Skip to content

Commit 70151e9

Browse files
[explore analyze] Move images (#866)
Moves images per elastic/docs-builder#774 in preparation for docs-assembler.
1 parent f9d1fd6 commit 70151e9

File tree

669 files changed

+1003
-555
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

669 files changed

+1003
-555
lines changed

explore-analyze/alerts-cases/alerts.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ For example, when monitoring a set of servers, a rule might:
2828

2929
Each project type supports a specific set of rule types. Each *rule type* provides its own way of defining the conditions to detect, but an expression formed by a series of clauses is a common pattern. For example, in an {{es}} query rule, you specify an index, a query, and a threshold, which uses a metric aggregation operation (`count`, `average`, `max`, `min`, or `sum`):
3030

31-
:::{image} ../../images/serverless-es-query-rule-conditions.png
31+
:::{image} /explore-analyze/images/serverless-es-query-rule-conditions.png
3232
:alt: UI for defining rule conditions in an {{es}} query rule
3333
:screenshot:
3434
:::
@@ -56,14 +56,14 @@ Each action uses a connector, which provides connection information for a {{kib}
5656

5757
After you select a connector, set the *action frequency*. If you want to reduce the number of notifications you receive without affecting their timeliness, some rule types support alert summaries. For example, if you create an {{es}} query rule, you can set the action frequency such that you receive summaries of the new, ongoing, and recovered alerts on a custom interval:
5858

59-
:::{image} ../../images/serverless-es-query-rule-action-summary.png
59+
:::{image} /explore-analyze/images/serverless-es-query-rule-action-summary.png
6060
:alt: UI for defining rule conditions in an {{es}} query rule
6161
:screenshot:
6262
:::
6363

6464
Alternatively, you can set the action frequency such that the action runs for each alert. If the rule type does not support alert summaries, this is your only available option. You must choose when the action runs (for example, at each check interval, only when the alert status changes, or at a custom action interval). You must also choose an action group, which affects whether the action runs. Each rule type has a specific set of valid action groups. For example, you can set *Run when* to `Query matched` or `Recovered` for the {{es}} query rule:
6565

66-
:::{image} ../../images/serverless-es-query-rule-recovery-action.png
66+
:::{image} /explore-analyze/images/serverless-es-query-rule-recovery-action.png
6767
:alt: UI for defining a recovery action
6868
:screenshot:
6969
:::
@@ -93,7 +93,7 @@ To get notified only once when a server exceeds the threshold, you can set the a
9393

9494
You can pass rule values to an action at the time a condition is detected. To view the list of variables available for your rule, click the "add rule variable" button:
9595

96-
:::{image} ../../images/serverless-es-query-rule-action-variables.png
96+
:::{image} /explore-analyze/images/serverless-es-query-rule-action-variables.png
9797
:alt: Passing rule values to an action
9898
:screenshot:
9999
:::
@@ -110,7 +110,7 @@ Using the server monitoring example, each server with average CPU > 0.9 is track
110110

111111
A rule consists of conditions, actions, and a schedule. When conditions are met, alerts are created that render actions and invoke them. To make action setup and update easier, actions use connectors that centralize the information used to connect with {{kib}} services and third-party integrations. The following example ties these concepts together:
112112

113-
:::{image} ../../images/serverless-rule-concepts-summary.svg
113+
:::{image} /explore-analyze/images/serverless-rule-concepts-summary.svg
114114
:alt: Rules
115115
:screenshot:
116116
:::

explore-analyze/alerts-cases/alerts/alerting-common-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ By default, rules have a `5m` timeout. Rules that run longer than this timeout a
7171

7272
and in the [details page](create-manage-rules.md#rule-details):
7373

74-
:::{image} ../../../images/kibana-rule-details-timeout-error.png
74+
:::{image} /explore-analyze/images/kibana-rule-details-timeout-error.png
7575
:alt: Rule details page with timeout error
7676
:screenshot:
7777
:::

explore-analyze/alerts-cases/alerts/alerting-getting-started.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ navigation_title: Getting started with alerts
99

1010
Alerting enables you to define *rules*, which detect complex conditions within different {{kib}} apps and trigger actions when those conditions are met. Alerting is integrated with [**{{observability}}**](../../../solutions/observability/incident-management/alerting.md), [**Security**](security-docs://reference/prebuilt-rules/index.md), [**Maps**](../../../explore-analyze/alerts-cases/alerts/geo-alerting.md) and [**{{ml-app}}**](../../../explore-analyze/machine-learning/anomaly-detection/ml-configuring-alerts.md). It can be centrally managed from **{{stack-manage-app}}** and provides a set of built-in [connectors](../../../deploy-manage/manage-connectors.md) and [rules](../../../explore-analyze/alerts-cases/alerts/rule-types.md#stack-rules) for you to use.
1111

12-
:::{image} ../../../images/kibana-alerting-overview.png
12+
:::{image} /explore-analyze/images/kibana-alerting-overview.png
1313
:alt: {{rules-ui}} UI
1414
:::
1515

@@ -36,7 +36,7 @@ For example, when monitoring a set of servers, a rule might:
3636
* Check every minute (schedule).
3737
* Send a warning email message via SMTP with subject `CPU on {{server}} is high` (action).
3838

39-
:::{image} ../../../images/kibana-what-is-a-rule.svg
39+
:::{image} /explore-analyze/images/kibana-what-is-a-rule.svg
4040
:alt: Three components of a rule
4141
:::
4242

@@ -89,15 +89,15 @@ When checking for a condition, a rule might identify multiple occurrences of the
8989

9090
Using the server monitoring example, each server with average CPU > 0.9 is tracked as an alert. This means a separate email is sent for each server that exceeds the threshold whenever the alert status changes.
9191

92-
:::{image} ../../../images/kibana-alerts.svg
92+
:::{image} /explore-analyze/images/kibana-alerts.svg
9393
:alt: {{kib}} tracks each detected condition as an alert and takes action on each alert
9494
:::
9595

9696
## Putting it all together [_putting_it_all_together]
9797

9898
A rule consists of conditions, actions, and a schedule. When conditions are met, alerts are created that render actions and invoke them. To make action setup and update easier, actions use connectors that centralize the information used to connect with {{kib}} services and third-party integrations. The following example ties these concepts together:
9999

100-
:::{image} ../../../images/kibana-rule-concepts-summary.svg
100+
:::{image} /explore-analyze/images/kibana-rule-concepts-summary.svg
101101
:alt: Rules
102102
:::
103103

explore-analyze/alerts-cases/alerts/alerting-troubleshooting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The following debugging tools are available:
3131

3232
**{{rules-ui}}** in **{{stack-manage-app}}** lists the rules available in the space you’re currently in. When you click a rule name, you are navigated to the [details page](create-manage-rules.md#rule-details) for the rule, where you can see currently active alerts. The start date on this page indicates when a rule is triggered, and for what alerts. In addition, the duration of the condition indicates how long the instance is active.
3333

34-
:::{image} ../../../images/kibana-rule-details-alerts-inactive.png
34+
:::{image} /explore-analyze/images/kibana-rule-details-alerts-inactive.png
3535
:alt: Alerting management details
3636
:screenshot:
3737
:::
@@ -40,7 +40,7 @@ The following debugging tools are available:
4040

4141
When creating or editing an index threshold rule, you see a graph of the data the rule will operate against, from some date in the past until now, updated every 5 seconds.
4242

43-
:::{image} ../../../images/kibana-index-threshold-chart.png
43+
:::{image} /explore-analyze/images/kibana-index-threshold-chart.png
4444
:alt: Index Threshold chart
4545
:screenshot:
4646
:::
@@ -77,7 +77,7 @@ The result of this HTTP request (and printed to stdout by [kbn-action](https://g
7777

7878
The **{{stack-manage-app}}** > **{{rules-ui}}** page contains an error banner that helps to identify the errors for the rules:
7979

80-
:::{image} ../../../images/kibana-rules-management-health.png
80+
:::{image} /explore-analyze/images/kibana-rules-management-health.png
8181
:alt: Rule management page with the errors banner
8282
:screenshot:
8383
:::

explore-analyze/alerts-cases/alerts/create-manage-rules.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The **{{stack-manage-app}}** > **{{rules-ui}}** UI provides a cross-app view of
1212

1313
You can find **Rules** in **Stack Management** > **Alerts and insights** > **Rules** in {{kib}} or by using the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
1414

15-
![Rules page navigation](../../../images/kibana-stack-management-rules.png "")
15+
![Rules page navigation](/explore-analyze/images/kibana-stack-management-rules.png "")
1616

1717
**{{rules-ui}}** provides a central place to:
1818

@@ -43,7 +43,7 @@ Depending on the {{kib}} app and context, you might be prompted to choose the ty
4343

4444
Each rule type provides its own way of defining the conditions to detect, but an expression formed by a series of clauses is a common pattern. For example, in an {{es}} query rule, you specify an index, a query, and a threshold, which uses a metric aggregation operation (`count`, `average`, `max`, `min`, or `sum`):
4545

46-
:::{image} ../../../images/kibana-rule-types-es-query-conditions.png
46+
:::{image} /explore-analyze/images/kibana-rule-types-es-query-conditions.png
4747
:alt: UI for defining rule conditions in an {{es}} query rule
4848
:screenshot:
4949
:::
@@ -68,14 +68,14 @@ If you choose a custom action interval, it cannot be shorter than the rule’s c
6868

6969
For example, if you create an {{es}} query rule, you can send notifications that summarize the new, ongoing, and recovered alerts on a custom interval:
7070

71-
:::{image} ../../../images/kibana-es-query-rule-action-summary.png
71+
:::{image} /explore-analyze/images/kibana-es-query-rule-action-summary.png
7272
:alt: UI for defining alert summary action in an {{es}} query rule
7373
:screenshot:
7474
:::
7575

7676
When you choose to run actions for each alert, you must specify an action group. Each rule type has a set of valid action groups, which affect when an action runs. For example, you can set **Run when** to `Query matched` or `Recovered` for the {{es}} query rule:
7777

78-
:::{image} ../../../images/kibana-es-query-rule-recovery-action.png
78+
:::{image} /explore-analyze/images/kibana-es-query-rule-recovery-action.png
7979
:alt: UI for defining a recovery action
8080
:screenshot:
8181
:::
@@ -105,7 +105,7 @@ To get notified only once when a server exceeds the threshold, you can set the a
105105

106106
You can pass rule values to an action at the time a condition is detected. To view the list of variables available for your rule, click the "add rule variable" button:
107107

108-
:::{image} ../../../images/kibana-es-query-rule-action-variables.png
108+
:::{image} /explore-analyze/images/kibana-es-query-rule-action-variables.png
109109
:alt: Passing rule values to an action
110110
:screenshot:
111111
:::
@@ -116,13 +116,13 @@ For more information about common action variables, refer to [*Rule action varia
116116

117117
The rule listing enables you to quickly snooze, disable, enable, or delete individual rules. For example, you can change the state of a rule:
118118

119-
![Use the rule status dropdown to enable or disable an individual rule](../../../images/kibana-individual-enable-disable.png "")
119+
![Use the rule status dropdown to enable or disable an individual rule](/explore-analyze/images/kibana-individual-enable-disable.png "")
120120

121121
If there are rules that are not currently needed, disable them to stop running checks and reduce the load on your cluster.
122122

123123
When you snooze a rule, the rule checks continue to run on a schedule but alerts will not generate actions. You can snooze for a specified period of time, indefinitely, or schedule single or recurring downtimes:
124124

125-
![Snooze notifications for a rule](../../../images/kibana-snooze-panel.png "")
125+
![Snooze notifications for a rule](/explore-analyze/images/kibana-snooze-panel.png "")
126126

127127
When a rule is in a snoozed state, you can cancel or change the duration of this state.
128128

@@ -143,16 +143,16 @@ You can determine the health of a rule by looking at the **Last response** in **
143143

144144
Click the rule name to access a rule details page:
145145

146-
:::{image} ../../../images/kibana-rule-details-alerts-active.png
146+
:::{image} /explore-analyze/images/kibana-rule-details-alerts-active.png
147147
:alt: Rule details page with multiple alerts
148148
:screenshot:
149149
:::
150150

151151
In this example, the rule detects when a site serves more than a threshold number of bytes in a 24 hour period. Four sites are above the threshold. These are called alerts - occurrences of the condition being detected - and the alert name, status, time of detection, and duration of the condition are shown in this view. Alerts come and go from the list depending on whether the rule conditions are met. For more information about alerts, go to [*View alerts*](view-alerts.md).
152152

153-
If there are rule actions that failed to run successfully, you can see the details on the **History** tab. In the **Message** column, click the warning or expand icon ![double arrow icon to open a flyout with the document details](../../../images/kibana-expand-icon-2.png "") or click the number in the **Errored actions** column to open the **Errored Actions** panel. In this example, the action failed because the [`xpack.actions.email.domain_allowlist`](kibana://reference/configuration-reference/alerting-settings.md#action-config-email-domain-allowlist) setting was updated and the action’s email recipient is no longer included in the allowlist:
153+
If there are rule actions that failed to run successfully, you can see the details on the **History** tab. In the **Message** column, click the warning or expand icon ![double arrow icon to open a flyout with the document details](/explore-analyze/images/kibana-expand-icon-2.png "") or click the number in the **Errored actions** column to open the **Errored Actions** panel. In this example, the action failed because the [`xpack.actions.email.domain_allowlist`](kibana://reference/configuration-reference/alerting-settings.md#action-config-email-domain-allowlist) setting was updated and the action’s email recipient is no longer included in the allowlist:
154154

155-
:::{image} ../../../images/kibana-rule-details-errored-actions.png
155+
:::{image} /explore-analyze/images/kibana-rule-details-errored-actions.png
156156
:alt: Rule histor page with alerts that have errored actions
157157
:screenshot:
158158
:::
@@ -172,7 +172,7 @@ Some rule types cannot be exported through this interface:
172172

173173
Rules are disabled on export. You are prompted to re-enable the rule on successful import.
174174

175-
:::{image} ../../../images/kibana-rules-imported-banner.png
175+
:::{image} /explore-analyze/images/kibana-rules-imported-banner.png
176176
:alt: Rules import banner
177177
:screenshot:
178178
:::

explore-analyze/alerts-cases/alerts/geo-alerting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ In **{{stack-manage-app}}** > **{{rules-ui}}**, click **Create rule**. Select th
1717

1818
When you create a tracking containment rule, you must define the conditions that it detects. For example:
1919

20-
:::{image} ../../../images/kibana-alert-types-tracking-containment-conditions.png
20+
:::{image} /explore-analyze/images/kibana-alert-types-tracking-containment-conditions.png
2121
:alt: Creating a tracking containment rule in Kibana
2222
:screenshot:
2323
:::
@@ -41,7 +41,7 @@ For each action, you must choose a connector, which provides connection informat
4141

4242
After you select a connector, you must set the action frequency. You can choose to create a summary of alerts on each check interval or on a custom interval. Alternatively, you can set the action frequency such that actions run for each alert. Choose how often the action runs (at each check interval, only when the alert status changes, or at a custom action interval). You must also choose an action group, which indicates whether the action runs when the containment condition is met or when an entity is no longer contained. Each connector supports a specific set of actions for each action group. For example:
4343

44-
:::{image} ../../../images/kibana-alert-types-tracking-containment-action-options.png
44+
:::{image} /explore-analyze/images/kibana-alert-types-tracking-containment-action-options.png
4545
:alt: Action frequency options for an action
4646
:screenshot:
4747
:::
@@ -52,7 +52,7 @@ You can further refine the conditions under which actions run by specifying that
5252

5353
You can pass rule values to an action to provide contextual details. To view the list of variables available for each action, click the "add rule variable" button. For example:
5454

55-
:::{image} ../../../images/kibana-alert-types-tracking-containment-rule-action-variables.png
55+
:::{image} /explore-analyze/images/kibana-alert-types-tracking-containment-rule-action-variables.png
5656
:alt: Passing rule values to an action
5757
:screenshot:
5858
:::

explore-analyze/alerts-cases/alerts/maintenance-windows.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ mapped_urls:
99

1010
# Maintenance windows
1111

12-
This content applies to: [![Observability](../../../images/serverless-obs-badge.svg "")](../../../solutions/observability.md) [![Security](../../../images/serverless-sec-badge.svg "")](../../../solutions/security/elastic-security-serverless.md)
12+
This content applies to: [![Observability](/explore-analyze/images/serverless-obs-badge.svg "")](../../../solutions/observability.md) [![Security](/explore-analyze/images/serverless-sec-badge.svg "")](../../../solutions/security/elastic-security-serverless.md)
1313

1414

1515
::::{warning}
@@ -40,7 +40,7 @@ In **Management > {{stack-manage-app}} > Maintenance Windows** or **{{project-se
4040

4141
When you create a maintenance window, you must provide a name and a schedule. You can optionally configure it to repeat daily, monthly, yearly, or on a custom interval.
4242

43-
:::{image} ../../../images/kibana-create-maintenance-window.png
43+
:::{image} /explore-analyze/images/kibana-create-maintenance-window.png
4444
:alt: The Create Maintenance Window user interface in {{kib}}
4545
:screenshot:
4646
:::
@@ -49,7 +49,7 @@ By default, maintenance windows affect all categories of rules. The category-spe
4949

5050
If you turn on **Filter alerts**, you can use KQL to filter the alerts affected by the maintenance window:
5151

52-
:::{image} ../../../images/kibana-create-maintenance-window-filter.png
52+
:::{image} /explore-analyze/images/kibana-create-maintenance-window-filter.png
5353
:alt: The Create Maintenance Window user interface in {{kib}} with alert filters turned on
5454
:screenshot:
5555
:::

explore-analyze/alerts-cases/alerts/rule-action-variables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -435,4 +435,4 @@ You can create the following Mustache template in the email action for your rule
435435

436436
When rendered into Markdown and then HTML and viewed in an email client, it looks like this:
437437

438-
![Email template rendered in an email client](../../../images/kibana-email-mustache-template-rendered.png "")
438+
![Email template rendered in an email client](/explore-analyze/images/kibana-email-mustache-template-rendered.png "")

0 commit comments

Comments
 (0)