You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/monitor/orchestrators/ece-monitoring-ece-set-retention.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ You might need to adjust the retention period for one of the following reasons:
20
20
To customize the retention period, set up a custom lifecycle policy for logs and metrics indices:
21
21
22
22
1.[Create a new index lifecycle management (ILM) policy](../../../manage-data/lifecycle/index-lifecycle-management/configure-lifecycle-policy.md) in the logging and metrics cluster.
23
-
2. Create a new, legacy-style, index template that matches the data view (formerly *index pattern*) that you want to customize the lifecycle for.
24
-
3. Specify a lifecycle policy in the index template settings.
25
-
4. Choose a higher `order` for the template so the specified lifecycle policy will be used instead of the default.
23
+
2. Create a new composable index template that matches the data view (formerly *index pattern*) for the data stream you want to customize the lifecycle for.
24
+
3. Specify a custom lifecycle policy in the index template settings.
25
+
4. Choose a higher `priority` for the template so the specified lifecycle policy will be used instead of the default.
Copy file name to clipboardExpand all lines: deploy-manage/tools/snapshot-and-restore/ece-restore-snapshots-into-new-deployment.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,10 @@ products:
16
16
1. First, [create a new deployment](../../deploy/cloud-enterprise/create-deployment.md) and select **Restore snapshot data**. Select the deployment that you want to restore a snapshot *from*. If you don’t know the exact name, you can enter a few characters and then select from the list of matching deployments.
17
17
2. Select the snapshot that you want to restore from. If none is chosen, the latest successful snapshot from the cluster you selected is restored on the new cluster when you create it.
18
18
19
+
:::{important}
20
+
Note that only snapshots from the `found-snapshots` repository are accepted. Snapshots from a custom repository are not allowed.
21
+
:::
22
+
19
23

20
24
21
25
3. Manually recreate users using the X-Pack security features or using Shield on the new cluster. User information is not included when you restore across clusters.
Copy file name to clipboardExpand all lines: manage-data/ingest/ingesting-data-from-applications/ingest-logs-from-nodejs-web-application-using-filebeat.md
Default {{ilm}} policies are created automatically when you install an [Elastic Integration](integration-docs://reference/index.md), or when you use {{agent}}, {{beats}}, or the {{ls}} {{es}} output plugin to send data to the {{stack}}.
Copy file name to clipboardExpand all lines: manage-data/lifecycle/index-lifecycle-management/configure-lifecycle-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -220,7 +220,7 @@ The name of the index must match the pattern defined in the index template and e
220
220
This step is required only when you're planning to use {{ilm-init}} with rolling indices. It is not required when you're using data streams, where the initial managed index is created automatically.
221
221
222
222
::::{important}
223
-
When you enable {{ilm}} for {{beats}}, {{agent}}, or for the {{agent}} or {{ls}} {{es}} output plugins, the necessary policies and configuration changes are applied automatically. If you'd like to create a specialized ILM policy for any data stream, refer to our tutorial [Customize built-in policies](/manage-data/lifecycle/index-lifecycle-management/tutorial-customize-built-in-policies.md).
223
+
When you enable {{ilm}} for {{beats}}, {{agent}}, or for the {{agent}} or {{ls}} {{es}} output plugins, the necessary policies and configuration changes are applied automatically. If you'd like to create a specialized ILM policy for any data stream, refer to our tutorial [](/manage-data/lifecycle/index-lifecycle-management/tutorial-customize-built-in-policies.md).
Copy file name to clipboardExpand all lines: manage-data/lifecycle/index-lifecycle-management/manage-lifecycle-integrations-data.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,5 +61,5 @@ For any data stream that you're interested in, you can [view its current lifecyc
61
61
62
62
After you've identified one or more data streams for which you'd like to customize how the data is managed over time, refer to our tutorials:
63
63
64
-
* For a general guide about configuring a custom ILM policy for any managed data stream, try out our [Customize built-in policies](/manage-data/lifecycle/index-lifecycle-management/tutorial-customize-built-in-policies.md) tutorial in the data lifecycle documentation.
64
+
* For steps to customize an {{ilm-init}} policy for a data stream, try out the [](/manage-data/lifecycle/index-lifecycle-management/tutorial-customize-built-in-policies.md) tutorial in the data lifecycle documentation.
65
65
* For the steps to customize an ILM policy for a set of data streams, such as all logs or metrics data streams across all namespaces, across only a selected namespace, and others, check the set of tutorials in [Customize data retention policies](/reference/fleet/data-streams-ilm-tutorial.md) in the {{fleet}} and {{agent}} reference documentation.
Copy file name to clipboardExpand all lines: manage-data/lifecycle/index-lifecycle-management/policy-view-status.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ If you're investigating an {{ilm-init}}-related problem, refer to [Troubleshoot
36
36
:::{tip}
37
37
{{es}} comes with many built-in ILM policies. For standard Observability or Security use cases, you will have two {{ilm-init}} policies configured automatically: `logs@lifecycle` for logs and `metrics@lifecycle` for metrics.
38
38
39
-
To learn how to create a specialized ILM policy for any data stream, such as those created when you install an Elastic Integration, refer to our tutorial [Customize built-in policies](/manage-data/lifecycle/index-lifecycle-management/tutorial-customize-built-in-policies.md).
39
+
To learn how to create and adjust copies of built-in {{ilm-init}} policies for managed data streams, such as those created when you install an Elastic Integration, refer to our tutorial [](/manage-data/lifecycle/index-lifecycle-management/tutorial-customize-built-in-policies.md).
40
40
:::
41
41
42
42
**To view the current lifecycle status for a datastream:**
Copy file name to clipboardExpand all lines: manage-data/lifecycle/index-lifecycle-management/tutorial-customize-built-in-policies.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,13 @@ products:
7
7
- id: elasticsearch
8
8
---
9
9
10
-
# Customize built-in policies
10
+
# Customize duplicates of built-in {{ilm-init}} policies
11
11
12
-
{{es}} includes a set of built-in {{ilm-init}} policies that govern how managed indices transition as they age. This guide demonstrates how you can customize the lifecycle of a managed index, to adjust how the index transitions across [data tiers](/manage-data/lifecycle/data-tiers.md) and what [actions](/manage-data/lifecycle/index-lifecycle-management/index-lifecycle.md#ilm-phase-actions), such as downsampling or shrinking, are performed on the index during each lifecycle phase.
12
+
{{es}} includes a set of built-in {{ilm-init}} policies that define how managed indices transition across [data tiers](/manage-data/lifecycle/data-tiers.md) and what [actions](/manage-data/lifecycle/index-lifecycle-management/index-lifecycle.md#ilm-phase-actions), such as rollover, downsampling, or shrinking, are performed at each phase.
13
13
14
-
Setting a custom {{ilm-init}} policy is useful when you have a specific set of indices, for example a set of Kubernetes logs which can grow to be quite large in volume, for which you don't want to use the default data retention duration and other {{ilm-init}} settings.
14
+
This tutorial demonstrates how to create a customized copy of a built-in {{ilm-init}} policy to better fit your data retention, performance, or storage requirements. You should never edit managed policies directly, because updates to {{es}} or Elastic integrations might overwrite those changes. Instead, you can duplicate a built-in policy, modify the duplicate, and assign it to your index or component templates.
15
15
16
-
[{{agent}}](/reference/fleet/index.md)uses the following set of built-in {{ilm-init}} policies to manage backing indices for its data streams:
16
+
While this tutorial uses [{{agent}}](/reference/fleet/index.md)and its built-in `logs@lifecycle` policy as an example, the same process can be applied to any built-in policies. Common examples include:
17
17
18
18
*`logs@lifecycle`
19
19
*`logs-otel@lifecycle`
@@ -23,11 +23,17 @@ Setting a custom {{ilm-init}} policy is useful when you have a specific set of i
23
23
*`traces@lifecycle`
24
24
*`traces-otel@lifecycle`
25
25
26
-
This tutorial covers customizing the way ingested logging data is managed. Rather than use the default lifecycle settings from the built-in `logs@lifecycle` {{ilm-init}} policy, you can use the **Index Lifecycle Policies** feature in {{kib}} to tailor a new policy based on your application’s specific performance, resilience, and retention requirements. This involves three main steps:
26
+
Customizing an {{ilm-init}} policy is useful when you have specific data retention or rollover requirements. For example, large log or metrics data streams might need different retention periods than the built-in defaults.
27
+
28
+
This tutorial covers customizing the way ingested logging data is managed. Rather than use the default lifecycle settings from the built-in `logs@lifecycle` {{ilm-init}} policy, you can use the **Index Lifecycle Policies** feature in {{kib}} to tailor a new policy based on your application’s specific performance, resilience, and retention requirements. You can adapt the same steps for any policy that manages your data streams.
29
+
30
+
The process involves three main steps:
27
31
1.[Create a duplicate of the `logs@lifecycle` policy](#example-using-index-lifecycle-policy-duplicate-ilm-policy).
28
32
2.[Modify the new policy to suit your requirements](#ilm-ex-modify-policy).
29
33
3.[Apply the new policy to your log data using a `logs@custom` component template](#example-using-index-lifecycle-policy-apply-policy).
30
34
35
+
Once applied, your customized policy will govern any new indices created after the change. Existing indices will continue to use their current lifecycle policy until they roll over. If you want the policy to take effect immediately, you can manually [roll over](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-indices-rollover) the data stream.
36
+
31
37
:::{tip}
32
38
* If you're using [Elastic integrations](https://docs.elastic.co/en/integrations) and are not yet familiar with which data streams are associated with them, refer to [Manage the lifecycle policy for integrations data](/manage-data/lifecycle/index-lifecycle-management/manage-lifecycle-integrations-data.md).
Copy file name to clipboardExpand all lines: reference/fleet/migrate-auditbeat-to-agent.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ The following table describes the integrations you can use instead of {{auditbea
34
34
| {{fleet}} [system](integration-docs://reference/system/index.md) integration | Collect login events for Windows through the [Security event log](integration-docs://reference/system/index.md#security). |
35
35
|[System.package](beats://reference/auditbeat/auditbeat-dataset-system-package.md) dataset |[System Audit](integration-docs://reference/system_audit/index.md) integration | This integration is a direct replacement of the System Package dataset. Starting in {{stack}} 8.7, you can port rules and configuration settings to this integration. This integration currently schedules collection of information such as:<br><br>*[rpm_packages](https://www.osquery.io/schema/5.1.0/#rpm_packages)<br>*[deb_packages](https://www.osquery.io/schema/5.1.0/#deb_packages)<br>*[homebrew_packages](https://www.osquery.io/schema/5.1.0/#homebrew_packages)<br> |
36
36
|[Osquery](integration-docs://reference/osquery/index.md) or [Osquery Manager](integration-docs://reference/osquery_manager/index.md) integration | Schedule collection of information like:<br><br>*[rpm_packages](https://www.osquery.io/schema/5.1.0/#rpm_packages)<br>*[deb_packages](https://www.osquery.io/schema/5.1.0/#deb_packages)<br>*[homebrew_packages](https://www.osquery.io/schema/5.1.0/#homebrew_packages)<br>*[apps](https://www.osquery.io/schema/5.1.0/#apps) (MacOS)<br>*[programs](https://www.osquery.io/schema/5.1.0/#programs) (Windows)<br>*[npm_packages](https://www.osquery.io/schema/5.1.0/#npm_packages)<br>*[atom_packages](https://www.osquery.io/schema/5.1.0/#atom_packages)<br>*[chocolatey_packages](https://www.osquery.io/schema/5.1.0/#chocolatey_packages)<br>*[portage_packages](https://www.osquery.io/schema/5.1.0/#portage_packages)<br>*[python_packages](https://www.osquery.io/schema/5.1.0/#python_packages)<br> |
37
-
|[System.process](beats://reference/auditbeat/auditbeat-dataset-system-process.md) dataset |[Endpoint](/solutions/security/configure-elastic-defend/install-elastic-defend.md)| Best replacement because out of the box it reports events forevery process in [ECS](integration-docs://reference/index.md) format and has excellentintegration in [Kibana](/get-started/the-stack.md). |
37
+
|[System.process](beats://reference/auditbeat/auditbeat-dataset-system-process.md) dataset |[Endpoint](/solutions/security/configure-elastic-defend/install-elastic-defend.md)| Best replacement because out of the box it reports events forevery process in [ECS](integration-docs://reference/index.md) format and has excellent integration in {{kib}}. |
38
38
|[Custom Windows event log](integration-docs://reference/winlog/index.md) and [Sysmon](integration-docs://reference/sysmon_linux/index.md) integrations | Provide process data. |
39
39
|[Osquery](integration-docs://reference/osquery/index.md) or[Osquery Manager](integration-docs://reference/osquery_manager/index.md) integration | Collect data from the [process](https://www.osquery.io/schema/5.1.0/#process) table on some OSeswithout polling. |
40
40
|[System.socket](beats://reference/auditbeat/auditbeat-dataset-system-socket.md) dataset |[Endpoint](/solutions/security/configure-elastic-defend/install-elastic-defend.md)| Best replacement because it supports monitoring network connections on Linux,Windows, and MacOS. Includes process and user metadata. Currently does notdo flow accounting (byte and packet counts) or domain name enrichment (but doescollect DNS queries separately). |
Copy file name to clipboardExpand all lines: solutions/observability/apm/apm-server/binary.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,8 @@ You’ll need:
21
21
***{{es}}** for storing and indexing data.
22
22
***{{kib}}** for visualizing with the Applications UI.
23
23
24
-
We recommend you use the same version of {{es}}, {{kib}}, and APM Server. See [Installing the {{stack}}](/get-started/the-stack.md) for more information about installing these products.
24
+
We recommend you use the same version of {{es}}, {{kib}}, and APM Server.
25
+
For more information about installing these products, refer to [](/deploy-manage/deploy.md).
@@ -30,7 +31,8 @@ We recommend you use the same version of {{es}}, {{kib}}, and APM Server. See [I
30
31
## Step 1: Install [apm-installing]
31
32
32
33
::::{note}
33
-
**Before you begin**: If you haven’t installed the {{stack}}, do that now. See [Learn how to install the {{stack}} on your own hardware](/get-started/the-stack.md).
34
+
**Before you begin**: If you haven’t installed the {{stack}}, do that now.
35
+
Refer to [](/deploy-manage/deploy.md).
34
36
::::
35
37
36
38
To download and install APM Server, use the commands below that work with your system. If you use `apt` or `yum`, you can [install APM Server from our repositories](#apm-setup-repositories) to update to the newest version more easily.
0 commit comments