<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>aeolus (Posts by Elastic)</title><link>https://yieldsfalsehood.com/aeolus/</link><description></description><atom:link href="https://yieldsfalsehood.com/aeolus/sources/elastic.xml" rel="self" type="application/rss+xml"></atom:link><language>en</language><copyright>Contents © 2025 &lt;a href="mailto:elliot@yieldsfalsehood.com"&gt;elliot&lt;/a&gt; </copyright><lastBuildDate>Wed, 09 Jul 2025 13:29:12 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>AI adoption in security: Top use cases and mistakes to avoid</title><link>https://yieldsfalsehood.com/aeolus/posts/ai-adoption-in-security-top-use-cases-and-mistakes-to-avoid-34662890/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;AI adoption in security: Top use cases and mistakes to avoid &lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Widespread implementation of &lt;/span&gt;&lt;a href="https://www.elastic.co/generative-ai"&gt;&lt;span style="font-size: 12pt;"&gt;artificial intelligence (AI)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; in security presents a paradox. On one hand, it helps security experts combat advanced &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/cybersecurity-threats"&gt;&lt;span style="font-size: 12pt;"&gt;threats&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; at scale. On the other hand, AI is also contributing to the scale of sophistication of adversaries' threat campaigns.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;To fight fire with fire, organizations are increasingly automating security processes to make up for the uneven playing field on which they find themselves. In this landscape, &lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/ai-cybersecurity"&gt;&lt;span style="font-size: 12pt;"&gt;AI in cybersecurity &lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;is necessary to move from reactive defenses to proactive protection. However, AI adoption isn’t without its challenges and considerations.&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 12pt;"&gt;&lt;br&gt;This article explores how AI is transforming security operations, the top-value use cases it’s delivering, and key mistakes to avoid when bringing AI into your &lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/security-operations-center"&gt;&lt;span style="font-size: 12pt;"&gt;security operations center (SOC)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;.&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/ai-adoption-in-security-top-use-cases-and-mistakes-to-avoid-34662890/</guid><pubDate>Tue, 08 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Elastic Cloud Hosted achieves FedRAMP® High "In Process" status</title><link>https://yieldsfalsehood.com/aeolus/posts/elastic-cloud-hosted-achieves-fedramp-r-high-in-process-status-13293b01/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;We’re excited to announce that Elastic has achieved FedRAMP® High “In Process” status for Elastic Cloud Hosted on AWS GovCloud (US). This designation from the US Federal Risk and Authorization Management Program (FedRAMP) Program Management Office builds on Elastic’s continued commitment to provide the US federal government with secure, compliant, and &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/gsa-elastic-agreement-federal-cost-savings"&gt;&lt;span style="font-size: 12pt;"&gt;transparently priced&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; technology solutions.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;This milestone comes on the heels of &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/gsa-elastic-agreement-federal-cost-savings"&gt;&lt;span style="font-size: 12pt;"&gt;Elastic and GSA’s June announcement&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; of a volume-based discount buying program for US federal agencies. The program streamlines the procurement process, builds efficiencies of scale, and increases time to value.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;1 https://www.fedramp.gov/understanding-baselines-and-impact-levels/&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/elastic-cloud-hosted-achieves-fedramp-r-high-in-process-status-13293b01/</guid><pubDate>Tue, 08 Jul 2025 00:00:00 GMT</pubDate></item><item><title>APM best practices: Dos and don’ts guide for practitioners</title><link>https://yieldsfalsehood.com/aeolus/posts/apm-best-practices-dos-and-donts-guide-for-practitioners-67f670df/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;a href="https://www.elastic.co/what-is/application-performance-monitoring"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Application performance management (APM)&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt; is the practice of regularly tracking, measuring, and analyzing the performance and availability of software applications. &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;APM helps you get visibility into complex microservices environments, which can overwhelm &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/sre-essentials"&gt;&lt;span style="font-size: 12pt;"&gt;site reliability engineering (SRE) teams&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;. The generated insights create an optimal user experience and achieve desired business outcomes.&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;It’s a complex process, but the goal is straightforward: ensuring that an application runs smoothly and meets the expectations of users and businesses. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;A clear understanding of an application's operation and a proactive APM practice are crucial for maintaining high-performing software applications. APM shouldn’t be an afterthought. It should be considered from the beginning. When implemented proactively, it can be incorporated into how software runs by embedding monitoring components directly into the application.&lt;/span&gt;&lt;/p&gt;# Auto-instrumentation handles this automatically
@app.route('/api/orders')
def create_order():
    # Add manual span only for critical business logic
    with tracer.start_as_current_span("order.validation") as span:
        span.set_attribute("order.value", order_total)
        if not validate_order(order_data):
            span.set_status(Status(StatusCode.ERROR))
            return 400&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Do:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Start with &lt;/span&gt;&lt;a href="https://www.elastic.co/docs/reference/apm/agents/dotnet/setup-auto-instrumentation"&gt;&lt;span style="font-size: 12pt;"&gt;auto-instrumentation&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;, then add manual spans for business-critical operations.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Don't:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Manually instrument every function call — you'll create performance overhead and noise.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Pitfall:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Over-instrumentation can add 15%–20% latency. Monitor your monitoring with baseline performance comparisons.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;A few components for an organization or business to consider when developing an APM strategy are:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://www.elastic.co/observability/application-performance-monitoring"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Performance monitoring&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;, including evaluating latency, service level objectives, response time, throughput, and request volumes&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Error tracking&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;, including exceptions, crashes, and failed API calls &lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://www.elastic.co/observability/infrastructure-monitoring"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Infrastructure monitoring&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;, including health and resource usage of servers, containers, and cloud environments that support the application&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.elastic.co/observability/real-user-monitoring"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;User experience metrics&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;, including load times, session performance, click paths, and browser or device details (It’s important to keep in mind that even if system metrics look fine, users may still encounter performance issues.)&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;Key principles of effective APM&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The core principles of effective &lt;/span&gt;&lt;a href="https://www.elastic.co/observability/application-performance-monitoring"&gt;&lt;span style="font-size: 12pt;"&gt;application performance management&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; are end-to-end visibility (from the user's browser to the database), real-time monitoring and insights, and contextual insights, with a user- and business-objective focus. APM can improve application scalability by enabling continuous improvements and increasing performance over time.&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Do:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Implement real-time dashboards with SLO-based alerts rather than arbitrary thresholds.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Don't: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Rely only on periodic performance reviews or CPU/memory alerts — instrument user experience metrics.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Pitfall: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Alert fatigue from low-level system metrics. Focus on user-facing SLOs that indicate real problems.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;When creating an APM strategy, here are a few key principles to consider:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;1. Proactive monitoring:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Prevent issues before they impact users by setting up alerts and responding quickly to any anomalies. But try to avoid alert fatigue. Balance automated alerts with human oversight so important issues don’t get missed, focusing on outcomes rather than system metrics. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;2. Real-time insights:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; &lt;/span&gt;&lt;a href="https://www.elastic.co/observability-labs/blog/introduction-apm-tracing-logging"&gt;&lt;span style="font-size: 12pt;"&gt;Move beyond logging issues&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; and enable fast decision-making based on live data and real-time dashboards that prioritize the most critical business transactions. Use &lt;/span&gt;&lt;a href="https://www.elastic.co/guide/en/observability/current/apm-open-telemetry.html"&gt;&lt;span style="font-size: 12pt;"&gt;telemetry data&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; (logs, metrics, and traces) to parse your performance insights.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;3. End-to-end visibility:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Monitor the application across the entire environment, the entire user flow, and all layers, from frontend to backend.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;4. User-centric approach:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Prioritize performance and experience from an end-user perspective, while considering key business objectives.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;5. Real user monitoring: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;The work doesn’t stop when it’s in your user’s hands. By monitoring their experience, you can iterate and improve based on their feedback.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;6. Continuous improvement:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Use insights to optimize over time and regularly uncover and tackle unreported issues. Issues should be addressed dynamically rather than when discovered in periodic performance reviews. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;7. Context propagation:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Ensure trace context flows through your entire request path, especially across service boundaries:&lt;/span&gt;&lt;/p&gt;# Outgoing request - inject context
headers = {}
propagate.inject(headers)
response = requests.post('http://service-b/process', headers=headers)
&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;8. Sampling strategy:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Use intelligent sampling to balance visibility with performance:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;1%–10% head-based sampling for high-traffic services&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;100% sampling for errors and slow requests using tail-based sampling&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Monitor instrumentation overhead — aim for &amp;lt;5% performance impact&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;@RestController
public class OrderController {
    
    @PostMapping("/orders")
    public ResponseEntity createOrder(@RequestBody OrderRequest request) {
        // Auto-instrumentation captures this endpoint automatically
        // Add custom business context
        Span.current().setAttributes(Attributes.of(
            stringKey("order.value"), String.valueOf(request.getTotal()),
            stringKey("user.tier"), request.getUserTier()
        ));
        
        return ResponseEntity.ok(processOrder(request));
    }
}&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Do:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Implement sampling strategies and monitor instrumentation overhead in production.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Don't: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Use 100% sampling for high-traffic services — you'll impact performance and explode storage costs.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Pitfall:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Head-based sampling can miss critical error traces. Use tail-based sampling to capture all errors while reducing volume.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Here’s how to get it right:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Select the right APM solution:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; The right APM tool should align with an application's architecture and the organization's needs. The solution should provide an organization with the tools and capabilities it needs to monitor, track, measure, and analyze its software applications. A business may use OpenTelemetry, an open source observability framework, to instrument and collect telemetry data (&lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/traces"&gt;&lt;span style="font-size: 12pt;"&gt;traces&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;, &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/observability-metrics"&gt;&lt;span style="font-size: 12pt;"&gt;metrics&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;, and &lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/log-files"&gt;&lt;span style="font-size: 12pt;"&gt;logs&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;) from applications. &lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Manage cardinality to control costs:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; High-cardinality attributes can make metrics unusable and expensive:&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;# Good - bounded cardinality
span.set_attribute("user.tier", user.subscription_tier)  # 3-5 values
span.set_attribute("http.status_code", response.status_code)  # ~10 values

# Bad - unbounded cardinality  
span.set_attribute("user.id", user.id)  # Millions of values
span.set_attribute("request.timestamp", now())  # Infinite values
&lt;ul&gt;&lt;li&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Set up intelligent alerting based on SLOs rather than arbitrary thresholds.&lt;/strong&gt;&lt;/span&gt; &lt;span style="font-size: 12pt;"&gt;Use error budgets to determine when to page someone:&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;slos:
  - name: checkout_availability
    target: 99.9%
    window: 7d
  - name: checkout_latency  
    target: 95%  # 95% of requests under 500ms
    window: 7d
&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Train teams and promote collaboration.&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; An APM strategy impacts a wide range of stakeholders, not just developers. Be sure to involve IT teams and other business stakeholders in cross-departmental collaboration. Work together by implementing APM into your &lt;/span&gt;&lt;a href="https://www.elastic.co/docs/reference/search-ui/guides-analyzing-performance"&gt;&lt;span style="font-size: 12pt;"&gt;organizational setup&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;. Make sure to establish clear goals and KPIs that align with business needs and consider user experience. &lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Review and evaluate. &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;An APM strategy continues to evolve and change alongside application and business needs.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;order_processing_duration = Histogram(
    "order_processing_seconds",
    "Time to process orders", 
    ["payment_method", "order_size"]
)

with order_processing_duration.labels(
    payment_method=payment.method,
    order_size=get_size_bucket(order.total)
).time():
    process_order(order)
&lt;ul&gt;&lt;li&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Synthetic monitoring: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Simulates user interactions to detect issues before real users are affected.&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Critical for external dependencies:&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;// Synthetic check for critical user flow
const syntheticCheck = async () =&amp;gt; {
    const span = tracer.startSpan('synthetic.checkout_flow');
    try {
        await loginUser();
        await addItemToCart();
        await completePurchase();
        span.setStatus({code: SpanStatusCode.OK});
    } catch (error) {
        span.recordException(error);
        span.setStatus({code: SpanStatusCode.ERROR});
        throw error;
    } finally {
        span.end();
    }
};
&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Deep-dive diagnostics and profiling:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Helps troubleshoot complex performance bottlenecks, which could include third-party plugins or tools. Through application profiling, you can go deeper into your data and analyze how it is performing according to its functions.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Distributed tracing:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Essential for microservices architectures. Handle context propagation carefully across async boundaries:&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;# Event-driven systems - propagate context through messages
def publish_order_event(order_data):
    headers = {}
    propagate.inject(headers)
    
    message = {
        'data': order_data,
        'trace_headers': headers  # Preserve trace context
    }
    kafka_producer.send('order-events', message)
APM data analysis and insights&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Monitoring and gathering data is just the beginning. Businesses need to understand how to interpret application performance management data for tuning and decision-making.&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Identifying trends and patterns&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; helps teams proactively detect issues. Use correlation analysis to link user complaints with backend performance. See an example here using &lt;/span&gt;&lt;a href="https://www.elastic.co/docs/explore-analyze/query-filter/languages/esql"&gt;&lt;span style="font-size: 12pt;"&gt;ES|QL (Elastic’s query language)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;:&lt;/span&gt;&lt;/p&gt;FROM traces-apm*
| WHERE user.id == "user_12345" 
  AND @timestamp &amp;gt;= "2024-06-06T09:00:00" 
  AND @timestamp &amp;lt;= "2024-06-06T10:00:00"
| EVAL duration_ms = transaction.duration.us / 1000
| KEEP trace.id, duration_ms, transaction.name, service.name, transaction.result
| WHERE duration_ms &amp;gt; 2000
| SORT duration_ms DESC
| LIMIT 10
&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Detecting bottlenecks: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;APM reveals common performance anti-patterns such as n+1 problems that can be seen in the code below.&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Use APM to optimize the code:&lt;/span&gt;&lt;/p&gt;# N+1 query problem detected by APM
def get_user_orders_slow(user_id):
    user = User.query.get(user_id)
    orders = []
    for order_id in user.order_ids:  # Each iteration = 1 DB query
        orders.append(Order.query.get(order_id))
    return orders

# Optimized after APM analysis
def get_user_orders_fast(user_id):
    return Order.query.filter(Order.user_id == user_id).all()  # Single query
&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Correlating metrics&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; and linking user complaints with backend performance data, including historical data, reveals how different parts of the system interact. This can help teams accurately diagnose root causes and understand the full impact of performance issues.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Automating &lt;/strong&gt;&lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/root-cause-analysis"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;root cause analysis&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; and using AI/machine learning-based tools such as &lt;/span&gt;&lt;a href="https://www.elastic.co/observability/aiops"&gt;&lt;span style="font-size: 12pt;"&gt;AIOps&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; helps to accelerate diagnostics and resolution by pinpointing the source of problems, reducing downtime, and freeing up resources.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;It’s important to use a holistic picture of your data to inform future decisions. The more data you have, the more you can leverage.&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Do: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Use distributed traces to identify the specific service and operation causing slowdowns.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Don't:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Assume correlation means causation — verify with code-level profiling data.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Pitfall:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Legacy systems often appear as black boxes in traces. Use log correlation and synthetic spans to maintain visibility.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;// Java - Auto-propagation with Spring Cloud
@PostMapping("/orders")
public ResponseEntity createOrder(@RequestBody OrderRequest request) {
    Span.current().setAttributes(Attributes.of(
        stringKey("order.type"), request.getOrderType(),
        longKey("order.value"), request.getTotalValue()));
    
    // OpenFeign automatically propagates context to downstream services
    return paymentClient.processPayment(request.getPaymentData());}
// Go - Manual context extraction and propagation
func processHandler(w http.ResponseWriter, r *http.Request) {
    ctx := otel.GetTextMapPropagator().Extract(r.Context(), 
                                              propagation.HeaderCarrier(r.Header))
    ctx, span := tracer.Start(ctx, "process_payment")
    defer span.End()
    // Continue with trace context maintained}&lt;p&gt;&lt;span style="color: rgb(55, 71, 79); font-size: 12pt;"&gt;&lt;strong&gt;Legacy&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span style="color: rgb(55, 71, 79); font-size: 12pt;"&gt;&lt;strong&gt;s&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;ystem integration:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Create observability bridges for systems that can't be directly instrumented:&lt;/span&gt;&lt;/p&gt;# Synthetic spans with correlation IDs for mainframe calls
with tracer.start_as_current_span("mainframe.account_lookup") as span:
    correlation_id = format(span.get_span_context().trace_id, '032x')
    
    logger.info("CICS call started", extra={
        "correlation_id": correlation_id,
        "trace_id": span.get_span_context().trace_id
    })
    
    result = call_mainframe_service(account_data, correlation_id)
    span.set_attribute("account.status", result.status)
&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Advanced trace analysis with ES|QL: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Link user complaints to backend performance using &lt;/span&gt;&lt;a href="https://www.elastic.co/elasticsearch/piped-query-language"&gt;&lt;span style="font-size: 12pt;"&gt;Elastic's query language&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;:&lt;/span&gt;&lt;/p&gt;-- Find slow requests during complaint timeframe
FROM traces-apm*
| WHERE user.id == "user_12345" AND @timestamp &amp;gt;= "2024-06-06T09:00:00"
| EVAL duration_ms = transaction.duration.us / 1000
| WHERE duration_ms &amp;gt; 2000
| STATS avg_duration = AVG(duration_ms) BY service.name, transaction.name
| SORT avg_duration DESC

-- Correlate errors across service boundaries
FROM traces-apm*
| WHERE trace.id == "44b3c2c06e15d444a770b87daab45c0a"
| EVAL is_error = CASE(transaction.result == "error", 1, 0)
| STATS error_rate = SUM(is_error) / COUNT(*) * 100 BY service.name
| WHERE error_rate &amp;gt; 0
&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Event-driven architecture patterns:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Explicitly propagate context through message headers for async processing:&lt;/span&gt;&lt;/p&gt;# Producer - inject context into message
headers = {}
propagate.inject(headers)
message = {
    'data': order_data,
    'trace_headers': headers  # Preserve trace context
}
await kafka_producer.send('order-events', message)

# Consumer - extract and continue trace
trace_headers = message.get('trace_headers', {})
context = propagate.extract(trace_headers)
with tracer.start_as_current_span("order.process", context=context):
    await process_order(message['data'])
&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Do: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Use &lt;/span&gt;&lt;a href="https://www.elastic.co/docs/explore-analyze/query-filter/languages/esql"&gt;&lt;span style="font-size: 12pt;"&gt;ES|QL&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; for complex trace analysis that traditional dashboards can't handle.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Don't:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Try to instrument legacy systems directly — use correlation IDs and synthetic spans.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Pitfall:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Message queues and async processing break trace context unless explicitly propagated through headers.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Key insight:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Perfect instrumentation isn't always possible. Strategic use of correlation IDs, synthetic spans, and intelligent querying provides comprehensive observability even in complex, hybrid environments.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/apm-best-practices-dos-and-donts-guide-for-practitioners-67f670df/</guid><pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate></item><item><title>SOC analyst vs. security analyst: What’s the difference?</title><link>https://yieldsfalsehood.com/aeolus/posts/soc-analyst-vs-security-analyst-whats-the-difference-9c306b35/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;A &lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/security-operations-center"&gt;&lt;span style="font-size: 12pt;"&gt;security operations center (SOC) &lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;analyst enhances your security posture by defending the organization against &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/cybersecurity-threats"&gt;&lt;span style="font-size: 12pt;"&gt;cybersecurity threats&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;. Responsible for monitoring, detecting, investigating, and responding to cyber threats, the SOC analyst is the first line of defense in keeping the organization’s IT ecosystem secure when an incident arises. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;A security analyst, similar to a SOC analyst, is responsible for proactive defense and security posture. However, security analysts tend to have a more strategic, preventive focus and may or may not work within the &lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/security-operations-center"&gt;&lt;span style="font-size: 12pt;"&gt;SOC&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;With such critical responsibilities, what does it take to become a SOC analyst or security analyst? Let’s explore the job, required skills, and the career path of both.&lt;/span&gt;&lt;/p&gt;Challenges SOC analysts face&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;With a job so rewarding and critical for an organization, it’s no surprise that SOC analysts face many challenges. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;1. Alert fatigue:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; SOC analysts are overwhelmed by the volume of alerts, including false positives, generated by security tools. All these alerts require attention, triage, and intervention, potentially leading SOC analysts to overlook critical threats. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The potential solution: &lt;/span&gt;&lt;a href="https://www.elastic.co/security/ai"&gt;&lt;span style="font-size: 12pt;"&gt;AI-driven security analytics&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; significantly reduces the noise and prioritizes critical alerts, saving security analysts time and effort.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;2. High stress levels and burnout:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; SOC analysts operate in a high-pressure environment, amid constant demands to respond to yet another threat. Then, there’s the added pressure of a dynamic threat landscape and the need to keep up with emerging and advanced threat actors, new vulnerabilities, and attack techniques. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The potential solution: An &lt;/span&gt;&lt;a href="https://www.elastic.co/elasticsearch/ai-assistant"&gt;&lt;span style="font-size: 12pt;"&gt;AI Assistant&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; can help security analysts gain quicker insights and analysis and respond to threats faster and more efficiently.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;3. Fear of being replaced by AI:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; As SOC analysts begin to rely on AI to make their jobs easier, many question whether their jobs will become obsolete. An AI Assistant can already triage alerts and monitor networks for threats more effectively than a junior security analyst. What will happen tomorrow?&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 12pt;"&gt;The potential solution: AI won’t replace SOC teams, but it will &lt;/span&gt;&lt;a href="https://www.elastic.co/lp/security/ai-assistant-resume"&gt;&lt;span style="font-size: 12pt;"&gt;fundamentally transform the role&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; of tier 1 SOC analysts. Analysts will be able to forget about time-consuming manual tasks and get AI help in elevating their skills, so they can focus on more rewarding investigations and threat hunting.&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/soc-analyst-vs-security-analyst-whats-the-difference-9c306b35/</guid><pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate></item><item><title>How AI and contextual search enhance defence cybersecurity</title><link>https://yieldsfalsehood.com/aeolus/posts/how-ai-and-contextual-search-enhance-defence-cybersecurity-e7789892/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;In today’s defence environment, information is abundant, yet insight often remains elusive. While data pours in from every connected system, every edge device, and every digital touchpoint, security teams still spend too much time stitching together fragmented inputs, hunting for signals, and navigating silos just to answer basic questions. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;In defence cybersecurity, every minute spent digging through disconnected security logs is a minute adversaries can exploit. Each missed correlation or delayed response undermines the confidence of leadership, increases risk, and erodes operational advantage. &lt;br&gt;&lt;br&gt;Today’s &lt;/span&gt;&lt;a href="https://www.elastic.co/what-is/secops"&gt;&lt;span style="font-size: 12pt;"&gt;security operations&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; teams are tasked with monitoring exponentially growing volumes of data across fragmented systems, often without the time, context, or personnel needed to turn information into action. As threats grow more sophisticated and move at machine speed, legacy search and analysis processes become a liability. Investigations take too long. Alerts go untriaged. And decisions are made on incomplete data, putting missions and teams at risk.&lt;/span&gt;&lt;/p&gt;Security intelligence that’s battle-tested, not just boardroom-proven&lt;p&gt;&lt;a href="https://www.elastic.co/security"&gt;&lt;span style="font-size: 12pt;"&gt;Elastic's security capabilities&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; received rigorous testing in NATO's&lt;/span&gt;&lt;a href="https://www.elastic.co/blog/nation-states-prepare-cyber-threats-locked-shields"&gt;&lt;span style="font-size: 12pt;"&gt; Locked Shields&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; exercise, one of the world's largest live-fire cybersecurity simulations. During the event, blue teams — defensive cybersecurity units — deployed a comprehensive security architecture integrating multiple data sources: OS event logs, PowerShell logs, firewall/IPS/IDS data, threat intelligence feeds, and endpoint detection and response capabilities. The environment mirrored real-world defence operations, with the &lt;/span&gt;&lt;a href="https://www.elastic.co/elasticsearch/common-schema"&gt;&lt;span style="font-size: 12pt;"&gt;Elastic Common Schema&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; (ECS) normalising disparate data sources to streamline detection workflows. Security teams gained unified visibility across their entire digital estate through preconfigured dashboards that simplified complex analysis tasks.&lt;br&gt;&lt;br&gt;Protection capabilities included malware and ransomware prevention, malicious behaviour analysis, memory threat protection, and credential hardening. All detection rules mapped to the&lt;/span&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/MITRE-ATTCK-framework"&gt;&lt;span style="font-size: 12pt;"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;MITRE ATT&amp;amp;CK framework,&lt;/span&gt;&lt;span style="font-size: 0.6em;"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; enabling teams to understand adversary tactics and techniques while measuring defensive coverage. The exercise also tested defensive resilience. Red teams — simulating sophisticated threat actors with advanced persistent capabilities — actively attempted to disable security tools. Features like agent tamper protection ensured monitoring remained intact even under direct attack — a critical capability in contested environments.&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/how-ai-and-contextual-search-enhance-defence-cybersecurity-e7789892/</guid><pubDate>Wed, 02 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Enhanced monitoring of Amazon EKS with Elastic add-on capabilities</title><link>https://yieldsfalsehood.com/aeolus/posts/enhanced-monitoring-of-amazon-eks-with-elastic-add-on-capabilities-0a51a643/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Amazon Elastic Kubernetes Service (EKS) makes running Kubernetes on AWS simple and scalable. But as your workloads grow, so does the need for robust monitoring and observability. Enter &lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Elastic Agent&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;, a powerful, unified way to collect logs, metrics, and security data from your EKS clusters, all managed through Elastic Fleet. In this blog, we’ll walk through how to set up Elastic Agent on EKS, highlight key considerations, and share some tips for getting the most out of your monitoring stack.&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt6bb8b4c3a1618135/68641ade02c701299db94eb2/Elastic-Agent-EKS-add-on.png,Elastic-Agent-EKS-add-on.png&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Once the Elastic Agent is deployed in a pod, it automatically enrolls with Fleet, Elastic’s centralized management system, using the specified configuration values. After enrollment, Fleet provides full control over the agent, including its health status, configuration of integrations, and data ingestion. This setup enables centralized observability and security by ingesting and analyzing data in Elasticsearch, with visualization and management provided through Kibana.&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt5e3108df764baac1/68641b1dbf423e9e9edd790b/fleet.png,fleet.pngStep-by-Step: Deploying Elastic Agent on Amazon EKS&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Let’s break down the process, based on &lt;/span&gt;&lt;a href="https://www.elastic.co/docs/reference/fleet/running-on-eks-managed-by-fleet#step-2-select-the-elastic-agent-add-on"&gt;&lt;span style="font-size: 12pt;"&gt;Elastic’s official documentation&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;:&lt;/span&gt;&lt;/p&gt;agent:
   fleet:
      enabled: true
      url: 
      token: &lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Apply the configuration&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; and deploy the add-on to your EKS cluster.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt7300dd074502dc14/68641b2bf44b170fd878aec2/elastic-agent.png,elastic-agent.png&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Note&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;: We recommend selecting configuration Override.&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/enhanced-monitoring-of-amazon-eks-with-elastic-add-on-capabilities-0a51a643/</guid><pubDate>Tue, 01 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Airtel is strengthening security operations with Elastic’s AI-driven analytics</title><link>https://yieldsfalsehood.com/aeolus/posts/airtel-is-strengthening-security-operations-with-elastics-ai-driven-analytics-28e4bbe8/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;In a previous &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/airtel-managed-security-services-elastic-security"&gt;&lt;span style="font-size: 12pt;"&gt;blog post&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;, we covered how Airtel’s (a leading telecommunications provider) managed security services (MSS), powered by Elastic Security, provide real-time threat detection, advanced analytics, and cloud security for enterprise customers. By using SIEM, endpoint protection, cloud security, and threat intelligence, Airtel enhances proactive threat hunting and incident response. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;In this blog, we will explore AI-driven features of Elastic Security like AI Assistant, Attack Discovery, and onboarding of custom data with Automatic Import.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Elastic AI Assistant for Security: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Elastic AI Assistant for Security enhances analyst efficiency by providing intelligent recommendations, automated threat hunting queries, and contextual insights. This reduces manual effort, accelerates triage, and empowers MSSPs to respond to incidents with greater precision.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Automatic Import: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Automatic Import automates the development of custom data integrations with generative AI, cutting the effort needed to create and validate custom integrations from up to several days to less than 10 minutes and significantly lowering the learning curve for onboarding data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;GenAI-powered security features: &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;Elastic Security’s GenAI features improve anomaly detection, behavioral analytics, and predictive threat modeling. With machine learning-driven insights, MSSPs can proactively mitigate risks before they result in full-scale attacks.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;These capabilities enhance operational efficiency, reduce alert fatigue through automated prioritization, and ensure scalable, cost-effective security operations.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The above features offer significant benefits to Airtel MSS by enhancing their ability to deliver comprehensive security solutions to their customers, like:&lt;/span&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Enhanced threat detection and response:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Elastic's Attack Discovery uses AI-driven insights to identify and respond to threats more effectively. This capability allows Airtel to detect anomalies and potential security incidents quickly, reducing the mean time to detect (MTTD) and respond (MTTR) to threats.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Search AI powered insights:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Elastic AI Assistant for Security provides Airtel with advanced capabilities to generate queries and visualizations, reducing the learning curve for security investigations. This tool helps analysts interactively explore problems and execute remedies using generative AI, which accelerates incident management and root cause analysis.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Scalability and flexibility:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Elastic's Search AI Platform is designed to handle large volumes of data, making it suitable for Airtel managing multiple clients with varying data needs. The platform's ability to ingest and analyze data from any source ensures that Airtel can provide tailored security solutions to its clients.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Cost-efficiency:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; By consolidating multiple security tools into a single platform, Elastic helps MSSPs reduce operational costs. The unified data store eliminates the need for data rehydration, enabling long-term historical analysis and reducing storage costs.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Improved collaboration and productivity:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Elastic's solutions facilitate better collaboration between technical and business teams by providing a single pane of glass for security operations. This integration reduces manual troubleshooting processes and enhances productivity by automating routine tasks.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Future-proofed security operations:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; With features like cross-cluster search and AI-driven anomaly detection, Elastic ensures that Airtel can adapt to evolving security challenges and regulatory requirements. The platform's open and extensible architecture supports seamless integration with existing technology ecosystems.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Upskilling and empowerment:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; AI Assistant for Security helps upskill junior analysts by guiding them through detection, analysis, and remediation processes. This capability not only enhances resource efficiency but also contributes to the sustainable development of talent within Airtel organizations.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Elastic AI Assistant for Security and Attack Discovery are transforming how Airtel Secure SOC operates by drastically reducing alert fatigue and investigation timelines. Through contextual threat summarization and natural language interaction, analysts can triage and resolve alerts significantly faster.&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt943e8259e83c4bd3/685e1e635f487a3d35b3ff84/altert-summary-dashboard.png,altert-summary-dashboard.png&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="color: rgb(52, 55, 65); font-size: 12pt;"&gt;&lt;strong&gt;Business growth enabled:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;50% faster onboarding of new customers using AI-powered detection rules and prebuilt integration templates&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="color: rgb(52, 55, 65); font-size: 12pt;"&gt;&lt;strong&gt;Cost optimization:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;25% lower operational cost per customer cluster due to Elastic’s horizontal scaling, pay-per-ingest pricing, and unified agent model&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blte1e21b38c8e43172/685e1e9866fc096e14d3fead/elastic-managed-integrations.png,elastic-managed-integrations.pngElastic managed integrations for scalable, multi-tenant visibility&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Airtel MSS uses over 100 Elastic-built integrations to expand the range of data sources of its customers. Airtel’s MSSP platform spans 30+ Elastic customer deployments, powering ingestion from diverse endpoints, firewalls, cloud services, and business systems.&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Airtel manages multiple customer environments, ensuring data isolation and compliance.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt9766206baa9f497c/685e1ebfe3e0bbed8fa48433/compliance-dashboard.png,compliance-dashboard.png&lt;ul&gt;&lt;li&gt;&lt;span style="font-size: 12pt;"&gt;Elastic’s cloud-native architecture scales dynamically, handling high-volume data ingestion without performance bottlenecks.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/bltbd215a2c53d6f36d/685e1ef75f487a7f1fb3ff8c/high-volume-data-ingestion.png,high-volume-data-ingestion.png&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Onboarding automation engine: One-click deployment and agent assignment&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Role-based access control (RBAC) for per-customer data and dashboard segregation&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;&lt;em&gt;The release and timing of any features or functionality described in this post remain at Elastic's sole discretion. Any features or functionality not currently available may not be delivered on time or at all.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;&lt;em&gt;In this blog post, we may have used or referred to third party generative AI tools, which are owned and operated by their respective owners. Elastic does not have any control over the third party tools and we have no responsibility or liability for their content, operation or use, nor for any loss or damage that may arise from your use of such tools. Please exercise caution when using AI tools with personal, sensitive or confidential information. Any data you submit may be used for AI training or other purposes. There is no guarantee that information you provide will be kept secure or confidential. You should familiarize yourself with the privacy practices and terms of use of any generative AI tools prior to use. &lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 10pt;"&gt;&lt;em&gt;Elastic, Elasticsearch, and associated marks are trademarks, logos or registered trademarks of Elasticsearch N.V. in the United States and other countries. All other company and product names are trademarks, logos or registered trademarks of their respective owners.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/airtel-is-strengthening-security-operations-with-elastics-ai-driven-analytics-28e4bbe8/</guid><pubDate>Fri, 27 Jun 2025 00:00:00 GMT</pubDate></item><item><title>Congratulations to our first Elastic Verified Generative AI Sales Partners</title><link>https://yieldsfalsehood.com/aeolus/posts/congratulations-to-our-first-elastic-verified-generative-ai-sales-partners-061ff099/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The tech industry is bursting with new tools to help teams build production-ready AI applications without requiring advanced technical knowledge. But even so, many businesses still struggle to move beyond AI pilots to scalable, secure solutions that deliver real business value. The complexity of integrating multiple AI models, managing enterprise data, and ensuring security often leaves teams stuck in endless proof-of-concept cycles.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;That's exactly why we created our Verified Generative AI Partner certification.&lt;/span&gt;&lt;/p&gt;Why choose a Verified Elastic AI Partner seller?&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Our verified partners can help developers leverage the Elastic AI Ecosystem with their:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Deep expertise:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Certified partners have proven their deep knowledge and understanding of Elastic AI technologies.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Strategic support:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; They can provide expert guidance and support throughout the implementation and optimization process.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Innovative approaches:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Verified AI partners are at the forefront of AI innovation and can help you stay ahead of the curve.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Proven reliability:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; They’ve earned our trust with a proven track record of success and commitment to innovation, and we know they’ll earn yours, too.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/congratulations-to-our-first-elastic-verified-generative-ai-sales-partners-061ff099/</guid><pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate></item><item><title>Elastic Cloud Serverless now generally available on Microsoft Azure</title><link>https://yieldsfalsehood.com/aeolus/posts/elastic-cloud-serverless-now-generally-available-on-microsoft-azure-e4044905/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Today, we are excited to announce the general availability of Elastic Cloud Serverless on Microsoft Azure — now available in the EastUS region. Elastic Cloud Serverless provides the fastest way to start and scale security, observability, and search solutions without managing infrastructure. Built on the industry-first &lt;/span&gt;&lt;a href="https://www.elastic.co/blog/search-ai-lake-elastic-cloud-serverless"&gt;&lt;span style="font-size: 12pt;"&gt;Search AI Lake architecture&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt; — which relies on Azure Blob Storage — it combines vast storage, separate storage and compute, low-latency querying, and advanced AI capabilities to deliver uncompromising speed and scale.&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/elastic-cloud-serverless-now-generally-available-on-microsoft-azure-e4044905/</guid><pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate></item><item><title>Elastic's journey to build Elastic Cloud Serverless</title><link>https://yieldsfalsehood.com/aeolus/posts/elastic-s-journey-to-build-elastic-cloud-serverless-0195a471/</link><dc:creator>Elastic</dc:creator><description>&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;How do you take a stateful, performance-critical system like Elasticsearch and make it serverless?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;At Elastic, we reimagined everything — from storage to orchestration — to build a truly serverless platform that customers can trust.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Elastic Cloud Serverless is a fully managed, cloud-native platform designed to bring the power of Elastic Stack to developers without the operational burden. In this blog post, we will walk you through why we built it, how we approached the architecture, and what we learned along the way.&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt9f8cd60b46d8cd65/685d01ca9f5d27e1aa1435b8/diagram.png,diagram.pngOptimizing object store efficiency&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;While the shift to object storage delivered operational and durability benefits, it introduced a new challenge: object store API costs. Writes to Elasticsearch — particularly translog updates and refreshes — translate directly into object store API calls, which can scale up quickly and unpredictably, especially under high-ingestion or high-refresh workloads.&lt;br&gt;&lt;br&gt;To address this, we implemented a per-node translog buffering mechanism that coalesces writes before flushing to the object store, significantly reducing write amplification. We also decoupled refreshes from object store writes, instead sending refreshed segments directly to search nodes while deferring object store persistence. This architectural refinement reduced refresh-related object store API calls by two orders of magnitude, with no compromise to data durability. For more details, please refer to this &lt;/span&gt;&lt;a href="https://www.elastic.co/search-labs/blog/elasticsearch-refresh-costs-serverless"&gt;&lt;span style="font-size: 12pt;"&gt;blog post&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;.&lt;/span&gt;&lt;/p&gt;Managing infrastructurehttps://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt19bd38934784231e/685d01e91f43fc7d2ab17b11/managing-infrastructure.png,managing-infrastructure.png&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The &lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Unified layer&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; is the operator-facing management layer, providing Kubernetes CRDs for service owners to manage their Kubernetes clusters. They are able to define parameters including the CSP, region, and type (explained in the next section). It enriches operators' requests and forwards them to the Management layer.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The &lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Management layer&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; acts as a proxy between the Unified layer and CSP APIs, transforming requests from the Unified layer to CSP resource requests and reporting the status back to the Unified layer.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;In our current setup, we maintain two management Kubernetes clusters for each CSP within every environment. This dual-cluster approach primarily serves two key purposes. Firstly, it allows us to effectively address potential scalability concerns that may arise with Crossplane. Secondly, and more importantly, it enables us to use one of the clusters as a canary environment. This canary deployment strategy facilitates a phased rollout of our changes, starting with a smaller, controlled subset of each environment, minimizing risk.&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 12pt;"&gt;The &lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Workload layer&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; contains all the kubernetes workload clusters running applications that users interact with (Elasticsearch, Kibana, MIS, etc.).&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt8e4fc6951b81026b/685d020712948f2738752da4/the-push-model.png,the-push-model.png&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The &lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Control Plane&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; is the user-facing management layer. We provide UIs and APIs for users to manage their Elastic Cloud Serverless projects. This is where users can create new projects, control who has access to their projects, and get an overview of their projects.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The &lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Data Plane&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; is the infrastructure layer that powers the Elastic Cloud Serverless projects and that users interact with when they want to use their projects.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;A fundamental design decision we faced was how the global control plane should communicate with Kubernetes clusters in the data plane. We explored two models:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Push Model:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; The control plane proactively pushes configurations to regional Kubernetes clusters.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;&lt;strong&gt;Pull Model:&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt; Regional Kubernetes clusters periodically fetch configurations from the control plane.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;After evaluating both approaches, we adopted the Push Model due to its simplicity, unidirectional data flow, and ability to operate Kubernetes clusters independently from the control plane during failures. This model allowed us to maintain straightforward scheduling logic while reducing operational overhead and failure recovery complexities.&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt91e62aeaab98cdc5/685d0241b1848748d8921f0c/intelligent-scaling-strategy.png,intelligent-scaling-strategy.png&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;This layered, intelligent scaling strategy ensures performance and efficiency across diverse workloads — and it’s a big step toward a truly serverless platform.&lt;br&gt;&lt;br&gt;Elastic Cloud Serverless introduces nuanced autoscaling capabilities tailored for the search tier — leveraging inputs such as boosted data windows, search power settings, and search load metrics (including thread pool load and queue load). These signals work together to define baseline configurations and trigger dynamic scaling decisions based on customer search usage patterns. For a deeper dive into search tier autoscaling, read this &lt;/span&gt;&lt;a href="https://www.elastic.co/search-labs/blog/elasticsearch-serverless-tier-autoscaling"&gt;&lt;span style="font-size: 12pt;"&gt;blog post&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;. To learn more about how indexing tier autoscaling works, check out this &lt;/span&gt;&lt;a href="https://www.elastic.co/search-labs/blog/elasticsearch-ingest-autoscaling"&gt;&lt;span style="font-size: 12pt;"&gt;blog post&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;.&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/bltb877b4aa825b8b3c/685d025b52f9c8c8bae90453/Usage-pipeline.png,Usage-pipeline.pngBilling pipeline&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;Once usage records are deposited in object storage, the billing pipeline picks up the data and turns it into quantities of ECU (Elastic Consumption Units, our currency-agnostic billing unit) that we bill for. The basic process looks like this:&lt;/span&gt;&lt;/p&gt;https://static-www.elastic.co/v3/assets/bltefdd0b53724fa2ce/blt84a2bec3a76f3437/685d026f4641882bbf60097f/billing-pipeline.png,billing-pipeline.png&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;A transform process consumes the metered usage records from object storage and turns them into records that can actually be billed. This process involves unit conversion (the metered application may measure storage in bytes, but we may bill in GB), filtering out usage sources that we don't bill for, mapping the record to a specific product (this involves parsing metadata in the usage records to tie the usage to a solution-specific product that has a unique price), and sending this data to an Elasticsearch cluster which is queried by our billing engine. The purpose of this transform stage is to provide a centralized place where logic lives to convert the generic metered usage records into product-specific quantities that are ready to be priced. This enables us to keep this specialized logic out of the metered applications and the billing engine, which we want to keep simple and product-agnostic.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 12pt;"&gt;The billing engine then rates these billable usage records, which now contain an identifier that maps to a product in our prices database. At a minimum, this process entails summing the usage over a given period and multiplying the quantity by the product's price to compute the ECUs. In some cases, it must additionally segment the usage into tiers based on cumulative usage throughout the month and map these to individually priced product tiers. In order to tolerate delays in the upstream process without missing records, usage is billed at the time it arrives in the billable usage datastore, but it’s priced according to when it occurred (to ensure we don't apply the wrong price for usage that arrived "late"). This provides a "self-healing" capability to our billing process.&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 12pt;"&gt;Finally, once the ECUs are computed, we assess any add-on costs (such as for support) and then feed this into the billing calculations, which ultimately result in an invoice (sent by us or one of our &lt;/span&gt;&lt;a href="https://www.elastic.co/partners/cloud-marketplace"&gt;&lt;span style="font-size: 12pt;"&gt;cloud marketplace partners&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 12pt;"&gt;). This final part of the process is not new or unique to Serverless and is handled by the same systems that bill our Hosted product.&lt;/span&gt;&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/elastic-s-journey-to-build-elastic-cloud-serverless-0195a471/</guid><pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate></item></channel></rss>