Skip to content

Commit 5739fd5

Browse files
Merge branch 'detection-and-alerts-topics' of https://github.com/elastic/docs-content into detection-and-alerts-topics
2 parents 99ee278 + 4d7489e commit 5739fd5

29 files changed

+64
-81
lines changed

solutions/observability/cloud/gcp-dataflow-templates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You’ll start with installing the Elastic GCP integration to add pre-built dash
4040

4141
4. Click **Save integration**.
4242

43-
:::::{admonition}
43+
:::::{note}
4444
This tutorial assumes the Elastic cluster is already running. To continue, you’ll need your **Cloud ID** and an **API Key**.
4545

4646
To find the Cloud ID of your [deployment](https://cloud.elastic.co/deployments), go to the deployment’s **Overview** page.

solutions/observability/cloud/monitor-amazon-kinesis-data-streams.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To collect Kinesis data stream metrics from Amazon CloudWatch, you typically nee
2929
Expand the **quick guide** to learn how, or skip to the next section if your data is already in {{es}}.
3030

3131
:::::{dropdown} **Quick guide: Add data**
32-
::::{admonition}
32+
::::{note}
3333
1. In the Observability UI, find **Integrations** in the main menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
3434
2. In the query bar, search for and select the **Amazon Kinesis Data Stream** integration.
3535
3. Read the overview to make sure you understand integration requirements and other considerations.
@@ -48,7 +48,7 @@ Expand the **quick guide** to learn how, or skip to the next section if your dat
4848
7. Click **Save and continue**. This step takes a minute or two to complete. When it’s done, you’ll have an agent policy that contains an integration policy for the configuration you just specified. If an {{agent}} is already assigned to the policy, you’re done. Otherwise, you need to deploy an {{agent}}.
4949
8. To deploy an {{agent}}:
5050

51-
1. In the popup, click **Add {{agent}} to your hosts** to open the **Add agent*** flyout. If you accidentally close the popup or the flyout doesn’t open, go to ***{{fleet}} → Agents**, then click **Add agent** to access the flyout.
51+
1. In the popup, click **Add {{agent}} to your hosts** to open the **Add agent** flyout. If you accidentally close the popup or the flyout doesn’t open, go to **{{fleet}} → Agents**, then click **Add agent** to access the flyout.
5252
2. Follow the steps in the **Add agent** flyout to download, install, and enroll the {{agent}}.
5353

5454
9. When incoming data is confirmed—​after a minute or two—​click **View assets** to access the dashboards.

solutions/observability/cloud/monitor-amazon-simple-queue-service-sqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ To collect SQS metrics, you typically need to install the Elastic [Amazon SQS in
2525
Expand the **quick guide** to learn how, or skip to the next section if your data is already in {{es}}.
2626

2727
:::::{dropdown} **Quick guide: Add data**
28-
::::{admonition}
28+
::::{note}
2929
1. In the Observability UI, find **Integrations** in the main menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
3030
2. In the query bar, search for and select the **Amazon SQS** integration.
3131
3. Read the overview to make sure you understand integration requirements and other considerations.
@@ -44,7 +44,7 @@ Expand the **quick guide** to learn how, or skip to the next section if your dat
4444
7. Click **Save and continue**. This step takes a minute or two to complete. When it’s done, you’ll have an agent policy that contains an integration policy for the configuration you just specified. If an {{agent}} is already assigned to the policy, you’re done. Otherwise, you need to deploy an {{agent}}.
4545
8. To deploy an {{agent}}:
4646

47-
1. In the popup, click **Add {{agent}} to your hosts** to open the **Add agent*** flyout. If you accidentally close the popup or the flyout doesn’t open, go to ***{{fleet}} → Agents**, then click **Add agent** to access the flyout.
47+
1. In the popup, click **Add {{agent}} to your hosts** to open the **Add agent** flyout. If you accidentally close the popup or the flyout doesn’t open, go to **{{fleet}} → Agents**, then click **Add agent** to access the flyout.
4848
2. Follow the steps in the **Add agent** flyout to download, install, and enroll the {{agent}}.
4949

5050
9. When incoming data is confirmed—​after a minute or two—​click **View assets** to access the dashboards.

solutions/observability/cloud/monitor-amazon-simple-storage-service-s3.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ To collect S3 metrics, you typically need to install the Elastic [Amazon S3 inte
2828
Expand the **quick guide** to learn how, or skip to the next section if your data is already in {{es}}.
2929

3030
:::::{dropdown} **Quick guide: Add data**
31-
::::{admonition}
31+
::::{note}
3232
1. In the Observability UI, find **Integrations** in the main menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
3333
2. In the query bar, search for and select the **Amazon S3** integration.
3434
3. Read the overview to make sure you understand integration requirements and other considerations.
@@ -47,7 +47,7 @@ Expand the **quick guide** to learn how, or skip to the next section if your dat
4747
7. Click **Save and continue**. This step takes a minute or two to complete. When it’s done, you’ll have an agent policy that contains an integration policy for the configuration you just specified. If an {{agent}} is already assigned to the policy, you’re done. Otherwise, you need to deploy an {{agent}}.
4848
8. To deploy an {{agent}}:
4949

50-
1. In the popup, click **Add {{agent}} to your hosts** to open the **Add agent*** flyout. If you accidentally close the popup or the flyout doesn’t open, go to ***{{fleet}} → Agents**, then click **Add agent** to access the flyout.
50+
1. In the popup, click **Add {{agent}} to your hosts** to open the **Add agent** flyout. If you accidentally close the popup or the flyout doesn’t open, go to **{{fleet}} → Agents**, then click **Add agent** to access the flyout.
5151
2. Follow the steps in the **Add agent** flyout to download, install, and enroll the {{agent}}.
5252

5353
9. When incoming data is confirmed—​after a minute or two—​click **View assets** to access the dashboards.

solutions/observability/cloud/monitor-amazon-web-services-aws-with-elastic-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ In this step, you create an Amazon Simple Queue Service (SQS) queue and configur
4545

4646
You should already have an S3 bucket that contains exported VPC flow logs. If you don’t, create one now. To learn how, refer to [publishing flow logs to an S3 bucket](https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs-s3.md).
4747

48-
::::{admonition}
48+
::::{note}
4949
**Why is an SQS queue needed?**
5050

5151
Creating an SQS queue helps avoid significant lagging caused by polling all log files from each S3 bucket. Instead of polling each bucket, you configure the S3 buckets to send a notification to the SQS queue whenever a new object is created. The {{agent}} monitors the SQS queue for new object creation messages and uses information in the messages to retrieve logs from the S3 buckets. With this setup, periodic polling from each S3 bucket is not needed. Instead, the {{agent}} S3 input guarantees near real-time data collection from S3 buckets with both speed and reliability.
@@ -188,7 +188,7 @@ VPC flow logs are sent to an S3 bucket, which sends a notification to the SQS qu
188188

189189
## Step 4: Collect S3 access logs [aws-elastic-agent-collect-s3-access-logs]
190190

191-
::::{admonition}
191+
::::{note}
192192
S3 access logs contain detailed records for the requests that are made to a bucket. Server access logs are useful for many applications. For example, access log information can be useful in security and access audits. It can also help you learn about your customer base and understand your Amazon S3 bill.
193193

194194
::::

solutions/observability/cloud/monitor-microsoft-azure-openai.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ mapped_pages:
55

66
# Monitor Microsoft Azure OpenAI [monitor-azure-openai]
77

8-
::::{admonition}
8+
::::{note}
99
**New to Elastic?** Follow the steps in our [getting started guide](https://www.elastic.co/guide/en/starting-with-the-elasticsearch-platform-and-its-solutions/current/getting-started-observability.html) instead of the steps described here. Return to this tutorial after you’ve learned the basics.
1010

1111
::::

solutions/observability/cloud/monitor-microsoft-azure-with-azure-native-isv-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ mapped_pages:
55

66
# Monitor Microsoft Azure with the Azure Native ISV Service [monitor-azure-native]
77

8-
::::{admonition}
8+
::::{note}
99
The {{ecloud}} Azure Native ISV Service allows you to deploy managed instances of the {{stack}} directly in Azure, through the Azure integrated marketplace. The service includes native capabilities for consolidating Azure logs and metrics in Elastic. For more information, refer to [Azure Native ISV Service](../../../deploy-manage/deploy/elastic-cloud/azure-native-isv-service.md).
1010

1111
**Using {{agent}} to monitor Azure?** Refer to [Monitor Microsoft Azure with {{agent}}](monitor-microsoft-azure-with-elastic-agent.md).

solutions/observability/cloud/monitor-microsoft-azure-with-beats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ mapped_pages:
55

66
# Monitor Microsoft Azure with Beats [monitor-azure]
77

8-
::::{admonition}
8+
::::{note}
99
**Are you sure you want to use {{beats}}?**
1010

1111
{{agent}} is the recommended way to monitor Azure if you want to manage your agents centrally in {{fleet}}. To learn how to use {{agent}}, refer to [Monitor Microsoft Azure with {{agent}}](monitor-microsoft-azure-with-elastic-agent.md).

solutions/observability/cloud/monitor-microsoft-azure-with-elastic-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ mapped_pages:
55

66
# Monitor Microsoft Azure with Elastic Agent [monitor-azure-elastic-agent]
77

8-
::::{admonition}
8+
::::{note}
99
**New to Elastic?** Follow the steps in our [getting started guide](https://www.elastic.co/guide/en/starting-with-the-elasticsearch-platform-and-its-solutions/current/getting-started-observability.html) instead of the steps described here. Return to this tutorial after you’ve learned the basics.
1010

1111
**Using the native Azure integration from the marketplace?** Refer to [Monitor Microsoft Azure with the Azure Native ISV Service](monitor-microsoft-azure-with-azure-native-isv-service.md).
@@ -195,7 +195,7 @@ To create an Azure event hub:
195195
7. Click **Review + create**, and then click **Create** to deploy the resource.
196196
8. Make a note of the namespace and event hub name because you will need them later.
197197

198-
:::::{admonition}
198+
:::::{note}
199199
**When do I need more than one event hub?**
200200

201201
Typically you create an event hub for each service you want to monitor. For example, imagine that you want to collect activity logs from the Azure Monitor service plus signin and audit logs from the Active Directory service. Rather than sending all logs to a single event hub, you create an event hub for each service:

solutions/observability/get-started/create-an-observability-project.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,7 @@ mapped_pages:
99
# Create an observability project [observability-create-an-observability-project]
1010

1111

12-
::::{admonition} Required role
13-
:class: note
12+
::::{note}
1413

1514
The **Admin** role or higher is required to create projects. To learn more, refer to [Assign user roles and privileges](../../../deploy-manage/users-roles/cloud-organization/manage-users.md#general-assign-user-roles).
1615

0 commit comments

Comments
 (0)