my-license-id", "type": "basic"}}'
66-
```
67-
68-
The command should return an HTTP 401 response similar to:
69-
70-
```json
71-
{"UnauthorizedMessages":["Invalid credential headers"],"Cause":null}
72-
```
73-
If you do not receive a similar response, configure your HTTP proxy to allow it to reach the URL (with headers and a JSON body):
74-
75-
```json
76-
POST https://api.elastic-cloud.com/api/v1/cloud-connected/clusters
77-
```
78-
:::{note}
79-
If you are using Docker, you may need to complete this configuration directly via the `HTTP_PROXY`, `HTTPS_PROXY`, and `NO_PROXY` environment variables.
49+
:::{include} /deploy-manage/monitor/_snippets/autoops-cc-components.md
8050
:::
8151

82-
If there is an issue with the second component, {{agent}} cannot connect to your cluster. To test if your organization is not allowing this connection, run the following command depending on your chosen authentication method:
52+
If there is an issue with the first component, {{agent}} cannot connect to your cluster. To test if your organization is not allowing this connection, run the following command depending on your chosen authentication method:
8353

8454
:::::{tab-set}
8555
:group: api-key-or-basic
@@ -138,6 +108,34 @@ $$$firewall$$$**My organization's firewall may be preventing {{agent}} from coll
138108
| You are using a custom SSL/TLS configuration with {{es}} | Disable SSL/TLS verification so that your system trusts all certificates. We do not recommend disabling verification in production environments. <br><br> If you are using API key authentication, run the following command: <br><br>`curl -XGET --insecure -i $AUTOOPS_ES_URL \ -H "Authorization: ApiKey $AUTOOPS_ES_API_KEY"`. <br><br> If you are using username/password authentication, run the following command: <br><br> `curl -XGET --insecure -i $AUTOOPS_ES_URL \ -u $AUTOOPS_ES_USERNAME` <br><br> If the issue is resolved, you need to configure your custom SSL/TLS settings with {{agent}}. If the issue persists, contact [Elastic support](https://support.elastic.co/).|
139109
| You are connecting a local development cluster using Docker without specifying `--network host` | - Make sure you are following all the steps to [connect your local development cluster to AutoOps](/deploy-manage/monitor/autoops/cc-connect-local-dev-to-autoops.md#connect-your-local-development-cluster-to-autoops). <br> - In the [Install agent](/deploy-manage/monitor/autoops/cc-connect-self-managed-to-autoops.md#install-agent) step, make sure you are replacing `docker run -d \` with `docker run -d --network host \`. |
140110

111+
If there is an issue with the second component, the agent will stop working and your logs might look like:
112+
113+
```sh
114+
... failed to register Cloud Connected Mode: ... Post \"https://api.elastic-cloud.com/api/v1/cloud-connected/clusters\": ...
115+
```
116+
117+
To test if your organization is not allowing the agent to register your cluster with {{ecloud}}, run the following command:
118+
119+
```json
120+
curl -XPOST -i \
121+
https://api.elastic-cloud.com/api/v1/cloud-connected/clusters \
122+
-H 'Content-Type: application/json' \
123+
-d '{"self_managed_cluster": {"id": "my-cluster-uuid", "name": "my-cluster-name", "version": "9.1.0"}, "license": {"uid": "my-license-id", "type": "basic"}}'
124+
```
125+
126+
The command should return an HTTP 401 response similar to:
127+
128+
```json
129+
{"UnauthorizedMessages":["Invalid credential headers"],"Cause":null}
130+
```
131+
If you do not receive a similar response, configure your HTTP proxy to allow it to reach the URL (with headers and a JSON body):
132+
133+
```json
134+
POST https://api.elastic-cloud.com/api/v1/cloud-connected/clusters
135+
```
136+
:::{note}
137+
If you are using Docker, you may need to complete this configuration directly via the `HTTP_PROXY`, `HTTPS_PROXY`, and `NO_PROXY` environment variables.
138+
:::
141139

142140
If there is an issue with the third component, the agent will attempt to establish the connection and your logs might look like:
143141

explore-analyze/discover/discover-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Learn how to use **Discover** to:
2727
**Discover** provides tailored interfaces and features for the following data types when accessed from Observability or Security project types or {{kib}} solution views:
2828

2929
* Observability:
30-
* **[Logs exploration](/solutions/observability/logs/explore-logs.md)**
30+
* **[Logs exploration](/solutions/observability/logs/discover-logs.md)**
3131
* **[Metrics exploration](/solutions/observability/infra-and-hosts/discover-metrics.md)** {applies_to}`stack: preview 9.2` {applies_to}`serverless: preview`
3232
% LINK/PAGE TBD * **Traces exploration**
3333
% * Security:
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
navigation_title: ML-nodes vs EIS
3+
applies_to:
4+
stack: ga
5+
serverless: ga
6+
deployment:
7+
self: unavailable
8+
---
9+
10+
# Using ML-nodes or Elastic {{infer-cap}} Service (EIS) [ml-nodes-vs-eis]
11+
12+
## When to use EIS?
13+
14+
The Elastic Inference Service (EIS) requires zero setup or management. It's always-on, has excellent ingest throughput, and uses simple token-based billing.
15+
16+
Use EIS if you're getting started with [semantic search](/solutions/search/semantic-search.md) or [hybrid search](/solutions/search/hybrid-search.md) and want a smooth experience. Under the hood, EIS uses GPUs for ML {{infer}}, which are more efficient and allow a faster, more cost-effective experience for most usecases.
17+
18+
## When to use {{ml}} nodes?
19+
20+
ML nodes are a more configurable solution than EIS where you can set up specific nodes using CPUs to execute [ML {{infer}}](/explore-analyze/elastic-inference/inference-api.md). {{ml-cap}} nodes tend to give more fine-grained control.
21+
22+
Use ML nodes if you want to decide how your models run, you want to run custom models, or you have a self-managed setup.
23+
24+
## How do I switch from using ML nodes to EIS on an existing index?
25+
26+
```{applies_to}
27+
stack: ga 9.3
28+
serverless: ga
29+
```
30+
31+
```console
32+
PUT /my-ml-node-index/_mapping
33+
{
34+
"properties": {
35+
"text": {
36+
"type": "semantic_text",
37+
"inference_id": ".elser-2-elastic"
38+
}
39+
}
40+
}
41+
```
42+
43+
You can also switch an EIS-based index to use ML nodes:
44+
45+
```console
46+
PUT /my-eis-index/_mapping
47+
{
48+
"properties": {
49+
"text": {
50+
"type": "semantic_text",
51+
"inference_id": ".elser-2-elasticsearch"
52+
}
53+
}
54+
}
55+
```

explore-analyze/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ toc:
4141
- file: elastic-inference.md
4242
children:
4343
- file: elastic-inference/eis.md
44+
children:
45+
- hidden: elastic-inference/ml-node-vs-eis.md
4446
- file: elastic-inference/inference-api.md
4547
- file: machine-learning.md
4648
children:

get-started/_snippets/security-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,14 @@ Use {{elastic-sec}} to protect your systems from security threats.
1111
:::{dropdown} Use cases
1212
:open:
1313

14-
* **SIEM:** {{elastic-sec}}'s modern SIEM provides a centralized platform for ingesting, analyzing, and managing security data from various sources.
15-
* **Third-party integration support:** Ingest data from a various tools and data sources so you can centralize your security data.
16-
* **Threat detection and analytics:** Identify threats by using prebuilt rules with the ability to customize or create custom detection rules, automatically detect anomalous activity with built-in machine learning jobs, or proactively search for threats using our powerful threat hunting and interactive visualization tools.
17-
* **Automatic migration:** Migrate SIEM rules from other platforms to {{elastic-sec}}.
18-
* **Endpoint protection and threat prevention:** Automatically stop cybersecurity attacks—such as malware and ransomware—before damage and loss can occur.
19-
* **AI-powered features:** Leverage generative AI to help enhance threat detection, assist with incident response, and improve day-to-day security operations.
20-
* **Custom dashboards and visualizations:** Create custom dashboards and visualizations to gain insights into security events.
21-
* **Cloud Security:** {{elastic-sec}} provides the following cloud features:
14+
* [**SIEM:**](https://www.elastic.co/security/siem): {{elastic-sec}}'s modern SIEM provides a centralized platform for ingesting, analyzing, and managing security data from various sources.
15+
* [**Third-party integration support**](/solutions/security/get-started/ingest-data-to-elastic-security.md): Ingest data from a various tools and data sources so you can centralize your security data.
16+
* [**Threat detection and analytics:**](/solutions/security/detect-and-alert.md): Identify threats by using [prebuilt rules](/solutions/security/detect-and-alert/install-manage-elastic-prebuilt-rules.md) with the ability to customize or create custom detection rules, automatically detect anomalous activity with built-in machine learning jobs, or proactively search for threats using our powerful [threat hunting and interactive visualization tools](/solutions/security/investigate.md).
17+
* [**Automatic migration**](/solutions/security/get-started/automatic-migration.md): Migrate SIEM rules from other platforms to {{elastic-sec}}.
18+
* [**Endpoint protection and threat prevention**](/solutions/security/configure-elastic-defend.md): Automatically stop cybersecurity attacks—such as malware and ransomware—before damage and loss can occur.
19+
* [**AI-powered features**](/solutions/security/ai.md): Leverage generative AI to help enhance threat detection, assist with incident response, and improve day-to-day security operations.
20+
* [**Custom dashboards and visualizations**](/solutions/security/dashboards.md): Create custom dashboards and visualizations to gain insights into security events.
21+
* [**Cloud Security**](/solutions/security/cloud.md): {{elastic-sec}} provides the following cloud features:
2222
* **Cloud Security Posture Management (CSPM) and Kubernetes Security Posture Management (KSPM):** Check cloud service configurations against security benchmarks to identify and resolve misconfigurations that can be exploited.
2323
* **Cloud Workload Protection:** Get visibility and runtime protection for cloud workloads.
2424
* **Vulnerability Management:** Uncover vulnerabilities within your cloud infrastructure.

manage-data/lifecycle/curator.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
navigation_title: Curator
33
applies_to:
44
stack: ga
5+
serverless: unavailable
56
---
67

78
# Elasticsearch Curator

manage-data/lifecycle/rollup.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@
22
mapped_pages:
33
- https://www.elastic.co/guide/en/elasticsearch/reference/current/xpack-rollup.html
44
- https://www.elastic.co/guide/en/elasticsearch/reference/current/rollup-overview.html
5+
applies_to:
6+
stack: ga
7+
serverless: unavailable
58
products:
69
- id: elasticsearch
710
---

0 commit comments

Comments
 (0)