Skip to content

Commit 46ac5d1

Browse files
Merge branch 'main' into update-screenshots-for-nav-changes-in-9.2
2 parents 5476241 + 010d22d commit 46ac5d1

File tree

5 files changed

+32
-5
lines changed

5 files changed

+32
-5
lines changed

manage-data/lifecycle/data-stream/tutorial-migrate-ilm-managed-data-stream-to-data-stream-lifecycle.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ products:
1313
In this tutorial we’ll look at migrating an existing data stream from [Index Lifecycle Management ({{ilm-init}})](../index-lifecycle-management.md) to [data stream lifecycle](../data-stream.md). The existing {{ilm-init}} managed backing indices will continue to be managed by {{ilm-init}} until they age out and get deleted by {{ilm-init}}; however, the new backing indices will be managed by data stream lifecycle. This way, a data stream is gradually migrated away from being managed by {{ilm-init}} to being managed by data stream lifecycle. As we’ll see, {{ilm-init}} and data stream lifecycle can co-manage a data stream; however, an index can only be managed by one system at a time.
1414

1515

16-
## TL;DR [migrate-dsl-ilm-tldr]
17-
1816
To migrate a data stream from {{ilm-init}} to data stream lifecycle we’ll have to execute two steps:
1917

2018
1. Update the index template that’s backing the data stream to set [prefer_ilm](elasticsearch://reference/elasticsearch/configuration-reference/data-stream-lifecycle-settings.md#index-lifecycle-prefer-ilm) to `false`, and to configure data stream lifecycle.

reference/fleet/manage-elastic-agents-in-fleet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,8 @@ Find **{{fleet}}** in the {{kib}} navigation menu, or use the [global search fie
3838
In {{fleet}} deployments where {{agents}} are installed in diverse locations and where data must be stored in local clusters, operators need a unified view of all agents and a central management interface for tasks like upgrades, policy organization, and metrics collection. {{fleet}} offers features to facilitate this deployment model:
3939

4040
- [Remote {{es}} output](/reference/fleet/remote-elasticsearch-output.md): Configure {{agents}} to send data to remote {{es}} clusters while still sending their check-in payloads to the management cluster. This allows {{fleet}} on the management cluster to maintain a global view of all agents while the ingested data is routed to the agents' respective local clusters.
41-
- [Automatic integrations synchronization](/reference/fleet/automatic-integrations-synchronization.md) {applies_to}`stack: ga 9.1.0`: Install an integration once in the management cluster and use {{fleet}} to synchronize and update the integration across all remote clusters. This enables you to initiate services like [OSquery](integration-docs://reference/osquery-intro.md) from the management cluster, and to collect and display responses from dispersed agents in {{fleet}} on the central management cluster.
41+
- {applies_to}`stack: ga 9.1.0` [Automatic integrations synchronization](/reference/fleet/automatic-integrations-synchronization.md): Install an integration once in the management cluster and use {{fleet}} to synchronize and update the integration across all remote clusters. This enables you to initiate services like [OSquery](integration-docs://reference/osquery-intro.md) from the management cluster, and to collect and display responses from dispersed agents in {{fleet}} on the central management cluster.
4242

4343
:::{image} images/manage-agents-global-fleet.png
4444
:alt: A diagram showing Elastic Agents connected to remote data clusters and to a Fleet management cluster
45-
:::
45+
:::
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
applies_to:
3+
stack: ga 9.2
4+
serverless:
5+
security: all
6+
products:
7+
- id: security
8+
- id: cloud-serverless
9+
---
10+
11+
# AWS Config
12+
13+
This page explains how to make data from the AWS Config integration appear in the following places within {{elastic-sec}}:
14+
15+
- **Findings page**: Data appears on the Findings page's [Misconfigurations](/solutions/security/cloud/findings-page.md) tab.
16+
- **Alert and Entity details flyouts**: Data appears in the Insights section of the [Alert](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section) and [Entity](/solutions/security/advanced-entity-analytics/view-entity-details.md#insights) details flyouts.
17+
18+
19+
In order for AWS Config data to appear in these workflows:
20+
21+
* Follow the steps to [set up the AWS Config integration](https://docs.elastic.co/en/integrations/aws/config).
22+
* Make sure the integration version is at least 4.0.0.
23+
* Ensure you have `read` privileges for the following indices: `security_solution-*.misconfiguration_latest`.

solutions/security/investigate/open-manage-cases.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ To explore a case, click on its name. You can then:
9595
Comments can contain Markdown. For syntax help, click the Markdown icon (![Click markdown icon](/solutions/images/security-markdown-icon.png "title =20x20")) in the bottom right of the comment.
9696
::::
9797

98-
* Examine [alerts](/solutions/security/investigate/open-manage-cases.md#cases-examine-alerts) and [indicators](/solutions/security/investigate/indicators-of-compromise.md#review-indicator-in-case) attached to the case
98+
* Examine [alerts](/solutions/security/investigate/open-manage-cases.md#cases-examine-alerts), [indicators](/solutions/security/investigate/indicators-of-compromise.md#review-indicator-in-case), and {applies_to}`stack: ga 9.2.0` [events](/solutions/security/investigate/open-manage-cases.md#cases-examine-events) attached to the case
9999
* [Add files](/solutions/security/investigate/open-manage-cases.md#cases-add-files)
100100
* [Add a Lens visualization](/solutions/security/investigate/open-manage-cases.md#cases-lens-visualization)
101101
* Modify the case’s description, assignees, category, severity, status, and tags.
@@ -147,7 +147,12 @@ To explore the alerts attached to a case, click the **Alerts** tab. In the table
147147
Each case can have a maximum of 1,000 alerts.
148148
::::
149149

150+
### Examine events attached to a case [cases-examine-events]
151+
```{applies_to}
152+
stack: ga 9.2
153+
```
150154

155+
After adding events to cases from the Events table (which you can access from the **Events** tab on the **Hosts**, **Network**, or **Users** pages) or from Timeline, you can examine them in the case's **Events** tab. Within the tab, alerts are organized from newest to oldest. Click the **View details** button the find out more about the event.
151156

152157
### Add files [cases-add-files]
153158

solutions/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -681,6 +681,7 @@ toc:
681681
- file: security/cloud/integration-qualys.md
682682
- file: security/cloud/integration-tenablevm.md
683683
- file: security/cloud/integration-rapid7.md
684+
- file: security/cloud/integrations/aws-config-integration.md
684685
- file: security/investigate.md
685686
children:
686687
- file: security/investigate/timeline.md

0 commit comments

Comments
 (0)