Documentation Index
Fetch the complete documentation index at: https://docs.cloudthinker.io/llms.txt
Use this file to discover all available pages before exploring further.
Elasticsearch
Connect your Elasticsearch clusters to enable CloudThinker agents to search logs, analyze observability data, and investigate incidents.Supported Platforms
| Platform | Support |
|---|---|
| Elasticsearch | 7.x, 8.x |
| OpenSearch | 1.x, 2.x |
| AWS OpenSearch Service | All versions |
| Elastic Cloud | All deployments |
Setup
Generate and Copy
Click Create API key and immediately copy the encoded key (it won’t be shown again).
Note Cluster Endpoint
Get your Elasticsearch endpoint:
- Self-hosted:
https://elasticsearch.your-domain.com:9200 - Elastic Cloud: Found in deployment settings
- AWS OpenSearch: Domain endpoint from AWS console
Connection Details
| Field | Description | Example |
|---|---|---|
| ES_URL | Elasticsearch cluster URL | https://your-cluster.es.region.cloud.es.io:9243 |
| ES_API_KEY | Base64 encoded API key | VnVhQk... |
Required Permissions
Minimum
Recommended
Agent Capabilities
Once connected, agents can:| Capability | Description |
|---|---|
| Log Search | Search application and infrastructure logs |
| Error Analysis | Find error patterns and anomalies |
| Incident Investigation | Correlate events across services |
| Metrics Query | Query stored metrics data |
Example Prompts
Common Index Patterns
| Pattern | Use Case |
|---|---|
logs-* | Application logs |
filebeat-* | Filebeat-collected logs |
metricbeat-* | Infrastructure metrics |
apm-* | Application performance data |
kubernetes-* | Kubernetes cluster logs |
Troubleshooting
Connection refused
Connection refused
- Verify cluster URL is correct and accessible
- Check firewall allows CloudThinker IPs
- For AWS OpenSearch: Enable public access or VPC endpoint
- Confirm Elasticsearch is running
Authentication failed
Authentication failed
- Verify API key is correct
- Check API key hasn’t expired
- Ensure user/role has required permissions
- For AWS: Verify IAM role or access policy
API key expired
API key expired
- Navigate to Stack Management → Security → API Keys
- Create a new API key with the same permissions
- Update the key in CloudThinker connection settings
No data returned
No data returned
- Verify index patterns match existing indices
- Check user has read permission on indices
- Ensure indices contain data in the time range
- Confirm field mappings are correct
Security Best Practices
- Read-only access - Grant only
readprivileges, neverwrite - Limited indices - Restrict access to necessary index patterns only
- API key rotation - Rotate API keys every 90 days
- Expiration - Set appropriate expiration on API keys
- Audit logging - Enable Elasticsearch audit logs
Related
Oliver Agent
Security log analysis
Grafana Connection
Visualize Elasticsearch data