Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Getting Started with Elastic Stack 8.0

You're reading from  Getting Started with Elastic Stack 8.0

Product type Book
Published in Mar 2022
Publisher Packt
ISBN-13 9781800569492
Pages 474 pages
Edition 1st Edition
Languages
Author (1):
Asjad Athick Asjad Athick
Profile icon Asjad Athick

Table of Contents (18) Chapters

Preface 1. Section 1: Core Components
2. Chapter 1: Introduction to the Elastic Stack 3. Chapter 2: Installing and Running the Elastic Stack 4. Section 2: Working with the Elastic Stack
5. Chapter 3: Indexing and Searching for Data 6. Chapter 4: Leveraging Insights and Managing Data on Elasticsearch 7. Chapter 5: Running Machine Learning Jobs on Elasticsearch 8. Chapter 6: Collecting and Shipping Data with Beats 9. Chapter 7: Using Logstash to Extract, Transform, and Load Data 10. Chapter 8: Interacting with Your Data on Kibana 11. Chapter 9: Managing Data Onboarding with Elastic Agent 12. Section 3: Building Solutions with the Elastic Stack
13. Chapter 10: Building Search Experiences Using the Elastic Stack 14. Chapter 11: Observing Applications and Infrastructure Using the Elastic Stack 15. Chapter 12: Security Threat Detection and Response Using the Elastic Stack 16. Chapter 13: Architecting Workloads on the Elastic Stack 17. Other Books You May Enjoy

Chapter 9: Managing Data Onboarding with Elastic Agent

In the previous chapter, we explored some of the visualization tools available to users on Kibana to explore, interrogate, and understand different types of data. We also looked at how solution-specific applications on Kibana enable the different search, security, and observability use cases.

If your goal is to build in-depth security or observability use cases from your data (such as detecting errors in your environment before they impact user experience, or stopping security threats before they can disrupt your business), you need to onboard and ingest data from multiple layers of your technology stack to maximize your visibility. For example, if you're monitoring a simple three-tier web application, you would want to collect the following:

  • HTTP request/error logs from your frontend web server
  • Success/error logs and metrics/traces from your application
  • Metrics and error logs from your database layer
  • ...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}