Skip to content

Commit 962c1f1

Browse files
committed
Merge branch 'alaudazzi-patch-2' of github.com:elastic/docs-content into alaudazzi-patch-2
2 parents fc704c4 + adbb0b0 commit 962c1f1

File tree

484 files changed

+11542
-5026
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

484 files changed

+11542
-5026
lines changed

.github/ISSUE_TEMPLATE/b-internal-request.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ body:
6565
- '8.19'
6666
- '9.0'
6767
- '9.1'
68+
- '9.2'
6869
default: 0
6970
validations:
7071
required: true

.github/workflows/comment-on-removed-files.yml

Lines changed: 0 additions & 91 deletions
This file was deleted.

cloud-account/dark-mode.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ applies_to:
66

77
# Use dark mode in Kibana
88

9-
The dark mode changes Kibana's default light appearance to a darker and higher-contrast color theme. From the application header, you can turn on dark mode or synchronize the color mode with your operating system settings.
9+
The dark mode changes Kibana's default light appearance to a darker color theme. From the application header, you can turn on dark mode or synchronize the color mode with your operating system settings.
1010

1111
:::{tip}
1212
If you're using {{ecloud}}, this setting only applies to the Kibana UI of your serverless projects and hosted deployments. If you'd like to change the {{ecloud}} Console color theme too, you must do so separately from its respective interface.
@@ -16,10 +16,15 @@ If you're using {{ecloud}}, this setting only applies to the Kibana UI of your s
1616

1717
1. Open the user menu from the header.
1818
2. Select **Appearance**.
19+
20+
:::{note}
21+
On self-managed deployments of {{kib}}, this option is located on your profile page. To access it, select **Edit profile** from the header's user menu.
22+
:::
23+
1924
3. Choose a color mode:
2025

2126
- **Light**: The default color mode of Kibana
22-
- **Dark**: The dark and high-contrast color mode of Kibana
27+
- **Dark**: The dark color mode of Kibana
2328
- **System**: Synchronizes Kibana's color mode with your system settings
2429
- **Space default**: Sets the color mode to the value defined in the [Space settings](kibana://reference/advanced-settings.md#kibana-general-settings)
2530

cloud-account/high-contrast.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
description: Use high-contrast mode in Kibana.
3+
applies_to:
4+
stack: ga 9.1
5+
serverless: ga
6+
products:
7+
- id: kibana
8+
---
9+
10+
# Use high-contrast mode in Kibana
11+
12+
You can change the interface contrast mode of Kibana to improve visibility and readability in low-light conditions.
13+
14+
1. Open the user menu from the header.
15+
2. Select **Appearance**.
16+
17+
:::{note}
18+
On self-managed deployments of {{kib}}, this option is located on your profile page. To access it, select **Edit profile** from the header's user menu.
19+
:::
20+
21+
3. Choose an interface contrast mode:
22+
23+
- **System**: Synchronizes Kibana's contrast mode with your system settings.
24+
- **Normal**: Normal contrast mode.
25+
- **High**: The high-contrast color mode of Kibana.
26+
27+
4. Select **Save changes**.
28+
5. Refresh the page to apply the selected contrast mode.

cloud-account/toc.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,5 @@ toc:
66
- file: change-your-password.md
77
- file: add-a-login-method.md
88
- file: multifactor-authentication.md
9-
- file: dark-mode.md
9+
- file: dark-mode.md
10+
- file: high-contrast.md
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
:::{dropdown} Can I use Cloud Connect to connect my {{ech}} clusters to AutoOps?
2+
3+
This path is not supported. Currently, we only support using Cloud Connect to connect ECE, ECK, and self-managed clusters to AutoOps.
4+
5+
For {{ech}} clusters, AutoOps is set up and enabled automatically in all supported [regions](/deploy-manage/monitor/autoops/ec-autoops-regions.md), and can be [accessed](/deploy-manage/monitor/autoops/ec-autoops-how-to-access.md) from the deployment overview page.
6+
:::
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Using [AutoOps for ECE, ECK, and self-managed clusters](/deploy-manage/monitor/autoops/cc-autoops-as-cloud-connected.md) through Cloud Connect is included with your [self-managed Enterprise license](https://www.elastic.co/subscriptions).
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
::::{note}
2+
With [{{serverless-full}}](/deploy-manage/deploy/elastic-cloud/serverless.md), upgrades of the Elastic-managed infrastructure and project components are fully handled by Elastic. Users automatically receive the latest features and improvements, with no need to plan or perform project-level upgrades.
3+
4+
Keep in mind that the [ingest components](/deploy-manage/upgrade/ingest-components.md) or clients you manage externally, such as {{agent}}, {{beats}}, {{ls}}, or custom applications, still need to be updated manually.
5+
::::

deploy-manage/api-keys/elastic-cloud-api-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ These keys provides access to the API that enables you to manage your deployment
3030
3. On the **API keys** tab of the **Organization** page, click **Create API key**.
3131
4. On the **Create API key** flyout, you can configure your new key by adding a name, set expiration, or assign [roles](../users-roles/cloud-organization/user-roles.md).
3232

33-
By default, API keys expire after three months. You can set the expiration to a different preset value or to a specific date, up to one year. If you need the key to work indefinitely, you can also set its expiration to Never. In this case, the key won’t expire.
33+
By default, API keys expire after three months. You can set the expiration to a different preset value or to a specific date, up to one year. If you need the key to work indefinitely, you can also set its expiration to Never. In this case, the key won’t expire. Each user is allowed to create up to 64 API keys.
3434

3535
::::{note}
3636
When an API key is nearing expiration, Elastic sends an email to the creator of the API key and each of the operational contacts. When you use an API key to authenticate, the API response header `X-Elastic-Api-Key-Expiration` indicates the key’s expiration date. You can log this value to detect API keys that are nearing expiration.

deploy-manage/autoscaling/autoscaling-in-eck.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ spec:
177177
max: 512Gi
178178
```
179179

180-
You can find [a complete example in the ECK GitHub repository](https://github.com/elastic/cloud-on-k8s/blob/{{eck_release_branch}}/config/recipes/autoscaling/elasticsearch.yaml) which will also show you how to fine-tune the [autoscaling deciders](/deploy-manage/autoscaling/autoscaling-deciders.md).
180+
You can find [a complete example in the ECK GitHub repository](https://github.com/elastic/cloud-on-k8s/blob/{{version.eck | M.M}}/config/recipes/autoscaling/elasticsearch.yaml) which will also show you how to fine-tune the [autoscaling deciders](/deploy-manage/autoscaling/autoscaling-deciders.md).
181181

182182

183183
#### Change the polling interval [k8s-autoscaling-polling-interval]

0 commit comments

Comments
 (0)