Getting startededit

Using Elasticsearch Service is a great way to take advantage of all the power that Elastic offers. Make your data work for you, faster.

A deployment helps you manage an Elasticsearch cluster and other Elastic products, like Kibana or APM instances, in one place. Spin up, scale, upgrade, and delete your Elastic products without having to manage each one separately.

Elasticsearch Service includes solutions for your most common concerns. You can get a rich search experience with Elastic Enterprise Search, gain actionable insight into your environment with Elastic Observability, and protect your systems and endpoints with Elastic Security. We’ve done the hard work of knowing what works best, for you.

These solutions are deployments that combine specific hardware profiles and guide you through ingesting data into the deployment. Our hardware profiles support a specific purpose, such as a hot-warm architecture that helps you manage your data storage retention. All of these are based on deployment templates, which are a reusable configuration of Elastic products that you can deploy. With the flexibility of Elastic, you can take it a step further by customizing a deployment template to your own needs.

We know that use cases come in all shapes and sizes. The purpose of Elasticsearch Service is to work for yours.

To get started:

  • Get the Elastic Stack directly or through your cloud provider:

    • Sign Up for a Trial - Sign up, check what your free trial includes and when we require a credit card.
    • Sign Up from Marketplace - Consolidate billing portals by signing up through one of the available marketplaces.
  • Create a proof-of-concept Deployment - Get up and running with the Elastic solutions very quickly. Your deployment pre-configures Elasticsearch, Kibana, and other Elastic products for you. Everything works together, everything runs on hardware that is optimized for your use case.
  • Connect your data to your deployment - Ingest and index the data you want, from a variety of sources, and take action on it.
  • Secure Your Deployment - Add advanced security features such as custom SAML/OIDC/Kerberos authentication, trust management, or traffic filtering for private link.
  • Next Steps - Index your data, enable features such as monitoring, automate your operations with APIs, and more.