You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: get-started/trial-getting-started.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ applies_to:
8
8
serverless:
9
9
stack:
10
10
description: Start your Elastic trial with confidence. This step-by-step guide helps you set up your environment, choose a use case, and build a proof of concept within your trial period.
11
-
navigation_title: Get started with Elastic
11
+
navigation_title: Get started with the Elastic trial
Copy file name to clipboardExpand all lines: get-started/trial-week-1.md
+38-47Lines changed: 38 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,8 +14,6 @@ description: Week 1 of your Elastic trial. Set up your deployment, connect your
14
14
15
15
Week 1 focuses on getting your Elastic environment up and running quickly and demonstrating initial value with your chosen use case. By the end of this week, you will have data flowing into Elastic and be able to search, visualize, or monitor it effectively.
16
16
17
-
## Week 1 goals
18
-
19
17
By the end of this week, you will have:
20
18
21
19
- Set up your Elastic deployment.
@@ -26,11 +24,11 @@ By the end of this week, you will have:
26
24
27
25
**Estimated time**: 2-4 hours total.
28
26
29
-
::::::{stepper}
27
+
## Set up your deployment
30
28
31
-
:::::{step} Set up your deployment
29
+
::::::{stepper}
32
30
33
-
###Choose your deployment type
31
+
:::::{step} Choose your deployment type
34
32
35
33
When you start your trial, select a deployment type:
36
34
@@ -41,7 +39,9 @@ When you start your trial, select a deployment type:
41
39
For most trials, {{serverless-short}} provides the fastest path to value with minimal configuration overhead.
42
40
:::
43
41
44
-
### Create your deployment
42
+
:::::
43
+
44
+
:::::{step} Create your deployment
45
45
46
46
Create your deployment by following these steps:
47
47
@@ -56,7 +56,9 @@ Create your deployment by following these steps:
56
56
57
57
Your deployment will be ready in 1-2 minutes. **Save your credentials** when prompted.
58
58
59
-
### Access Kibana
59
+
:::::
60
+
61
+
:::::{step} Access Kibana
60
62
61
63
Once your deployment is ready:
62
64
@@ -68,8 +70,9 @@ Bookmark your Kibana URL for easy access throughout your trial.
68
70
:::
69
71
70
72
:::::
73
+
::::::
71
74
72
-
:::::{step} Connect your first data source
75
+
##Connect your first data source
73
76
74
77
Choose the path based on your use case:
75
78
@@ -78,7 +81,7 @@ Choose the path based on your use case:
78
81
79
82
Your goal is to index data that you want to search and analyze. Choose one method:
80
83
81
-
**Option A: Upload a file (Quickest start)**
84
+
#### Option A: Upload a file (Quickest start)
82
85
83
86
Best for: CSV, JSON, or log files you have on hand.
84
87
@@ -90,7 +93,7 @@ Best for: CSV, JSON, or log files you have on hand.
90
93
91
94
If you don't have data ready, Kibana includes sample datasets. Go to **Home** → **Try sample data** and add the "Sample web logs" or "Sample eCommerce orders" dataset.
92
95
93
-
**Option B: Use an integration**
96
+
#### Option B: Use an integration
94
97
95
98
Best for: Connecting to existing systems (databases, APIs, applications).
96
99
@@ -99,7 +102,7 @@ Best for: Connecting to existing systems (databases, APIs, applications).
99
102
3. Select **Add** and follow the configuration steps.
100
103
4. Verify data is flowing by checking the integration status.
101
104
102
-
**Option C: Use the API**
105
+
#### Option C: Use the API
103
106
104
107
Best for: Custom applications or programmatic data ingestion.
105
108
@@ -119,7 +122,7 @@ curl -X POST "https://your-deployment.elastic.cloud:9200/your-index/_doc" \
119
122
120
123
3. Refer to the [Elasticsearch index API documentation](/manage-data/data-store/index-basics.md) for more options.
121
124
122
-
### Verify your data
125
+
####Verify your data
123
126
124
127
1. Go to **Analytics** → **Discover** in Kibana.
125
128
2. Select your index or data view.
@@ -133,7 +136,7 @@ If you don't find your data, check your integration status or indexing logs.
133
136
134
137
Your goal is to collect logs, metrics, and traces from your systems. Choose one method:
135
138
136
-
**Option A: Monitor infrastructure (Easiest)**
139
+
#### Option A: Monitor infrastructure (Easiest)
137
140
138
141
Best for: Getting started quickly with system metrics.
139
142
@@ -147,7 +150,7 @@ Best for: Getting started quickly with system metrics.
147
150
5. Wait 1-2 minutes for data to appear.
148
151
6. Go to **Observability** → **Infrastructure** to see your host.
149
152
150
-
**Option B: Collect application logs**
153
+
#### Option B: Collect application logs
151
154
152
155
Best for: Aggregating logs from applications or services.
153
156
@@ -159,7 +162,7 @@ Best for: Aggregating logs from applications or services.
159
162
4. Install or configure Elastic Agent to collect the logs.
160
163
5. Go to **Observability** → **Logs** → **Stream** to see incoming logs.
161
164
162
-
**Option C: Monitor an application (APM)**
165
+
#### Option C: Monitor an application (APM)
163
166
164
167
Best for: Understanding application performance and errors.
165
168
@@ -173,7 +176,7 @@ Best for: Understanding application performance and errors.
173
176
174
177
Refer to [APM documentation](/solutions/observability/apm/index.md) for detailed setup instructions.
175
178
176
-
### Verify your data
179
+
####Verify your data
177
180
178
181
1. Go to **Observability** → **Overview**.
179
182
2. You should see metrics, logs, or traces depending on what you configured.
@@ -183,11 +186,9 @@ Refer to [APM documentation](/solutions/observability/apm/index.md) for detailed
183
186
184
187
:::{tab-item} Security
185
188
186
-
### Ingest security data
187
-
188
189
Your goal is to collect security events from endpoints, networks, and cloud services. Choose your starting point:
189
190
190
-
**Option A: Monitor endpoints (Recommended)**
191
+
#### Option A: Monitor endpoints (Recommended)
191
192
192
193
Best for: Detecting threats on laptops, desktops, and servers.
193
194
@@ -202,7 +203,7 @@ Best for: Detecting threats on laptops, desktops, and servers.
202
203
6. Wait 1-2 minutes for the endpoint to appear in Kibana.
203
204
7. Go to **Security** → **Manage** → **Endpoints** to see protected hosts.
204
205
205
-
**Option B: Collect security logs**
206
+
#### Option B: Collect security logs
206
207
207
208
Best for: Ingesting logs from firewalls, cloud providers, or security tools.
208
209
@@ -214,7 +215,7 @@ Best for: Ingesting logs from firewalls, cloud providers, or security tools.
214
215
3. Selec **Add** and follow the configuration steps for your provider.
215
216
4. Verify data is flowing by checking the integration status.
216
217
217
-
**Option C: Collect network traffic**
218
+
#### Option C: Collect network traffic
218
219
219
220
Best for: Monitoring network activity for threats.
220
221
@@ -224,7 +225,7 @@ Best for: Monitoring network activity for threats.
224
225
4. Configure network interfaces to monitor.
225
226
5. Go to **Security** → **Network** to see network flows.
226
227
227
-
### Verify your data
228
+
####Verify your data
228
229
229
230
1. Go to **Security** → **Overview**.
230
231
2. You should see security events and alerts.
@@ -233,16 +234,14 @@ Best for: Monitoring network activity for threats.
233
234
:::
234
235
::::
235
236
236
-
:::::
237
-
238
-
:::::{step} Explore your data
237
+
## Explore your data
239
238
240
239
Now that data is flowing, let's explore it in Kibana.
241
240
242
241
::::{tab-set}
243
242
:::{tab-item} Search
244
243
245
-
### Explore with Discover
244
+
####Explore with Discover
246
245
247
246
1. Go to **Analytics** → **Discover**.
248
247
2. Select your index pattern or data view.
@@ -267,29 +266,29 @@ Now that data is flowing, let's explore it in Kibana.
267
266
268
267
:::{tab-item} Observability
269
268
270
-
### Explore logs
269
+
####Explore logs
271
270
272
271
1. Go to **Observability** → **Logs** → **Stream**.
273
272
2.**Filter logs**:
274
273
- Use the search bar to find specific messages.
275
274
- Filter by host, service, or log level.
276
275
3.**View log details**: Select a log entry to see all fields and context.
277
276
278
-
### Explore metrics
277
+
####Explore metrics
279
278
280
279
1. Go to **Observability** → **Infrastructure**.
281
280
2. View your hosts with CPU, memory, and disk metrics.
282
281
3. Select a host to view detailed metrics.
283
282
4. Switch views to view containers, Kubernetes pods, or services.
284
283
285
-
### Explore APM (if configured)
284
+
####Explore APM (if configured)
286
285
287
286
1. Go to **Observability** → **Applications**.
288
287
2. Select your service.
289
288
3. View latency, throughput, and error rates.
290
289
4. Select a transaction to view traces and spans.
291
290
292
-
### Create an observability dashboard
291
+
####Create an observability dashboard
293
292
294
293
1. Go to **Analytics** → **Dashboards**.
295
294
2. Click **Create dashboard**.
@@ -305,21 +304,21 @@ Now that data is flowing, let's explore it in Kibana.
305
304
306
305
:::{tab-item} Security
307
306
308
-
### Explore security events
307
+
####Explore security events
309
308
310
309
1. Go to **Security** → **Explore** → **Events**.
311
310
2.**Filter events**:
312
311
- Use the search bar or KQL to find specific activity.
313
312
- Filter by host, user, process, or event type.
314
313
3.**Analyze an event**: Click on an event to see all details.
315
314
316
-
### View alerts
315
+
####View alerts
317
316
318
317
1. Go to **Security** → **Alerts**.
319
318
2. Review any alerts that have been generated by default detection rules.
320
319
3. Click on an alert to investigate further.
321
320
322
-
### Explore the security dashboard
321
+
####Explore the security dashboard
323
322
324
323
1. Go to **Security** → **Overview**.
325
324
2. View the pre-built security dashboards showing:
@@ -328,20 +327,18 @@ Now that data is flowing, let's explore it in Kibana.
328
327
- Network connections
329
328
- Top threats and events
330
329
331
-
### Create a custom security query
330
+
####Create a custom security query
332
331
333
332
1. Go to **Security** → **Timelines**.
334
-
2.Click**Create timeline**.
333
+
2.Select**Create timeline**.
335
334
3. Add filters and queries to hunt for specific activity:
336
335
- Example: `process.name: "powershell.exe" AND event.action: "network-connection"`
337
336
4. Save your timeline for future investigations.
338
337
339
338
:::
340
339
::::
341
340
342
-
:::::
343
-
344
-
:::::{step} Set up alerting (Optional)
341
+
## Set up alerting (Optional)
345
342
346
343
Alerts help you stay informed about important events or conditions.
347
344
@@ -400,9 +397,7 @@ Refer to [security detection rules](/solutions/security/detect-and-alert/about-d
400
397
:::
401
398
::::
402
399
403
-
:::::
404
-
405
-
:::::{step} Document your progress
400
+
## Document your progress
406
401
407
402
At the end of Week 1, take a moment to document:
408
403
@@ -412,13 +407,9 @@ At the end of Week 1, take a moment to document:
412
407
-**Alerts configured**: What conditions are you monitoring?
413
408
-**Challenges encountered**: Note any issues for follow-up.
414
409
415
-
This documentation will be valuable when presenting your PoC to stakeholders.
416
-
417
-
:::::
418
-
419
-
::::::
410
+
This documentation might be valuable when presenting your PoC to stakeholders.
0 commit comments