You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Data collection with AWS Firehose is supported on ESS deployments in AWS, Azure and GCP.
53
+
Data collection with AWS Firehose is supported on ESS deployments in AWS, Azure and GCP.
54
54
55
55
[discrete]
56
56
== Prerequisites
57
57
58
58
* A deployment using our hosted {ess} on {ess-trial}[{ecloud}]. The deployment includes an {es} cluster for storing and searching your data, and {kib} for visualizing and managing your data.
59
59
* A user with the `superuser` {ref}/built-in-roles.html[built-in role] or the privileges required to onboard data.
60
-
+
60
+
+
61
61
[%collapsible]
62
62
.Expand to view required privileges
63
63
====
@@ -75,16 +75,16 @@ NOTE: The default CloudFormation stack is created in the AWS region selected for
75
75
The AWS Firehose receiver has the following limitations:
76
76
77
77
* It does not support AWS PrivateLink.
78
-
* It is not available for on-premise Elastic Stack deployments.
79
-
* The CloudFormation template detects and ingests logs and metrics within a single AWS region only.
78
+
* It is not available for on-premise Elastic Stack deployments.
79
+
* The CloudFormation template detects and ingests logs and metrics within a single AWS region only.
80
80
81
81
The following table shows the type of data ingested by the supported AWS services:
82
82
83
83
|===
84
-
| AWS Service | Data type
84
+
| AWS Service | Data type
85
85
86
-
| VPC Flow Logs |Logs
87
-
| API Gateway|Logs, Metrics
86
+
| VPC Flow Logs |Logs
87
+
| API Gateway|Logs, Metrics
88
88
| CloudTrail | Logs
89
89
| Network Firewall | Logs, Metrics
90
90
| Route53 | Logs
@@ -113,9 +113,9 @@ The following table shows the type of data ingested by the supported AWS service
113
113
[discrete]
114
114
== Collect your data
115
115
116
-
. In {kib}, go to **Observability** and click **Add Data**.
116
+
. In {kib}, go to the **Observability** UI and click **Add Data**.
117
117
118
-
. Select **Cloud**, **AWS**, and then select **AWS Firehose**.
118
+
. Under **What do you want to monitor?** select **Cloud**, **AWS**, and then select **AWS Firehose**.
Copy file name to clipboardExpand all lines: docs/en/observability/quickstarts/monitor-hosts-with-elastic-agent.asciidoc
+16-15Lines changed: 16 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,6 @@
1
1
[[quickstart-monitor-hosts-with-elastic-agent]]
2
2
= Quickstart: Monitor hosts with {agent}
3
3
4
-
preview::[]
5
-
6
4
In this quickstart guide, you'll learn how to scan your host to detect and collect logs and metrics,
7
5
then navigate to dashboards to further analyze and explore your observability data.
8
6
You'll also learn how to get value out of your observability data.
@@ -15,7 +13,7 @@ The script also generates an {agent} configuration file that you can use with yo
15
13
[discrete]
16
14
== Prerequisites
17
15
18
-
* A deployment using our hosted {ess} on {ess-trial}[{ecloud}]. The deployment includes an {es} cluster for storing and searching your data, and {kib} for visualizing and managing your data.
16
+
* An {es} cluster for storing and searching your data, and {kib} for visualizing and managing your data. This quickstart is available for all Elastic deployment models. To get started quickly, try out our hosted {ess} on {ess-trial}[{ecloud}].
19
17
* A user with the `superuser` {ref}/built-in-roles.html[built-in role] or the privileges required to onboard data.
20
18
+
21
19
[%collapsible]
@@ -30,23 +28,21 @@ The script also generates an {agent} configuration file that you can use with yo
30
28
[discrete]
31
29
== Limitations
32
30
33
-
* The auto-detection script currently scans for metrics and logs from Apache, Docker, Nginx, and the host system.
34
-
It also scans for custom log files.
35
31
* The auto-detection script works on Linux and MacOS only. Support for the `lsof` command is also required if you want to detect custom log files.
36
32
* If you've installed Apache or Nginx in a non-standard location, you'll need to specify log file paths manually when you run the scan.
37
33
* Because Docker Desktop runs in a VM, its logs are not auto-detected.
38
34
39
35
[discrete]
40
36
== Collect your data
41
37
42
-
. Go to the **Observability** UI and click **Add Data**.
43
-
. Select **Collect and analyze logs**, and then select **Auto-detect logs and metrics**.
44
-
. Copy the command that's shown. For example:
38
+
. In {kib}, go to the **Observability** UI and click **Add Data**.
39
+
. Under **What do you want to monitor?** select **Host**, and then select **Elastic Agent: Logs & Metrics**.
45
40
+
46
41
[role="screenshot"]
47
-
image::images/quickstart-autodetection-command.png[Quick start showing command for running auto-detection]
Copy file name to clipboardExpand all lines: docs/en/observability/quickstarts/monitor-k8s-logs-metrics.asciidoc
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,6 @@
1
1
[[monitor-k8s-logs-metrics-with-elastic-agent]]
2
2
= Quickstart: Monitor your Kubernetes cluster with {agent}
3
3
4
-
preview::[]
5
-
6
4
In this quickstart guide, you'll learn how to create the Kubernetes resources that are required to monitor your cluster infrastructure.
7
5
8
6
This new approach requires minimal configuration and provides you with an easy setup to monitor your infrastructure. You no longer need to download, install, or configure the Elastic Agent, everything happens automatically when you run the kubectl command.
@@ -12,7 +10,7 @@ The kubectl command installs the standalone Elastic Agent in your Kubernetes clu
12
10
[discrete]
13
11
== Prerequisites
14
12
15
-
* A deployment using our hosted {ess} on {ess-trial}[{ecloud}]. The deployment includes an {es} cluster for storing and searching your data, and {kib} for visualizing and managing your data.
13
+
* An {es} cluster for storing and searching your data, and {kib} for visualizing and managing your data. This quickstart is available for all Elastic deployment models. To get started quickly, try out our hosted {ess} on {ess-trial}[{ecloud}].
16
14
* A user with the `superuser` {ref}/built-in-roles.html[built-in role] or the privileges required to onboard data.
17
15
+
18
16
[%collapsible]
@@ -28,9 +26,9 @@ The kubectl command installs the standalone Elastic Agent in your Kubernetes clu
28
26
[discrete]
29
27
== Collect your data
30
28
31
-
. Go to the **Observability** UI and click **Add Data**.
29
+
. In {kib}, go to the **Observability** UI and click **Add Data**.
32
30
33
-
. Select **Monitor infrastructure**, and then select **Kubernetes**.
31
+
. Under **What do you want to monitor?** select **Kubernetes**, and then select **Elastic Agent: Logs & Metrics**.
Copy file name to clipboardExpand all lines: docs/en/observability/quickstarts/monitor-k8s-otel.asciidoc
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
4
4
preview::[]
5
5
6
-
In this quickstart guide, you will learn how to send Kubernetes logs, metrics, and application traces to Elasticsearch, using the https://github.com/open-telemetry/opentelemetry-operator/[OpenTelemetry Operator] to orchestrate https://github.com/elastic/opentelemetry/tree/main[Elastic Distributions of OpenTelemetry] (EDOT) Collectors and SDK instances.
6
+
In this quickstart guide, you'll learn how to send Kubernetes logs, metrics, and application traces to Elasticsearch, using the https://github.com/open-telemetry/opentelemetry-operator/[OpenTelemetry Operator] to orchestrate https://github.com/elastic/opentelemetry/tree/main[Elastic Distributions of OpenTelemetry] (EDOT) Collectors and SDK instances.
7
7
8
8
All the components will be deployed through the https://github.com/open-telemetry/opentelemetry-helm-charts/tree/main/charts/opentelemetry-kube-stack[opentelemetry-kube-stack] helm chart. They include:
9
9
@@ -17,7 +17,7 @@ For a more detailed description of the components and advanced configuration, re
17
17
[discrete]
18
18
== Prerequisites
19
19
20
-
* A deployment using our hosted {ess} on {ess-trial}[{ecloud}]. The deployment includes an {es} cluster for storing and searching your data, and {kib} for visualizing and managing your data.
20
+
* An {es} cluster for storing and searching your data, and {kib} for visualizing and managing your data. This quickstart is available for all Elastic deployment models. To get started quickly, try out our hosted {ess} on {ess-trial}[{ecloud}].
@@ -41,7 +41,7 @@ The default installation deploys the OpenTelemetry Operator with a self-signed T
41
41
====
42
42
+
43
43
Deploy the OpenTelemetry Operator and EDOT Collectors using the kube-stack Helm chart with the provided `values.yaml` file. You will run a few commands to:
44
-
+
44
+
+
45
45
* Add the helm chart repository needed for the installation.
46
46
* Create a namespace.
47
47
* Create a secret with an API Key and the {es} endpoint to be used by the collectors.
0 commit comments