Skip to content

Commit 8895ccf

Browse files
committed
Fixes directives + other edits
1 parent ebc39c0 commit 8895ccf

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

get-started/introduction.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -20,28 +20,28 @@ Refer to the following table for a quick reference of which solution you may nee
2020
| Monitor data for anomalous activity, detect, prevent, and respond to security incidents | [{{elastic-sec}}](/solutions/security.md) | SOC teams, security analysts, IT security admins |
2121

2222
:::{tip}
23-
Check out our [customer success stories](https://www.elastic.co/customers/success-stories) to learn how various organizations are utilizing our products for their specific business needs.
23+
Check out our [customer success stories](https://www.elastic.co/customers/success-stories) to learn how various organizations utilize our products for their specific business needs.
2424
:::
2525

26-
Each of our solutions is available as a fully-managed {{serverless-short}} project or a self-managed deployment. Refer to [deployment options](../get-started/deployment-options.md) to learn about these options.
26+
Each of our solutions is available as a fully managed {{serverless-short}} project or a self-managed deployment. Refer to [deployment options](../get-started/deployment-options.md) to learn about these options.
2727

2828
## Elastic {{observability}}
2929

3030
### Overview [observability-overview]
3131

32-
Elastic {{observability}} provides unified observability across applications and infrastructure. It brings together logs, metrics, application traces, user experience data, and more into a single, integrated platform. This consolidation allows for powerful, cross-referenced analysis, enabling teams to move from detecting issues to understanding their root causes with speed and efficiency. By leveraging the search and analytics capabilities of {{es}}, it offers a holistic view of system behavior.
32+
Elastic {{observability}} provides unified observability across applications and infrastructure. It combines logs, metrics, application traces, user experience data, and more into a single, integrated platform. This consolidation allows for powerful, cross-referenced analysis, enabling teams to move from detecting issues to understanding their root causes with speed and efficiency. By leveraging the search and analytics capabilities of {{es}}, it offers a holistic view of system behavior.
3333

3434
Elastic {{observability}} embraces open standards like OpenTelemetry for flexible data collection, and offers scalable, cost-efficient data retention with tiered storage.
3535

3636
### {{observability}} use cases [observability-use-cases]
3737

38-
Apply Elastic {{observability}} to a wide range of scenarios to improve operational awareness and system reliability.
38+
Apply Elastic {{observability}} to various scenarios to improve operational awareness and system reliability.
3939
:::{dropdown} Use cases
4040
* **Log Monitoring and Analytics:** Centralize and analyze petabytes of log data from any source. This enables quick searching, ad-hoc queries with ES|QL, and visualization with prebuilt dashboards to diagnose issues.
4141
* **Application Performance Monitoring (APM):** Gain code-level visibility into application performance. By collecting and analyzing traces with native OTel support, teams can identify bottlenecks, track errors, and optimize the end-user experience.
4242
* **Infrastructure Monitoring:** Monitor metrics from servers, virtual machines, containers, and serverless environments with over 400 out-of-the-box integrations, including OpenTelemetry. This provides deep insights into resource utilization and overall system health.
4343
* **Digital Experience Monitoring:**
44-
* **Real User Monitoring (RUM):** Capture and analyze data on how real users are interacting with web applications to improve perceived performance.
44+
* **Real User Monitoring (RUM):** Capture and analyze data on how real users interact with web applications to improve perceived performance.
4545
* **Synthetic Monitoring:** Proactively simulate user journeys and API calls to test application availability and functionality.
4646
* **Uptime Monitoring:** Continuously check the status of services and applications to ensure they are available.
4747
* **Universal Profiling:** Gain visibility into system performance and identify expensive lines of code without application instrumentation, helping to increase CPU efficiency and reduce cloud spend.
@@ -60,28 +60,28 @@ At the heart of Elastic {{observability}} are several key concepts that enable i
6060
* OpenTelemetry: Elastic Observability offers first-class, production-grade support for OpenTelemetry. This allows organizations to use vendor-neutral instrumentation and stream native OTel data without proprietary agents, leveraging the Elastic Distribution of OpenTelemetry (EDOT).
6161
* AIOps and AI Assistant: Leverages predictive analytics and an LLM-powered AI Assistant to reduce the time required to detect, investigate, and resolve incidents. This includes zero-config anomaly detection, pattern analysis, and the ability to surface correlations and root causes.
6262
* Alerting and Cases: A built-in feature for creating rules to detect complex conditions and trigger actions. It allows teams to stay aware of potential issues and use Cases to track investigation details, assign tasks, and collaborate on resolutions.
63-
* Service Level Objectives (SLOs): A framework for defining and monitoring the reliability of a service. Elastic Observability allows for the creation and tracking of SLOs to ensure that performance targets are being met.
63+
* Service Level Objectives (SLOs): A framework for defining and monitoring the reliability of a service. Elastic Observability allows for creating and tracking SLOs to ensure that performance targets are being met.
6464
:::
6565

6666
## {{elastic-sec}}
6767

6868
### Overview
6969

70-
{{elastic-sec}} is a unified security solution that integrates SIEM (Security Information and Event Management), endpoint security, and cloud security into a single platform so you can detect, prevent, and respond to cyber threats across your entire environment in near real time. Elastic Security leverages {{es}} powerful platform for its searching and analytic capabilities, and {{kib}} for its visualization features. By combining prevention, detection, and response capabilities, {{elastic-sec}} helps your organization reduce the risk of successful attacks.
70+
{{elastic-sec}} is a unified security solution that integrates SIEM (Security Information and Event Management), endpoint security, and cloud security into a single platform so you can detect, prevent, and respond to cyber threats across your entire environment in near real time. Elastic Security leverages {{es}}'s powerful platform for its searching and analytic capabilities, and {{kib}} for its visualization features. By combining prevention, detection, and response capabilities, {{elastic-sec}} helps your organization reduce the risk of successful attacks.
7171

72-
Install {{elastic-sec}} on one of our Elastic-managed Cloud deployments or on your own self-managed infrastructure.
72+
Install {{elastic-sec}} on one of our Elastic-managed Cloud deployments or your own self-managed infrastructure.
7373

7474
### {{elastic-sec}} use cases
7575

76-
Use {{elastic-sec}} for a wide variety of security needs to ensure your systems are protected from the latest threats.
76+
Use {{elastic-sec}} for numerous security needs to ensure your systems are protected from the latest threats.
7777

7878
:::{dropdown} Use cases
79-
* **SIEM:** {{elastic-sec}} acts as a modern SIEM that provides a centralized platform for ingesting, analyzing, and managing security data from various sources.
79+
* **SIEM:** {{elastic-sec}} is a modern SIEM that provides a centralized platform for ingesting, analyzing, and managing security data from various sources.
8080
* **Third-party integration support:** Ingest data from a variety of tools and data sources so you can centralize your security data.
8181
* **Threat detection and analytics:** Identify unknown threats by enabling prebuilt or custom detection rules, automatically detect anomalous activity with built-in machine learning jobs, or proactively search for threats using our powerful threat hunting and interactive visualization tools.
8282
* **Automatic migration:** Migrate SIEM rules from other platforms to {{elastic-sec}}.
8383
* **Endpoint protection and threat prevention:** Automatically stop cybersecurity attacks—such as malware and ransomware—before damage and loss can occur.
84-
* **AI-powered features:** Elastic Security leverages generative AI to help enhance threat detection, assist with incident response, and day-to-day security operations. For example, the AI Assistant can summarize alerts, identify relevant information, suggest investigation steps, and even generate complex queries from natural language input.
84+
* **AI-powered features:** Elastic Security leverages generative AI to help enhance threat detection, assist with incident response, and day-to-day security operations. For example, the AI Assistant can summarize alerts, identify relevant information, suggest investigation steps, and generate complex queries from natural language input.
8585
* **Custom dashboards and visualizations:** Create custom dashboards and visualizations to gain insights into security events.
8686
* **Cloud Security:** {{elastic-sec}} provides the following cloud features:
8787
* **Cloud Security Posture Management (CSPM) and Kubernetes Security Posture Management (KSPM):** Check cloud service configurations against security benchmarks to identify and resolve misconfigurations that can be exploited.
@@ -95,16 +95,16 @@ Before diving into setup and configuration, familiarize yourself with the founda
9595

9696
:::{dropdown} Concepts
9797

98-
* {{agent}}: A single, unified way to add monitoring for logs, metrics, and other types of data to a host. Elastic Agent can also protect hosts from security threats, query data from operating systems, forward data from remote services or hardware.
98+
* {{agent}}: A single, unified way to add monitoring for logs, metrics, and other types of data to a host. Elastic Agent can also protect hosts from security threats, query data from operating systems, and forward data from remote services or hardware.
9999
* {{elastic-defend}}: {{elastic-sec}}'s Endpoint Detection and Response (EDR) tool that protects endpoints from malicious activity. {{elastic-defend}} uses a combination of techniques like machine learning, behavioral analysis, and prebuilt rules to detect, prevent, and respond to threats in real-time.
100100
* {{elastic-endpoint}}: The installed component that performs {{elastic-defend}}'s threat monitoring and prevention capabilities.
101101
* Detection engine: The framework that detects threats by using rules to search for suspicious events in data sources and generating alerts when those rules meet the defined criteria.
102-
* Detection rules: Sets of conditions that identify potential threats and malicious activities. Rules analyze various data sources, including logs and network traffic, to detect anomalies, suspicious behaviors, or known attack patterns. {{elastic-sec}} ships out-the-box prebuilt rules, or you can create your own custom rules.
103-
* Alerts: A notification that's generated when a rule’s criteria is met. You can then investigate an alert to dive into deeper details.
102+
* Detection rules: Sets of conditions that identify potential threats and malicious activities. Rules analyze various data sources, including logs and network traffic, to detect anomalies, suspicious behaviors, or known attack patterns. {{elastic-sec}} ships out-of-the-box prebuilt rules, or you can create your own custom rules.
103+
* Alerts: A notification that's generated when a rule’s criteria are met. You can then investigate an alert to dive into deeper details.
104104
* Machine learning and anomaly detection: Anomaly detection jobs identify anomalous events or patterns in your data. Use these with machine learning detection rules to generate alerts when behavior deviates from normal activity.
105105
* Entity analytics: A threat detection feature that combines the power of Elastic’s detection engine and machine learning capabilities to identify unusual user behaviors across hosts, users, and services. Entity analytics uses a risk scoring engine to calculate a risk score, which is evaluated at a recurring interval.
106-
* Cases: A tool that allows you to collect and share information about security issues. Opening a case allows you to track key investigation details and collect alerts in a central location. You can also send cases to external systems.
107-
* Timeline: A threat hunting tool that allows you to investigate security events so you can gather and analyze data related to alerts or suspicious activity. You can add events to Timeline from various sources, build custom queries, and even import/export a Timeline to collaborate and share.
106+
* Cases: A tool that allows you to collect and share information about security issues. Opening a case lets you track key investigation details and collect alerts in a central location. You can also send cases to external systems.
107+
* Timeline: A threat hunting tool that allows you to investigate security events so you can gather and analyze data related to alerts or suspicious activity. You can add events to Timeline from various sources, build custom queries, and import/export a Timeline to collaborate and share.
108108
* Security posture management: Includes two Cloud Security features–Cloud Security Posture Management (CSPM) and Kubernetes Security Posture Management (KSPM)--that help you evaluate the services and resources in your cloud environment, such as storage, compute, IAM, and more — against security guidelines defined by the Center for Internet Security (CIS). These features help you identify and remediate configuration risks in your environment.
109109
* AI Assistant: A generative AI-powered tool that helps with tasks like alert investigation, incident response, and query generation. It utilizes natural language processing and knowledge retrieval to provide context-aware assistance, summarize threats, suggest next steps, and automate workflows. Use AI Assistant to better understand and respond to security incidents.
110110
:::
@@ -119,33 +119,33 @@ Before diving into setup and configuration, familiarize yourself with the founda
119119
Use {{es}} for a wide range of business needs.
120120

121121
:::{dropdown} Use cases
122-
* **Full-text search:** Quickly find specific words or phrases within large volumes of text-based data, such as documents, articles, or product descriptions. Documents and search queries are transformed to enable returning relevant results instead of exact term matches.
123-
* **Semantic search:** Go beyond keyword matching to understand the user's intent. This helps your search engine to recognize what users mean, not just what they type, by understanding synonyms and related concepts.
122+
* **Full-text search:** Find specific words or phrases within large volumes of text-based data, such as documents, articles, or product descriptions. Documents and search queries are transformed to enable returning relevant results instead of exact term matches.
123+
* **Semantic search:** Go beyond keyword matching to understand the user's intent. Understanding synonyms and related concepts helps your search engine recognize what users mean, not just what they type.
124124
* **Hybrid search:** Get the best of both worlds by combining traditional keyword search with modern, meaning-based vector search. This ensures your users get the most accurate and relevant results every time.
125-
* **Vector database:** Search for data based on its meaning and context, not just keywords. This allows you to find similar items, like pictures that have the same style or songs with a similar vibe, by understanding the underlying concepts.
126-
* **Retrieval Augmented Generation (RAG):** Connect your generative AI applications (like chatbots) to your own private data. This allows your AI to provide more accurate, up-to-date, and relevant answers based on your proprietary information.
127-
* **Geospatial search:** Build location-aware features into your applications. This allows you to do things like find all available services within a certain radius, calculate the distance between two points, or identify which delivery routes are most efficient.
125+
* **Vector database:** Search for data based on its meaning and context, not just keywords. Understanding the underlying concepts allows you to find similar items, like pictures with the same style or songs with a similar vibe.
126+
* **Retrieval Augmented Generation (RAG):** Connect your generative AI applications (like chatbots) to your private data. This allows your AI to provide more accurate, up-to-date, and relevant answers based on your proprietary information.
127+
* **Geospatial search:** Build location-aware features into your applications. This allows you to do things like find all available services within a certain radius, calculate the distance between two points, or identify the most efficient delivery routes.
128128
:::
129129

130130
### {{es}} core concepts [search-concepts]
131131
Before you decide what type of search to use with {{es}} or bring in your data, familiarize yourself with the following {{es}} concepts.
132132

133-
:::{dropdown} Concepts
133+
::::{dropdown} Concepts
134134

135135
* **Index:** A collection of documents with similar characteristics that are uniquely identified by a name or an alias. The name is used to target the index in search queries and other operations.
136136
**Field:** The smallest individual unit of data within a document. It represents a specific property or attribute of the data you're indexing (for example, title, author, date, summary, etc.). Fields are critical for indexing, as they determine how data is analyzed and stored to enable efficient searching.
137137
* **Document:** Any structured data encoded in JSON. {{es}} organizes and stores data into documents.
138-
* **Primary shard:** A self-contained Lucene index that contains some or all data for an index. Shards allow {{es}} to horizontally scale by splitting an index's data into smaller, manageable partitions, therefore improving performance. Each document in an index belongs to one primary shard.
138+
* **Primary shard:** A self-contained Lucene index that contains some or all data for an index. Shards allow {{es}} to scale horizontally by splitting an index's data into smaller, manageable partitions, improving performance. Each document in an index belongs to one primary shard.
139139
* **Replica:** A copy of a primary shard. Replicas maintain redundant copies of your data across the nodes in your cluster. This protects against hardware failure and increases capacity to serve read requests like searching or retrieving a document.
140140
* **Node:** A single running instance of the {{es}} server.
141141
* **Cluster:** A collection of one or more nodes that holds all your data and provides indexing and search capabilities across all nodes. {{es}} clusters feature primary and replica shards to provide failover in the case of a node going down. When a primary shard goes down, the replica takes its place.
142142
:::{note}
143-
If you're running {{es}} on a serverless deployment, you don't have to worry a bout shards, nodes or clusters. Elastic manages these for you.
143+
If you're running {{es}} on a serverless deployment, you don't have to worry a bout shards, nodes, or clusters. Elastic manages these for you.
144144
:::
145-
* **Mapping:** The process that defines how a document and the fields it contains are stored and indexed.
146-
* **Client:** Software or an application designed to facilitate communication and interaction with an {{es}} cluster. It enables applications written in various programming languages to send requests to {{es}}, process the response, then push that data into the cluster.
145+
* **Mapping:** The process that defines how a document and its fields are stored and indexed.
146+
* **Client:** Software or an application that facilitates communication and interaction with an {{es}} cluster. It enables applications written in various programming languages to send requests to {{es}}, process the response, and then push that data into the cluster.
147147

148-
:::
148+
::::
149149

150150
<!--TBD: Call out how solutions map to Serverless project types? -->
151151
<!-- Content moved from the-stack.md

0 commit comments

Comments
 (0)