You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
commit-message: 'chore: update kube-stack-version and helm-version'
64
+
title: 'chore: update kube-stack-version and helm-version'
65
65
body: |
66
-
This PR automatically updates the `kube-stack-version` in `docset.yml` based on the latest version from the elastic-agent repository.
66
+
This PR automatically updates the `kube-stack-version` and `helm-version` in `docset.yml` based on the latest versions from the Kibana and Elastic Agent repositories.
67
67
68
68
**Changes:**
69
-
- Updated `kube-stack-version` to the latest value from elastic-agent repository
69
+
- Updated `kube-stack-version` to the latest value from the Kibana repository
70
+
- Updated `helm-version` to the latest value from the Elastic Agent repository
70
71
71
72
**Generated by:** [Update Kube Stack Version workflow](https://github.com/${{ github.repository }}/actions/workflows/update-kube-stack-version.yml)
72
73
73
74
This is an automated update. Please review the changes before merging.
74
75
branch: update-kube-stack-version
75
76
delete-branch: true
77
+
team-reviewers: |
78
+
ingest-docs
76
79
labels: |
77
80
automated
78
81
chore
@@ -91,7 +94,7 @@ jobs:
91
94
git diff HEAD -- docset.yml >> $GITHUB_STEP_SUMMARY
92
95
echo '```' >> $GITHUB_STEP_SUMMARY
93
96
else
94
-
echo "ℹ️ **No changes needed** - kube-stack-version is already up to date" >> $GITHUB_STEP_SUMMARY
97
+
echo "ℹ️ **No changes needed** - kube-stack-version and helm-version are already up to date" >> $GITHUB_STEP_SUMMARY
95
98
fi
96
99
97
100
- name: Summary
@@ -102,5 +105,5 @@ jobs:
102
105
if [ "${{ steps.check-changes.outputs.has_changes }}" == "true" ]; then
Use AutoOps in your {{ech}}, ECE, ECK, or self-managed deployments.
3
-
4
-
AutoOps is a monitoring tool that simplifies cluster management through performance recommendations, resource utilization visibility, and real-time issue detection with resolution paths. For more information, refer to [](/deploy-manage/monitor/autoops.md).
AutoOps is a monitoring tool that simplifies cluster management through performance recommendations, resource utilization visibility, and real-time issue detection with resolution paths. Learn more about [](/deploy-manage/monitor/autoops.md).
This path is not supported. Currently, we only support using Cloud Connect to connect ECE, ECK, and self-managed clusters to AutoOps.
2
2
3
-
For {{ech}} clusters, AutoOps is set up and enabled automatically in all supported [regions](/deploy-manage/monitor/autoops/ec-autoops-regions.md), and can be [accessed](/deploy-manage/monitor/autoops/ec-autoops-how-to-access.md#ec-autoops-how-to-access) from the deployment overview page.
3
+
For {{ech}} deployments, AutoOps is set up and enabled automatically in all supported [regions](/deploy-manage/monitor/autoops/ec-autoops-regions.md), and can be [accessed](/deploy-manage/monitor/autoops/ec-autoops-how-to-access.md) from the deployment overview page.
Copy file name to clipboardExpand all lines: deploy-manage/api-keys/elastic-cloud-api-keys.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,9 +34,11 @@ These keys provides access to the API that enables you to manage your deployment
34
34
35
35
::::{note}
36
36
When an API key is nearing expiration, Elastic sends an email to the creator of the API key and each of the operational contacts. When you use an API key to authenticate, the API response header `X-Elastic-Api-Key-Expiration` indicates the key’s expiration date. You can log this value to detect API keys that are nearing expiration.
37
+
38
+
Once an API key expires, it will automatically be removed from the API Keys tab.
37
39
::::
38
40
39
-
5. Click **Create API key**, copy the generated API key, and store it in a safe place. You can also download the key as a CSV file.
41
+
6. Click **Create API key**, copy the generated API key, and store it in a safe place. You can also download the key as a CSV file.
40
42
41
43
The API key needs to be supplied in the `Authorization` header of a request, in the following format:
Copy file name to clipboardExpand all lines: deploy-manage/deploy/cloud-on-k8s/pod-disruption-budget.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,12 +19,13 @@ In {{eck}} 3.1 and earlier, all clusters follow the [default PodDisruptionBudget
19
19
:::
20
20
21
21
## Advanced rules (Enterprise license required)
22
+
22
23
```{applies_to}
23
24
deployment:
24
25
eck: ga 3.2
25
26
```
26
27
27
-
In Elasticsearch clusters managed by ECK and licensed with an Enterprise license, a separate PDB is created for each type of `nodeSet` defined in the manifest. This setup allows Kubernetes upgrade or maintenance operations to be executed more quickly. Each PDB permits one Elasticsearch Pod per `nodeSet`to be disrupted at a time, provided the Elasticsearch cluster maintains the health status described in the following table:
28
+
In {{es}} clusters managed by ECK and licensed with an Enterprise license, PDBs are created based on {{es}} node roles, allowing Kubernetes upgrade or maintenance operations to be executed more quickly. Multiple `nodeSets` with the same roles, such as `master` or `ml`, are combined into a single PDB. Each PDB permits one {{es}} Pod to be disrupted at a time, provided the {{es}} cluster maintains the health status described in the following table.
28
29
29
30
| Role | Cluster health required | Notes |
30
31
|------|------------------------|--------|
@@ -40,6 +41,7 @@ In Elasticsearch clusters managed by ECK and licensed with an Enterprise license
40
41
Single-node clusters are not considered highly available and can always be disrupted regardless of license type.
Copy file name to clipboardExpand all lines: deploy-manage/deploy/elastic-cloud/serverless.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ products:
20
20
Serverless projects use the core components of the {{stack}}, such as {{es}} and {{kib}}, and are based on an architecture that decouples compute and storage. Search and indexing operations are separated, which offers high flexibility for scaling your workloads while ensuring a high level of performance.
21
21
22
22
:::{note}
23
-
There are differences between {{es-serverless}} and {{ech}}, for a list of differences between them, see [differences between {{ech}} and {{es-serverless}}](../elastic-cloud.md#general-what-is-serverless-elastic-differences-between-serverless-projects-and-hosted-deployments-on-ecloud).
23
+
There are differences between {{es-serverless}} and {{ech}}. Learn more in [Compare {{ech}} and {{es-serverless}}](../elastic-cloud.md#general-what-is-serverless-elastic-differences-between-serverless-projects-and-hosted-deployments-on-ecloud).
24
24
:::
25
25
26
26
## Get started
@@ -55,6 +55,9 @@ Afterwards, you can:
55
55
***Data:** Choose the data you want to ingest and the method to ingest it. By default, data is stored indefinitely in your project, and you define the retention settings for your data streams.
56
56
***Performance:** For granular control over costs and query performance against your project data, serverless projects come with a set of predefined settings you can edit.
## Monitor serverless status [general-serverless-status]
59
62
60
63
Serverless projects run on cloud platforms, which may undergo changes in availability. When availability changes, Elastic makes sure to provide you with a current service status.
Copy file name to clipboardExpand all lines: deploy-manage/monitor.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Depending on your deployment type, you can use a variety of solutions for monito
24
24
25
25
You have several options for monitoring your cluster or deployment.
26
26
27
-
Use [AutoOps](/deploy-manage/monitor/autoops.md)in your {{ech}}, ECE, ECK, or self-managed deployments. AutoOps is a monitoring tool that simplifies cluster management through performance recommendations, resource utilization visibility, and real-time issue detection with resolution paths.
27
+
Use [](/deploy-manage/monitor/autoops.md)to simplify cluster management through performance recommendations, resource utilization visibility, and real-time issue detection with resolution paths.
28
28
29
29
Alternatively, you can use [Stack Monitoring](/deploy-manage/monitor/stack-monitoring.md) to monitor logs and metrics across the {{stack}}.
30
30
@@ -47,7 +47,8 @@ deployment:
47
47
48
48
AutoOps diagnoses issues in {{es}} by analyzing hundreds of metrics, providing root-cause analysis and accurate resolution paths. With AutoOps, customers can prevent and resolve issues, cut down administration time, and optimize resource utilization.
49
49
50
-
In the [regions](/deploy-manage/monitor/autoops/ec-autoops-regions.md) where it has been rolled out, AutoOps is automatically available in [{{ech}} deployments](/deploy-manage/monitor/autoops/ec-autoops-how-to-access.md) and [{{serverless-full}} projects](/deploy-manage/monitor/autoops/autoops-for-serverless.md), and can be set up for [ECE, ECK, and self-managed clusters](/deploy-manage/monitor/autoops/cc-autoops-as-cloud-connected.md).
AutoOps is automatically available in [{{ech}} deployments](/deploy-manage/monitor/autoops/ec-autoops-how-to-access.md) and [{{serverless-full}} projects](/deploy-manage/monitor/autoops/autoops-for-serverless.md), and can be set up for [ECE, ECK, and self-managed clusters](/deploy-manage/monitor/autoops/cc-autoops-as-cloud-connected.md) through Cloud Connect.
0 commit comments