Skip to content

Commit 0e7ea35

Browse files
authored
docs: Update ingest traces (#1882)
* docs: update traces qs * address feedback from DeDe
1 parent 0bc4a62 commit 0e7ea35

14 files changed

+29
-48
lines changed

.gitignore

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,3 +10,5 @@ bin
1010
/html_docs
1111
html_docs
1212
.vscode
13+
14+
workspace.code-workspace

docs/en/ingest-management/elastic-agent/install-fleet-managed-elastic-agent.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ image::images/kibana-agent-flyout.png[Add agent flyout in {kib}]
7272
// lint enable fleet
7373

7474
After about a minute, the agent will enroll in {fleet}, download the
75-
configuration specified in the agent policy, and start collecting data.
75+
configuration specified in the agent policy, and start collecting data.
7676

7777
**Notes:**
7878

docs/en/ingest-management/tab-widgets/add-fleet-server/content.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ image::images/add-fleet-server.png[In-product instructions for adding a {fleet-s
5656
* Make sure you download an x64 architecture installation package.
5757
5858
* For the agent policy, choose one with a {fleet-server} integration, or click
59-
*Create policy* to create one now. Alternatively you can
59+
*Create policy* to create one now. Alternatively you can
6060
{fleet-guide}/create-a-policy-no-ui.html[create a {fleet-server} policy without using the UI],
6161
then select the policy here.
6262
@@ -78,7 +78,7 @@ sudo ./elastic-agent install \
7878
--fleet-server-es=http://localhost:9200 \
7979
--fleet-server-service-token=AAEbAWVsYXN0aWMvZmxlaXQtc2VydmVzL3Rva2VuLTE2MeIzNTY1NTQ3Mji6dERXeE9XbW5RRTZqNlJMWEdIRzAtZw \
8080
--fleet-server-policy=27467ed1-1bfd-11ec-9b88-a7c3d83e2897 \
81-
--fleet-server-es-ca-trusted-fingerprint=3b24d33844d65532f0584d198b45006747521493522c1912608522bf175bc826
81+
--fleet-server-es-ca-trusted-fingerprint=3b24d33844d65532f0584d198b45006747521493522c1912608522bf175bc826
8282
----
8383
+
8484
The following command installs a {fleet-server} and uses certificates you

docs/en/observability/ingest-logs-metrics-uptime.asciidoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ image::images/kibana-agent-add-log-path.png[Configuration page for adding log pa
8585

8686
. Click **Save and continue**. This step takes a minute or two to complete. When
8787
it's done, you'll have an agent policy that contains a system integration policy
88-
for the configuration you just specified.
88+
for the configuration you just specified.
8989
+
9090
--
9191
[role="screenshot"]
@@ -125,15 +125,15 @@ image::images/kibana-agent-flyout.png[Add agent flyout in {kib}]
125125
+
126126
It takes about a minute for {agent} to enroll in {fleet}, download the
127127
configuration specified in the policy you just created, and start collecting
128-
data.
128+
data.
129129

130130
[discrete]
131131
[[view-data]]
132132
== Step 4: Monitor host logs and metrics
133133

134134
. Verify that data is flowing. Wait until agent enrollment is confirmed and
135135
incoming data is received, then click **View assets** to access dashboards
136-
related to the System integration.
136+
related to the System integration.
137137
+
138138
--
139139
[role="screenshot"]
@@ -142,7 +142,7 @@ image::images/kibana-agent-confirm-data.png[Agent confirm data]
142142

143143
. Choose a dashboard that is related to the operating system of your
144144
monitored system. Dashboards are available for Microsoft Windows systems
145-
and Unix-like systems (for example, Linux and macOS).
145+
and Unix-like systems (for example, Linux and macOS).
146146
+
147147
--
148148
[role="screenshot"]
@@ -237,7 +237,7 @@ The newly added Elastic Synthetics integration should appear on the
237237
[role="screenshot"]
238238
image::images/kibana-fleet-policies-default-with-synthetics.png[{fleet} showing default agent policy with synthetics-1 data source]
239239
+
240-
All {agent}s that use this policy will collect logs, metrics, and uptime data from the host.
240+
Any {agent}s assigned to this policy will collect logs, metrics, and uptime data from the host.
241241

242242
. To view the data in the {observability-guide}/view-monitor-status.html[{uptime-app}], go to
243243
**{observability} > Uptime** in the main menu.
@@ -280,7 +280,7 @@ your agent policy, along with the System and Elastic Synthetics integrations.
280280
[role="screenshot"]
281281
image::images/kibana-fleet-policies-default-with-nginx.png[{fleet} showing default agent policy with nginx-1 data source]
282282
+
283-
All {agent}s that use this policy will collect logs and metrics from the
283+
Any {agent}s assigned to this policy will collect logs and metrics from the
284284
Nginx server and the host, along with system logs and uptime data.
285285

286286
. To view the data, go to **Management > {fleet}**, then click the

docs/en/observability/ingest-traces.asciidoc

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,11 +46,10 @@ you must use {fleet} to manage {agent}.
4646

4747
[discrete]
4848
[[add-apm-integration]]
49-
== Step 2: Add the APM integration
49+
== Step 2: Configure the APM integration
5050

51-
Next, add the APM integration to the default policy used by your {agent}.
52-
Policies manage settings across a group of {agent}s and may contain any number of integrations
53-
for collecting observability data from the various services running on your host.
51+
{ecloud} runs a hosted version of {integrations-server} that includes the APM integration.
52+
Self-managed users will need to add the APM integration before configuring it.
5453

5554
include::./tab-widgets/add-apm-integration/widget.asciidoc[]
5655

@@ -70,7 +69,7 @@ deploy monitoring across your infrastructure. Each agent has a single policy (a
7069
collection of input settings) that you can update to add integrations for new
7170
data sources, security protections, and more.
7271

73-
Don't confuse {agent} with APM agentsthey are different components.
72+
Don't confuse {agent} with APM agents--they are different components.
7473
In a later step, you'll instrument your code with APM agents and send the data
7574
to an APM Server instance that {agent} spins up.
7675

Lines changed: 14 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,20 @@
11
// tag::ess[]
2-
. In {kib}, select **Add integrations** > **Elastic APM**.
3-
+
4-
[role="screenshot"]
5-
image::./images/kibana-fleet-integrations-apm.png[{fleet} showing APM integration]
6-
7-
. Click **Manage APM integration in {fleet}**.
8-
+
9-
[role="screenshot"]
10-
image::./images/cloud-add-apm.png[Add APM integration]
11-
12-
. On the **Elastic APM** page, select the **{ecloud} agent policy**.
2+
. In {kib}, navigate to **Fleet** > **Agent policies** and select the **Elastic Cloud agent policy**.
3+
This is the default agent policy for {agent}s hosted on {ecloud}.
134
+
145
[role="screenshot"]
15-
image::./images/cloud-apm-policy-view.png[Cloud APM policy view on the Elastic APM page]
6+
image::./images/cloud-agent-policy.png[Elastic Cloud agent policy]
167

17-
. As you can see, the APM integration has been added to the {ecloud} agent policy.
18-
This is the default policy for {agent}s hosted on {ecloud}.
19-
In the **Elastic APM** row of the table, in the **Actions** column,
8+
. Next to **Elastic APM** in the **Actions** column,
209
select **Edit integration** to configure the APM integration.
2110
+
2211
[role="screenshot"]
2312
image::./images/cloud-edit-apm.png[Edit the APM integration]
2413

25-
. Make a note of the predefined Host and URL that the APM Server is listening on--you'll
26-
need these in the next step.
27-
If you made any changes to your configuration, click **save and continue**.
14+
. Make a note of the predefined URL that the APM Server is listening on--you'll
15+
need this in the next step.
2816

17+
. If you made any changes to your configuration, click **save and continue**.
2918
// end::ess[]
3019

3120
// tag::self-managed[]
@@ -41,25 +30,16 @@ image::./images/kibana-fleet-integrations-apm-overview.png[{fleet} showing APM i
4130

4231
. On the **Add Elastic APM integration** page,
4332
define the host and port where APM Server will listen.
33+
Make a note of this value--you'll need it later.
4434

45-
. Under **Apply to agent policy**, select the default policy.
46-
Click **Save and continue**.
47-
+
48-
In this guide, you add integrations to the default policy created by
49-
{kib}. After you learn the basics, you can create your own policies and assign
50-
them to agents.
51-
+
52-
[role="screenshot"]
53-
image::./images/add-integration-apm.png[{fleet} Add APM integration page]
35+
. Click **Save and continue**.
36+
This step takes a minute or two to complete. When it's done,
37+
you'll have an agent policy that contains an APM integration policy for the configuration you just specified.
5438

55-
// lint disable apm-1
56-
. To see the updated policy, click the *Default policy* link.
57-
+
58-
The newly added APM integration should appear under **{fleet}** > **Agent policies** > **Default policy**,
59-
along with the default System integration.
39+
. To view the new policy, click **Agent policy 1**.
6040
+
6141
[role="screenshot"]
62-
image::./images/kibana-fleet-policies-default-with-apm.png[{fleet} showing default agent policy with apm-1 data source]
42+
image::./images/apm-agent-policy-1.png[{fleet} showing apm policy]
6343
+
64-
All {agent}s that use this policy will collect APM data from your instrumented services.
44+
Any {agent}s assigned to this policy will collect APM data from your instrumented services.
6545
// end::self-managed[]
Loading
Binary file not shown.
Loading
Loading

0 commit comments

Comments
 (0)