You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: get-started/introduction.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,28 +20,28 @@ Refer to the following table for a quick reference of which solution you may nee
20
20
| Monitor data for anomalous activity, detect, prevent, and respond to security incidents |[{{elastic-sec}}](/solutions/security.md)| SOC teams, security analysts, IT security admins |
21
21
22
22
:::{tip}
23
-
Check out our [customer success stories](https://www.elastic.co/customers/success-stories) to learn how various organizations are utilizing our products for their specific business needs.
23
+
Check out our [customer success stories](https://www.elastic.co/customers/success-stories) to learn how various organizations utilize our products for their specific business needs.
24
24
:::
25
25
26
-
Each of our solutions is available as a fully-managed {{serverless-short}} project or a self-managed deployment. Refer to [deployment options](../get-started/deployment-options.md) to learn about these options.
26
+
Each of our solutions is available as a fullymanaged {{serverless-short}} project or a self-managed deployment. Refer to [deployment options](../get-started/deployment-options.md) to learn about these options.
27
27
28
28
## Elastic {{observability}}
29
29
30
30
### Overview [observability-overview]
31
31
32
-
Elastic {{observability}} provides unified observability across applications and infrastructure. It brings together logs, metrics, application traces, user experience data, and more into a single, integrated platform. This consolidation allows for powerful, cross-referenced analysis, enabling teams to move from detecting issues to understanding their root causes with speed and efficiency. By leveraging the search and analytics capabilities of {{es}}, it offers a holistic view of system behavior.
32
+
Elastic {{observability}} provides unified observability across applications and infrastructure. It combines logs, metrics, application traces, user experience data, and more into a single, integrated platform. This consolidation allows for powerful, cross-referenced analysis, enabling teams to move from detecting issues to understanding their root causes with speed and efficiency. By leveraging the search and analytics capabilities of {{es}}, it offers a holistic view of system behavior.
33
33
34
34
Elastic {{observability}} embraces open standards like OpenTelemetry for flexible data collection, and offers scalable, cost-efficient data retention with tiered storage.
35
35
36
36
### {{observability}} use cases [observability-use-cases]
37
37
38
-
Apply Elastic {{observability}} to a wide range of scenarios to improve operational awareness and system reliability.
38
+
Apply Elastic {{observability}} to various scenarios to improve operational awareness and system reliability.
39
39
:::{dropdown} Use cases
40
40
***Log Monitoring and Analytics:** Centralize and analyze petabytes of log data from any source. This enables quick searching, ad-hoc queries with ES|QL, and visualization with prebuilt dashboards to diagnose issues.
41
41
***Application Performance Monitoring (APM):** Gain code-level visibility into application performance. By collecting and analyzing traces with native OTel support, teams can identify bottlenecks, track errors, and optimize the end-user experience.
42
42
***Infrastructure Monitoring:** Monitor metrics from servers, virtual machines, containers, and serverless environments with over 400 out-of-the-box integrations, including OpenTelemetry. This provides deep insights into resource utilization and overall system health.
43
43
***Digital Experience Monitoring:**
44
-
***Real User Monitoring (RUM):** Capture and analyze data on how real users are interacting with web applications to improve perceived performance.
44
+
***Real User Monitoring (RUM):** Capture and analyze data on how real users interact with web applications to improve perceived performance.
45
45
***Synthetic Monitoring:** Proactively simulate user journeys and API calls to test application availability and functionality.
46
46
***Uptime Monitoring:** Continuously check the status of services and applications to ensure they are available.
47
47
***Universal Profiling:** Gain visibility into system performance and identify expensive lines of code without application instrumentation, helping to increase CPU efficiency and reduce cloud spend.
@@ -60,28 +60,28 @@ At the heart of Elastic {{observability}} are several key concepts that enable i
60
60
* OpenTelemetry: Elastic Observability offers first-class, production-grade support for OpenTelemetry. This allows organizations to use vendor-neutral instrumentation and stream native OTel data without proprietary agents, leveraging the Elastic Distribution of OpenTelemetry (EDOT).
61
61
* AIOps and AI Assistant: Leverages predictive analytics and an LLM-powered AI Assistant to reduce the time required to detect, investigate, and resolve incidents. This includes zero-config anomaly detection, pattern analysis, and the ability to surface correlations and root causes.
62
62
* Alerting and Cases: A built-in feature for creating rules to detect complex conditions and trigger actions. It allows teams to stay aware of potential issues and use Cases to track investigation details, assign tasks, and collaborate on resolutions.
63
-
* Service Level Objectives (SLOs): A framework for defining and monitoring the reliability of a service. Elastic Observability allows for the creation and tracking of SLOs to ensure that performance targets are being met.
63
+
* Service Level Objectives (SLOs): A framework for defining and monitoring the reliability of a service. Elastic Observability allows for creating and tracking SLOs to ensure that performance targets are being met.
64
64
:::
65
65
66
66
## {{elastic-sec}}
67
67
68
68
### Overview
69
69
70
-
{{elastic-sec}} is a unified security solution that integrates SIEM (Security Information and Event Management), endpoint security, and cloud security into a single platform so you can detect, prevent, and respond to cyber threats across your entire environment in near real time. Elastic Security leverages {{es}} powerful platform for its searching and analytic capabilities, and {{kib}} for its visualization features. By combining prevention, detection, and response capabilities, {{elastic-sec}} helps your organization reduce the risk of successful attacks.
70
+
{{elastic-sec}} is a unified security solution that integrates SIEM (Security Information and Event Management), endpoint security, and cloud security into a single platform so you can detect, prevent, and respond to cyber threats across your entire environment in near real time. Elastic Security leverages {{es}}'s powerful platform for its searching and analytic capabilities, and {{kib}} for its visualization features. By combining prevention, detection, and response capabilities, {{elastic-sec}} helps your organization reduce the risk of successful attacks.
71
71
72
-
Install {{elastic-sec}} on one of our Elastic-managed Cloud deployments or on your own self-managed infrastructure.
72
+
Install {{elastic-sec}} on one of our Elastic-managed Cloud deployments or your own self-managed infrastructure.
73
73
74
74
### {{elastic-sec}} use cases
75
75
76
-
Use {{elastic-sec}} for a wide variety of security needs to ensure your systems are protected from the latest threats.
76
+
Use {{elastic-sec}} for numerous security needs to ensure your systems are protected from the latest threats.
77
77
78
78
:::{dropdown} Use cases
79
-
***SIEM:** {{elastic-sec}} acts as a modern SIEM that provides a centralized platform for ingesting, analyzing, and managing security data from various sources.
79
+
***SIEM:** {{elastic-sec}} is a modern SIEM that provides a centralized platform for ingesting, analyzing, and managing security data from various sources.
80
80
***Third-party integration support:** Ingest data from a variety of tools and data sources so you can centralize your security data.
81
81
***Threat detection and analytics:** Identify unknown threats by enabling prebuilt or custom detection rules, automatically detect anomalous activity with built-in machine learning jobs, or proactively search for threats using our powerful threat hunting and interactive visualization tools.
82
82
***Automatic migration:** Migrate SIEM rules from other platforms to {{elastic-sec}}.
83
83
***Endpoint protection and threat prevention:** Automatically stop cybersecurity attacks—such as malware and ransomware—before damage and loss can occur.
84
-
***AI-powered features:** Elastic Security leverages generative AI to help enhance threat detection, assist with incident response, and day-to-day security operations. For example, the AI Assistant can summarize alerts, identify relevant information, suggest investigation steps, and even generate complex queries from natural language input.
84
+
***AI-powered features:** Elastic Security leverages generative AI to help enhance threat detection, assist with incident response, and day-to-day security operations. For example, the AI Assistant can summarize alerts, identify relevant information, suggest investigation steps, and generate complex queries from natural language input.
85
85
***Custom dashboards and visualizations:** Create custom dashboards and visualizations to gain insights into security events.
86
86
***Cloud Security:** {{elastic-sec}} provides the following cloud features:
87
87
***Cloud Security Posture Management (CSPM) and Kubernetes Security Posture Management (KSPM):** Check cloud service configurations against security benchmarks to identify and resolve misconfigurations that can be exploited.
@@ -95,16 +95,16 @@ Before diving into setup and configuration, familiarize yourself with the founda
95
95
96
96
:::{dropdown} Concepts
97
97
98
-
* {{agent}}: A single, unified way to add monitoring for logs, metrics, and other types of data to a host. Elastic Agent can also protect hosts from security threats, query data from operating systems, forward data from remote services or hardware.
98
+
* {{agent}}: A single, unified way to add monitoring for logs, metrics, and other types of data to a host. Elastic Agent can also protect hosts from security threats, query data from operating systems, and forward data from remote services or hardware.
99
99
* {{elastic-defend}}: {{elastic-sec}}'s Endpoint Detection and Response (EDR) tool that protects endpoints from malicious activity. {{elastic-defend}} uses a combination of techniques like machine learning, behavioral analysis, and prebuilt rules to detect, prevent, and respond to threats in real-time.
100
100
* {{elastic-endpoint}}: The installed component that performs {{elastic-defend}}'s threat monitoring and prevention capabilities.
101
101
* Detection engine: The framework that detects threats by using rules to search for suspicious events in data sources and generating alerts when those rules meet the defined criteria.
102
-
* Detection rules: Sets of conditions that identify potential threats and malicious activities. Rules analyze various data sources, including logs and network traffic, to detect anomalies, suspicious behaviors, or known attack patterns. {{elastic-sec}} ships out-the-box prebuilt rules, or you can create your own custom rules.
103
-
* Alerts: A notification that's generated when a rule’s criteria is met. You can then investigate an alert to dive into deeper details.
102
+
* Detection rules: Sets of conditions that identify potential threats and malicious activities. Rules analyze various data sources, including logs and network traffic, to detect anomalies, suspicious behaviors, or known attack patterns. {{elastic-sec}} ships out-of-the-box prebuilt rules, or you can create your own custom rules.
103
+
* Alerts: A notification that's generated when a rule’s criteria are met. You can then investigate an alert to dive into deeper details.
104
104
* Machine learning and anomaly detection: Anomaly detection jobs identify anomalous events or patterns in your data. Use these with machine learning detection rules to generate alerts when behavior deviates from normal activity.
105
105
* Entity analytics: A threat detection feature that combines the power of Elastic’s detection engine and machine learning capabilities to identify unusual user behaviors across hosts, users, and services. Entity analytics uses a risk scoring engine to calculate a risk score, which is evaluated at a recurring interval.
106
-
* Cases: A tool that allows you to collect and share information about security issues. Opening a case allows you to track key investigation details and collect alerts in a central location. You can also send cases to external systems.
107
-
* Timeline: A threat hunting tool that allows you to investigate security events so you can gather and analyze data related to alerts or suspicious activity. You can add events to Timeline from various sources, build custom queries, and even import/export a Timeline to collaborate and share.
106
+
* Cases: A tool that allows you to collect and share information about security issues. Opening a case lets you track key investigation details and collect alerts in a central location. You can also send cases to external systems.
107
+
* Timeline: A threat hunting tool that allows you to investigate security events so you can gather and analyze data related to alerts or suspicious activity. You can add events to Timeline from various sources, build custom queries, and import/export a Timeline to collaborate and share.
108
108
* Security posture management: Includes two Cloud Security features–Cloud Security Posture Management (CSPM) and Kubernetes Security Posture Management (KSPM)--that help you evaluate the services and resources in your cloud environment, such as storage, compute, IAM, and more — against security guidelines defined by the Center for Internet Security (CIS). These features help you identify and remediate configuration risks in your environment.
109
109
* AI Assistant: A generative AI-powered tool that helps with tasks like alert investigation, incident response, and query generation. It utilizes natural language processing and knowledge retrieval to provide context-aware assistance, summarize threats, suggest next steps, and automate workflows. Use AI Assistant to better understand and respond to security incidents.
110
110
:::
@@ -119,33 +119,33 @@ Before diving into setup and configuration, familiarize yourself with the founda
119
119
Use {{es}} for a wide range of business needs.
120
120
121
121
:::{dropdown} Use cases
122
-
***Full-text search:**Quickly find specific words or phrases within large volumes of text-based data, such as documents, articles, or product descriptions. Documents and search queries are transformed to enable returning relevant results instead of exact term matches.
123
-
***Semantic search:** Go beyond keyword matching to understand the user's intent. This helps your search engine to recognize what users mean, not just what they type, by understanding synonyms and related concepts.
122
+
***Full-text search:**Find specific words or phrases within large volumes of text-based data, such as documents, articles, or product descriptions. Documents and search queries are transformed to enable returning relevant results instead of exact term matches.
123
+
***Semantic search:** Go beyond keyword matching to understand the user's intent. Understanding synonyms and related concepts helps your search engine recognize what users mean, not just what they type.
124
124
***Hybrid search:** Get the best of both worlds by combining traditional keyword search with modern, meaning-based vector search. This ensures your users get the most accurate and relevant results every time.
125
-
***Vector database:** Search for data based on its meaning and context, not just keywords. This allows you to find similar items, like pictures that have the same style or songs with a similar vibe, by understanding the underlying concepts.
126
-
***Retrieval Augmented Generation (RAG):** Connect your generative AI applications (like chatbots) to your own private data. This allows your AI to provide more accurate, up-to-date, and relevant answers based on your proprietary information.
127
-
***Geospatial search:** Build location-aware features into your applications. This allows you to do things like find all available services within a certain radius, calculate the distance between two points, or identify which delivery routes are most efficient.
125
+
***Vector database:** Search for data based on its meaning and context, not just keywords. Understanding the underlying concepts allows you to find similar items, like pictures with the same style or songs with a similar vibe.
126
+
***Retrieval Augmented Generation (RAG):** Connect your generative AI applications (like chatbots) to your private data. This allows your AI to provide more accurate, up-to-date, and relevant answers based on your proprietary information.
127
+
***Geospatial search:** Build location-aware features into your applications. This allows you to do things like find all available services within a certain radius, calculate the distance between two points, or identify the most efficient delivery routes.
128
128
:::
129
129
130
130
### {{es}} core concepts [search-concepts]
131
131
Before you decide what type of search to use with {{es}} or bring in your data, familiarize yourself with the following {{es}} concepts.
132
132
133
-
:::{dropdown} Concepts
133
+
::::{dropdown} Concepts
134
134
135
135
***Index:** A collection of documents with similar characteristics that are uniquely identified by a name or an alias. The name is used to target the index in search queries and other operations.
136
136
**Field:** The smallest individual unit of data within a document. It represents a specific property or attribute of the data you're indexing (for example, title, author, date, summary, etc.). Fields are critical for indexing, as they determine how data is analyzed and stored to enable efficient searching.
137
137
***Document:** Any structured data encoded in JSON. {{es}} organizes and stores data into documents.
138
-
***Primary shard:** A self-contained Lucene index that contains some or all data for an index. Shards allow {{es}} to horizontally scale by splitting an index's data into smaller, manageable partitions, therefore improving performance. Each document in an index belongs to one primary shard.
138
+
***Primary shard:** A self-contained Lucene index that contains some or all data for an index. Shards allow {{es}} to scale horizontally by splitting an index's data into smaller, manageable partitions, improving performance. Each document in an index belongs to one primary shard.
139
139
***Replica:** A copy of a primary shard. Replicas maintain redundant copies of your data across the nodes in your cluster. This protects against hardware failure and increases capacity to serve read requests like searching or retrieving a document.
140
140
***Node:** A single running instance of the {{es}} server.
141
141
***Cluster:** A collection of one or more nodes that holds all your data and provides indexing and search capabilities across all nodes. {{es}} clusters feature primary and replica shards to provide failover in the case of a node going down. When a primary shard goes down, the replica takes its place.
142
142
:::{note}
143
-
If you're running {{es}} on a serverless deployment, you don't have to worry a bout shards, nodes or clusters. Elastic manages these for you.
143
+
If you're running {{es}} on a serverless deployment, you don't have to worry a bout shards, nodes, or clusters. Elastic manages these for you.
144
144
:::
145
-
***Mapping:** The process that defines how a document and the fields it contains are stored and indexed.
146
-
***Client:** Software or an application designed to facilitate communication and interaction with an {{es}} cluster. It enables applications written in various programming languages to send requests to {{es}}, process the response, then push that data into the cluster.
145
+
***Mapping:** The process that defines how a document and its fields are stored and indexed.
146
+
***Client:** Software or an application that facilitates communication and interaction with an {{es}} cluster. It enables applications written in various programming languages to send requests to {{es}}, process the response, and then push that data into the cluster.
147
147
148
-
:::
148
+
::::
149
149
150
150
<!--TBD: Call out how solutions map to Serverless project types? -->
0 commit comments