You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: get-started/introduction.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,9 @@ Refer to the following table for a quick reference of which solution you may nee
15
15
16
16
| Your need | Recommended solution | Best for |
17
17
|-----------|-------------------|----------|
18
-
| Build powerful, scalable searches to quickly search, analyze, and visualize large amounts of data for real-time insights |[{{es}}](/solutions/search.md)| Developers, architects, data engineers |
19
-
| Observe and monitor system health and performance or send telemetry data |[Elastic {{observability}}](/solutions/observability.md)| DevOps, SREs, IT operations |
20
-
| Monitor data for anomalous activity, detect, prevent, and respond to security incidents |[{{elastic-sec}}](/solutions/security.md)| SOC teams, security analysts, IT security admins |
18
+
| Build powerful, scalable searches to quickly search, analyze, and visualize large amounts of data for real-time insights |[{{es}}](#search-overview)| Developers, architects, data engineers |
19
+
| Observe and monitor system health and performance or send telemetry data |[Elastic {{observability}}](#observability-overview)| DevOps, SREs, IT operations |
20
+
| Monitor data for anomalous activity, detect, prevent, and respond to security incidents |[{{elastic-sec}}](#security-overview)| SOC teams, security analysts, IT security admins |
21
21
22
22
:::{tip}
23
23
Check out our [customer success stories](https://www.elastic.co/customers/success-stories) to learn how various organizations utilize our products for their specific business needs.
@@ -27,11 +27,11 @@ Each of our solutions is available as a fully managed {{serverless-short}} proje
27
27
28
28
## Elasticsearch
29
29
30
-
### Overview[search-overview]
30
+
### {{es}} overview[search-overview]
31
31
32
32
{{es}} is an open-source, distributed search and analytics engine built on Apache Lucene, used for high-performance full-text search, log analytics, business analytics, and operational intelligence. It stores data in JSON documents, provides REST APIs for easy interaction, and functions as a NoSQL database that enables fast searches, analytics, and AI-driven applications. Built on Apache Lucene, {{es}} is the core of the Search AI platform.
33
33
34
-
### {{es}} use cases [search-use-cases]
34
+
### Elasticsearch use cases [search-use-cases]
35
35
Use {{es}} for a wide range of business needs.
36
36
37
37
:::{dropdown} Use cases
@@ -63,15 +63,15 @@ Before you decide what type of search to use with {{es}} or bring in your data,
63
63
64
64
::::
65
65
66
-
## {{elastic-sec}}
66
+
## Elastic Security
67
67
68
-
### Overview
68
+
### {{elastic-sec}} overview [security-overview]
69
69
70
70
{{elastic-sec}} is a unified security solution that integrates SIEM (Security Information and Event Management), endpoint security, and cloud security into a single platform so you can detect, prevent, and respond to cyber threats across your entire environment in near real time. Elastic Security leverages {{es}}'s powerful platform for its searching and analytic capabilities, and {{kib}} for its visualization features. By combining prevention, detection, and response capabilities, {{elastic-sec}} helps your organization reduce the risk of successful attacks.
71
71
72
72
Install {{elastic-sec}} on one of our Elastic-managed Cloud deployments or your own self-managed infrastructure.
73
73
74
-
### {{elastic-sec}} use cases
74
+
### {{elastic-sec}} use cases [security-use-cases]
75
75
76
76
Use {{elastic-sec}} for numerous security needs to ensure your systems are protected from the latest threats.
77
77
@@ -89,11 +89,11 @@ Use {{elastic-sec}} for numerous security needs to ensure your systems are prote
89
89
***Vulnerability Management:** Uncover vulnerabilities within your cloud infrastructure.
Before diving into setup and configuration, familiarize yourself with the foundational terms and core concepts that power {{elastic-sec}}.
95
95
96
-
:::{dropdown} Concepts
96
+
:::{dropdown} Concepts
97
97
98
98
* {{agent}}: A single, unified way to add monitoring for logs, metrics, and other types of data to a host. Elastic Agent can also protect hosts from security threats, query data from operating systems, and forward data from remote services or hardware.
99
99
* {{elastic-defend}}: {{elastic-sec}}'s Endpoint Detection and Response (EDR) tool that protects endpoints from malicious activity. {{elastic-defend}} uses a combination of techniques like machine learning, behavioral analysis, and prebuilt rules to detect, prevent, and respond to threats in real-time.
@@ -112,13 +112,13 @@ Before diving into setup and configuration, familiarize yourself with the founda
Elastic {{observability}} provides unified observability across applications and infrastructure. It combines logs, metrics, application traces, user experience data, and more into a single, integrated platform. This consolidation allows for powerful, cross-referenced analysis, enabling teams to move from detecting issues to understanding their root causes with speed and efficiency. By leveraging the search and analytics capabilities of {{es}}, it offers a holistic view of system behavior.
118
118
119
119
Elastic {{observability}} embraces open standards like OpenTelemetry for flexible data collection, and offers scalable, cost-efficient data retention with tiered storage.
120
120
121
-
### {{observability}} use cases [observability-use-cases]
121
+
### Elastic {{observability}} use cases [observability-use-cases]
122
122
123
123
Apply Elastic {{observability}} to various scenarios to improve operational awareness and system reliability.
124
124
:::{dropdown} Use cases
@@ -134,7 +134,7 @@ Apply Elastic {{observability}} to various scenarios to improve operational awar
134
134
***Incident Response and Management:** Facilitate the investigation of operational incidents by correlating data from multiple sources, which accelerates root cause analysis and resolution.
0 commit comments