Skip to content

Commit 4fe529c

Browse files
committed
fix instances with other patterns
1 parent 162ebf8 commit 4fe529c

File tree

67 files changed

+134
-134
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+134
-134
lines changed

deploy-manage/deploy/elastic-cloud/azure-native-isv-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ $$$azure-integration-whats-included$$$What is included in my {{ecloud}} deployme
298298
: Each {{ecloud}} deployment includes:
299299

300300
* An {{es}} cluster
301-
* A {{kib}} instance which provides data visualization and a front-end for the {stack}
301+
* A {{kib}} instance which provides data visualization and a front-end for the {{stack}}
302302
* An APM server that allows you to easily collect application traces
303303
* An {{ents}} instance that allows you to easily build a search experience with an intuitive interface
304304

deploy-manage/deploy/self-managed/configure-elasticsearch.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ The configuration files should contain settings which are node-specific (such as
1414

1515
{{es}} has three configuration files:
1616

17-
* `elasticsearch.yml` for configuring {es}
17+
* `elasticsearch.yml` for configuring {{es}}
1818
* `jvm.options` for configuring {{es}} JVM settings
1919
* `log4j2.properties` for configuring {{es}} logging
2020

deploy-manage/monitor/monitoring-data/kibana-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ applies:
1515
The {{stack}} {{monitor-features}} provide [Alerting rules](../../../explore-analyze/alerts-cases/alerts.md) out-of-the box to notify you of potential issues in the {{stack}}. These rules are preconfigured based on the best practices recommended by Elastic. However, you can tailor them to meet your specific needs.
1616

1717
:::{image} ../../../images/kibana-monitoring-kibana-alerting-notification.png
18-
:alt: {{kib}} alerting notifications in {stack-monitor-app}
18+
:alt: {{kib}} alerting notifications in {{stack-monitor-app}}
1919
:class: screenshot
2020
:::
2121

deploy-manage/remote-clusters/ece-enable-ccs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ These remote clusters could be:
1313

1414
* Another {{es}} cluster of your ECE installation
1515
* An {{es}} cluster in a remote ECE installation
16-
* An {{es}} cluster hosted on {ecloud}
16+
* An {{es}} cluster hosted on {{ecloud}}
1717
* Any other self-managed {{es}} cluster
1818

1919

deploy-manage/security/set-up-basic-security-plus-https.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ Typically, you need to create the following separate roles:
219219

220220
* **setup** role for setting up index templates and other dependencies
221221
* **monitoring** role for sending monitoring information
222-
* **writer** role for publishing events collected by {metricbeat}
222+
* **writer** role for publishing events collected by {{metricbeat}}
223223
* **reader** role for Kibana users who need to view and create visualizations that access {{metricbeat}} data
224224

225225
::::{note}

deploy-manage/tools/snapshot-and-restore/searchable-snapshots.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ A snapshot of a {{search-snap}} index contains only a small amount of metadata w
173173

174174
Because {{search-snap}} indices are not regular indices, it is not possible to use a [source-only repository](source-only-repository.md) to take snapshots of {{search-snap}} indices.
175175

176-
::::{admonition} Reliability of {search-snaps}
176+
::::{admonition} Reliability of {{search-snaps}}
177177
:class: warning
178178

179179
:name: searchable-snapshots-reliability

deploy-manage/users-roles/cluster-or-deployment-auth/elasticsearch-privileges.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ This section lists the privileges that you can assign to a role.
234234

235235

236236
`read_ilm`
237-
: All read-only {{Ilm}} operations, such as getting policies and checking the status of {Ilm}
237+
: All read-only {{Ilm}} operations, such as getting policies and checking the status of {{Ilm}}
238238

239239
This privilege is not available in {{serverless-full}}.
240240

explore-analyze/alerts-cases/alerts/alerting-getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ This section will clarify some of the important differences in the function and
114114

115115
Functionally, the {{alert-features}} differ in that:
116116

117-
* Scheduled checks are run on {{kib}} instead of {es}
117+
* Scheduled checks are run on {{kib}} instead of {{es}}
118118
* {{kib}} [rules hide the details of detecting conditions](../../../explore-analyze/alerts-cases/alerts/alerting-getting-started.md#alerting-concepts-conditions) through rule types, whereas watches provide low-level control over inputs, conditions, and transformations.
119119
* {{kib}} rules track and persist the state of each detected condition through alerts. This makes it possible to mute and throttle individual alerts, and detect changes in state such as resolution.
120120
* Actions are linked to alerts. Actions are fired for each occurrence of a detected condition, rather than for the entire rule.

explore-analyze/alerts-cases/cases/manage-cases.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Open a new case to keep track of issues and share their details with colleagues.
1616

1717
1. Go to **Management > {{stack-manage-app}} > Cases**, then click **Create case**.
1818
:::{image} ../../../images/kibana-cases-create.png
19-
:alt: Create a case in {stack-manage-app}
19+
:alt: Create a case in {{stack-manage-app}}
2020
:class: screenshot
2121
:::
2222

explore-analyze/find-and-organize/reports.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ For example, in **Discover**, you can create and download comma-separated values
1515
To view and manage reports, go to **Management** > **Reporting**.
1616

1717
:::{image} ../../images/serverless-reports-management.png
18-
:alt: {reports-app}
18+
:alt: {{reports-app}}
1919
:class: screenshot
2020
:::
2121

0 commit comments

Comments
 (0)