Skip to content

Commit 57bb1a4

Browse files
authored
Merge branch 'main' into update-ai-functions
2 parents 4fd9e07 + e0fbf2c commit 57bb1a4

File tree

45 files changed

+1039
-741
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+1039
-741
lines changed

deploy-manage/cloud-organization/billing/billing-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ $$$faq-included$$$What is included in my paid {{ech}} deployment?
9999

100100
* Free 1GB RAM {{kib}} instance
101101
* Free 1GB RAM Machine Learning node
102-
* Free 1GB RAM APM server
102+
* Free 1GB RAM APM / Integrations Server instance
103103
* A free allowance for [data transfer and snapshot storage costs](#faq-dts)
104104

105105
Note that if you go above the free tier of Kibana/ML/APM (for example, a 2GB {{kib}} instance), you will be charged in full for the size of that instance.

deploy-manage/deploy/cloud-enterprise/edit-stack-settings-apm.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
navigation_title: APM user settings
33
mapped_pages:
44
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-manage-apm-settings.html
5+
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-apm-settings.html
56
applies_to:
67
deployment:
78
ece: all

deploy-manage/deploy/elastic-cloud/differences-from-other-elasticsearch-offerings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ This table compares Observability capabilities between {{ech}} deployments and S
109109
| **APM integration** ||| Use **Managed Intake Service** (supports Elastic APM and OTLP protocols) |
110110
| [**APM Agent Central Configuration**](/solutions/observability/apm/apm-agent-central-configuration.md) ||| Not available in Serverless |
111111
| [**APM Tail-based sampling**](/solutions/observability/apm/transaction-sampling.md#apm-tail-based-sampling) ||| - Not available in Serverless <br>- Consider **OpenTelemetry** tail sampling processor as an alternative |
112-
| [**Android agent/SDK instrumentation**](apm-agent-android://reference/index.md) ||| Not available in Serverless |
112+
| [**Android agent/SDK instrumentation**](opentelemetry://reference/edot-sdks/android/index.md) ||| Not available in Serverless |
113113
| [**AWS Firehose integration**](/solutions/observability/cloud/monitor-amazon-web-services-aws-with-amazon-data-firehose.md) ||| |
114114
| **Custom roles for Kibana Spaces** || **Planned** | Anticipated in a future release |
115115
| [**Data stream lifecycle**](/manage-data/lifecycle/data-stream.md) ||| Primary lifecycle management method in Serverless |
@@ -118,7 +118,7 @@ This table compares Observability capabilities between {{ech}} deployments and S
118118
| **[Fleet Agent policies](/reference/fleet/agent-policy.md)** ||| |
119119
| **[Fleet server](/reference/fleet/fleet-server.md)** | - Self-hosted <br>- Hosted || Fully managed by Elastic |
120120
| [**Index lifecycle management**](/manage-data/lifecycle/index-lifecycle-management.md) ||| Use [**Data stream lifecycle**](/manage-data/lifecycle/data-stream.md) instead |
121-
| **[iOS agent/SDK instrumentation](apm-agent-ios://reference/index.md)** ||| Not available in Serverless |
121+
| **[iOS agent/SDK instrumentation](opentelemetry://reference/edot-sdks/ios/index.md)** ||| Not available in Serverless |
122122
| **[Kibana Alerts](/deploy-manage/monitor/monitoring-data/configure-stack-monitoring-alerts.md)** ||| |
123123
| **[LogsDB index mode](/manage-data/data-store/data-streams/logs-data-stream.md)** ||| - Reduces storage footprint <br> - Enabled by default <br>- Cannot be disabled |
124124
| **[Logs management](/solutions/observability/logs.md)** ||| |

deploy-manage/deploy/elastic-cloud/restrictions-known-problems.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Watcher encryption Key Setup is not supported.
8181

8282
Changing the default throttle period is not possible. You can specify a throttle period per watch, however.
8383

84-
Watcher comes preconfigured with a directly usable email account provided by Elastic. However, this account can’t be reconfigured and is subject to some limitations. For more information on the limits of the Elastic mail server, check the [cloud email service limits](../../../explore-analyze/alerts-cases/watcher/enable-watcher.md#cloud-email-service-limits)
84+
Watcher comes preconfigured with a directly usable email account provided by Elastic. However, this account can’t be reconfigured and is subject to some limitations. For more information on the limits of the Elastic mail server, check the [cloud email service limits](/deploy-manage/deploy/elastic-cloud/tools-apis.md#email-service-limits).
8585

8686
Alternatively, a custom mail server can be configured as described in [Configuring a custom mail server](../../../explore-analyze/alerts-cases/watcher/enable-watcher.md#watcher-custom-mail-server)
8787

deploy-manage/deploy/elastic-cloud/tools-apis.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,3 +104,16 @@ serverless: unavailable
104104

105105
:::{include} /deploy-manage/deploy/_snippets/tpec.md
106106
:::
107+
108+
## Elastic Cloud email service
109+
110+
{{ecloud}} provides a built-in email service used by the preconfigured [email connector](kibana://reference/connectors-kibana/email-action-type.md), available in both {{ech}} deployments and {{serverless-full}} projects. This service can be used to send [alert](/explore-analyze/alerts-cases/alerts.md) notifications and is also supported in {{ech}} by [Watcher](/explore-analyze/alerts-cases/watcher/enable-watcher.md).
111+
112+
### Email service limits
113+
114+
The following quotas apply to both {{ech}} deployments and {{serverless-full}} projects when using the Elastic email service:
115+
116+
* Email sending quota: 500 emails per 15 minute period.
117+
* Maximum number of recipients per message: 30 recipients per email (To, CC, and BCC all count as recipients).
118+
* Maximum message size (including attachments): 10 MB per message (after Base64 encoding).
119+
* The email-sender can't be customized (Any custom `From:` header will be removed).

deploy-manage/tools/snapshot-and-restore/s3-repository.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -380,12 +380,16 @@ There are a number of storage systems that provide an S3-compatible API, and the
380380

381381
By default {{es}} communicates with your storage system using HTTPS, and validates the repository’s certificate chain using the JVM-wide truststore. Ensure that the JVM-wide truststore includes an entry for your repository. If you wish to use unsecured HTTP communication instead of HTTPS, set `s3.client.CLIENT_NAME.protocol` to `http`.
382382

383-
[MinIO](https://minio.io) is an example of a storage system that provides an S3-compatible API. The `s3` repository type allows {{es}} to work with MinIO-backed repositories as well as repositories stored on AWS S3. Other S3-compatible storage systems may also work with {{es}}, but these are not covered by the {{es}} test suite.
384-
385383
There are many systems, including some from very well-known storage vendors, which claim to offer an S3-compatible API despite failing to emulate S3’s behavior in full. If you are using such a system for your snapshots, consider using a [shared filesystem repository](shared-file-system-repository.md) based on a standardized protocol such as NFS to access your storage system instead. The `s3` repository type requires full compatibility with S3. In particular it must support the same set of API endpoints, with the same parameters, return the same errors in case of failures, and offer consistency and performance at least as good as S3 even when accessed concurrently by multiple nodes. You will need to work with the supplier of your storage system to address any incompatibilities you encounter. Don't report {{es}} issues involving storage systems which claim to be S3-compatible unless you can demonstrate that the same issue exists when using a genuine AWS S3 repository.
386384

387385
You can perform some basic checks of the suitability of your storage system using the [repository analysis API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-snapshot-repository-analyze). If this API does not complete successfully, or indicates poor performance, then your storage system is not fully compatible with AWS S3 and therefore unsuitable for use as a snapshot repository. However, these checks do not guarantee full compatibility.
388386

387+
::::{admonition} Using MinIO with {{es}}
388+
[MinIO](https://minio.io) is an example of a storage system that provides an S3-compatible API. The `s3` repository type allows {{es}} to work with MinIO-backed repositories as well as repositories stored on AWS S3. The {{es}} test suite includes some checks which aim to detect deviations in behavior between MinIO and AWS S3. Elastic will report directly to the MinIO project any deviations in behavior found by these checks. If you are running a version of MinIO whose behavior deviates from that of AWS S3 then you must upgrade your MinIO installation. If in doubt, please contact the MinIO support team for further information.
389+
390+
The performance, reliability, and durability of a MinIO-backed repository depend on the properties of the underlying infrastructure and on the details of your MinIO configuration. You must design your storage infrastructure and configure MinIO in a way that ensures your MinIO-backed repository has performance, reliability, and durability characteristics which match AWS S3 in order for it to be fully S3-compatible. If you need assistance with your MinIO configuration, please contact the MinIO support team.
391+
::::
392+
389393
Most storage systems can be configured to log the details of their interaction with {{es}}. If you are investigating a suspected incompatibility with AWS S3, it is usually simplest to collect these logs and provide them to the supplier of your storage system for further analysis. If the incompatibility is not clear from the logs emitted by the storage system, configure {{es}} to log every request it makes to the S3 API by [setting the logging level](/deploy-manage/monitor/logging-configuration/update-elasticsearch-logging-levels.md) of the `com.amazonaws.request` logger to `DEBUG`.
390394

391395
To prevent leaking sensitive information such as credentials and keys in logs, {{es}} rejects configuring this logger at high verbosity unless [insecure network trace logging](elasticsearch://reference/elasticsearch/configuration-reference/networking-settings.md#http-rest-request-tracer) is enabled. To do so, you must explicitly enable it on each node by setting the system property `es.insecure_network_trace_enabled` to `true`.

deploy-manage/users-roles/cluster-or-deployment-auth/saml.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
navigation_title: SAML
33
mapped_pages:
44
- https://www.elastic.co/guide/en/elasticsearch/reference/current/saml-realm.html
5+
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-sign-outgoing-saml-message.html
56
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece_sign_outgoing_saml_message.html
67
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece_optional_settings.html
78
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-securing-clusters-SAML.html
@@ -36,7 +37,7 @@ Because this feature is designed with {{kib}} in mind, most sections of this gui
3637

3738
The SAML support in {{kib}} is designed with the expectation that it will be the primary (or sole) authentication method for users of that {{kib}} instance. After you enable SAML authentication in {{kib}}, it will affect all users who try to login. The [Configuring {{kib}}](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md#saml-configure-kibana) section provides more detail about how this works.
3839

39-
For a detailed walk-through of how to implement SAML authentication for {{kib}} with Microsoft Entra ID as an identity provider, refer to our guide [Set up SAML with Microsoft Entra ID](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md).
40+
For a detailed walk-through of how to implement SAML authentication for {{kib}} with Microsoft Entra ID as an identity provider, refer to our guide [Set up SAML with Microsoft Entra ID](/deploy-manage/users-roles/cluster-or-deployment-auth/saml-entra.md).
4041

4142
To configure SAML, you need to perform the following steps:
4243

@@ -158,7 +159,7 @@ idp.metadata.path
158159
:::{tip}
159160
If you want to pass a file path, then review the following:
160161
* File path settings are resolved relative to the {{es}} config directory. {{es}} will automatically monitor this file for changes and will reload the configuration whenever it is updated.
161-
* If you're using {{ece}} or {{ech}}, then you must upload the file [as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced.
162+
* If you're using {{ech}} or {{ece}}, then you must upload the file before it can be referenced. For {{ech}}, upload the file [as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md). For {{ece}}, follow the equivalent [ECE procedure](/deploy-manage/deploy/cloud-enterprise/add-custom-bundles-plugins.md).
162163
* If you're using {{eck}}, then install the file as [custom configuration files](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md#use-a-volume-and-volume-mount-together-with-a-configmap-or-secret).
163164
:::
164165

@@ -416,11 +417,11 @@ Encryption certificates can be generated with the same process.
416417

417418
### Sign outgoing SAML messages [_configuring_es_for_signing]
418419

419-
By default, {{es}} will sign *all* outgoing SAML messages if a signing key has been configured.
420+
By default, {{es}} will sign *all* outgoing SAML messages if a signing certificate and key has been configured.
420421

421422
:::{tip}
422423
* In self-managed clusters, file path settings is resolved relative to the {{es}} config directory. {{es}} will automatically monitor this file for changes and will reload the configuration whenever it is updated.
423-
* If you're using {{ece}} or {{ech}}, then you must upload any certificate or keystore files [as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. You can add this file to your existing SAML bundle.
424+
* If you're using {{ech}} or {{ece}}, then you must upload any certificate or keystore files before they can be referenced in the configuration. For {{ech}}, upload them [as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md). For {{ece}}, follow the equivalent [ECE procedure](/deploy-manage/deploy/cloud-enterprise/add-custom-bundles-plugins.md). In both cases, you can add the files to your existing SAML bundle.
424425
* If you're using {{eck}}, then install the files as [custom configuration files](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md#use-a-volume-and-volume-mount-together-with-a-configmap-or-secret).
425426
:::
426427

@@ -484,7 +485,7 @@ If an `Assertion` contains both encrypted and plain-text attributes, then failur
484485

485486
:::{tip}
486487
* In self-managed clusters, file path settings is resolved relative to the {{es}} config directory. {{es}} will automatically monitor this file for changes and will reload the configuration whenever it is updated.
487-
* If you're using {{ece}} or {{ech}}, then you must upload any certificate or keystore files [as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. You can add this file to your existing SAML bundle.
488+
* If you're using {{ech}} or {{ece}}, then you must upload any certificate or keystore files before they can be referenced in the configuration. For {{ech}}, upload them [as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md). For {{ece}}, follow the equivalent [ECE procedure](/deploy-manage/deploy/cloud-enterprise/add-custom-bundles-plugins.md). In both cases, you can add the files to your existing SAML bundle.
488489
* If you're using {{eck}}, then install the files as [custom configuration files](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md#use-a-volume-and-volume-mount-together-with-a-configmap-or-secret).
489490
:::
490491

docset.yml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,8 @@ exclude:
99
- 'raw-migrated-files/**'
1010

1111
cross_links:
12-
- apm-agent-android
1312
- apm-agent-dotnet
1413
- apm-agent-go
15-
- apm-agent-ios
1614
- apm-agent-java
1715
- apm-agent-nodejs
1816
- apm-agent-php
@@ -39,6 +37,11 @@ cross_links:
3937
- ecs-logging-ruby
4038
- eland
4139
- elastic-serverless-forwarder
40+
- elastic-otel-dotnet
41+
- elastic-otel-java
42+
- elastic-otel-node
43+
- elastic-otel-php
44+
- elastic-otel-python
4245
- elasticsearch
4346
- elasticsearch-hadoop
4447
- elasticsearch-java
@@ -80,6 +83,8 @@ subs:
8083
ece: "Elastic Cloud Enterprise"
8184
eck: "Elastic Cloud on Kubernetes"
8285
edot: "Elastic Distribution of OpenTelemetry"
86+
motlp: "Elastic Cloud Managed OTLP Endpoint"
87+
edot-cf: "EDOT Cloud Forwarder"
8388
serverless-full: "Elastic Cloud Serverless"
8489
serverless-short: "Serverless"
8590
es-serverless: "Elasticsearch Serverless"

explore-analyze/alerts-cases/alerts/rule-action-variables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,7 @@ If the rule’s action frequency is not a summary of alerts, it passes the follo
187187
: The ID of the alert that scheduled the action.
188188

189189
`alert.uuid`
190-
: A universally unique identifier for the alert. While the alert is active, the UUID value remains unchanged each time the rule runs. [preview]
190+
: A universally unique identifier for the alert. While the alert is active, the UUID value remains unchanged each time the rule runs.
191191

192192
#### Context [defining-rules-actions-variable-context]
193193

explore-analyze/alerts-cases/watcher/enable-watcher.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,7 @@ For more information on sending alerts by email, check [Email action](../../../e
3737

3838
## Cloud email service limits [cloud-email-service-limits]
3939

40-
The following quotas apply when using the Elastic email service:
41-
42-
* Email sending quota: 500 emails per 15min period
43-
* Maximum number of recipients per message: 30 recipients per email (To, CC and BCC all count as recipients).
44-
* Maximum message size (including attachments): 10 MB per message (after base64 encoding).
45-
* The email-sender can’t be customized (Any custom `From:` header will be removed)
40+
Refer to [Email service limits](/deploy-manage/deploy/elastic-cloud/tools-apis.md#email-service-limits).
4641

4742
## Advanced usage [advanced_usage]
4843

0 commit comments

Comments
 (0)