Operations | Monitoring | ITSM | DevOps | Cloud

Elastic

Bold, insightful, real-time: Visualizing APM data with Canvas in Kibana

Since we launched Canvas in 2018, we have seen tons of our users create beautiful dashboards that tell stories with Elasticsearch data. In the spirit of making it even easier to get started, we are creating templates that you can import and get instantly beautiful dashboards for all the data the Elastic Stack captures.

The Go client for Elasticsearch: Introduction

The official Go client for Elasticsearch is one of the latest additions to the family of clients developed, maintained, and supported by Elastic. The initial version was published early in 2019 and has matured over the past year, gaining features such as retrying requests, discovering cluster nodes, and various helper components. We also provide comprehensive examples to facilitate using the client.

Introducing Quick Start guides: Getting started with Elastic Enterprise Search for free

We recently released our new training Quick Start guides for the products in the Elastic Enterprise Search solution: Elastic Workplace Search and Elastic App Search. Each product is built on the Elastic Stack, so you can enjoy its speed, scale, and relevance without the heavy development and maintenance requirements of building your own search solution. Each 15-minute video tutorial provides everything you need to start creating powerful search experiences for your workplace, websites, and apps.

Configuring a SAML realm for role-based access control in ECE

Elastic Cloud Enterprise (ECE) makes it easy to manage your Elastic Stack deployments, just like role-based access control (RBAC) makes it easy to manage your users. Combining the two can really make an administrator's life much simpler. The intent of this blog post is to provide instructions for configuring a SAML realm for RBAC in ECE environments where Auth0 is used as an identity provider (IdP).

Slow and steady: How to build custom grok patterns incrementally

In our blog post on structuring Elasticsearch data with grok on ingest for faster analytics, we took a look at how to structure unstructured data on ingest (schema on write) to make sure your analytics run at near real time. Speed like that can help take your observability use cases to the next level. In this article, we’re going to build on what we learned by incrementally creating a new grok pattern from scratch!

Alerting and anomaly detection for uptime and reliability

Being able to easily monitor the health of all your sites and services from multiple global locations is a powerful tool for site reliability. However, no one wants to sit and stare at a status dashboard all day. Naturally, teams want to be alerted when there is an issue. We can do that with alerting in Kibana. And when coupled with Elastic machine learning, alerts can be automatically generated from anomalies that are automatically detected. That’s the power of Elastic Observability.

Getting started with Elastic Cloud, FedRAMP, and AWS GovCloud

Elastic Cloud recently introduced full FedRAMP authorization at the Moderate Impact level on AWS GovCloud (US). This brings the speed, simplicity, and security of Elastic Cloud to federal organizations and other customers in highly regulated environments. If you're a new or existing user who handles data for a US federal, state, or local government entity — or an educational institution — you can sign up for Elastic Cloud on AWS GovCloud (US) today.

Kibana Hidden Features - get the most out of your data by using Kibana like a pro - Aug 20, 2020

Kibana is quite powerful and versatile for visualizing data in Elasticsearch. And when you have a flexible tool like that, it's hard to know (and keep up with) everything that it can do. Just look at all of the things that MacGyver can do with a Swiss Army knife. In this talk, Felix will demo many of his favorite Kibana features — some new and some hidden gems — that let him make the most of his data.

Introduction to Windows tokens for security practitioners

This blog series is aimed at giving defense practitioners a thorough understanding of Windows access tokens for the purposes of detection engineering. Here in Part 1, we'll cover key concepts in Windows Security. The desired outcome is to help defenders understand how access tokens work in Windows environments.

Security operations: Cloud monitoring and detection with Elastic Security

As many organizations have migrated their infrastructure, applications, and data to cloud offerings, adversaries have extended their operational capabilities in cloud environments to achieve their mission — whether that means stealing intellectual property, disrupting business operations, or holding an organization’s data for ransom.