Overview
The Elasticsearch integration enables Steadwing to query your logs, metrics, and traces using natural language and ES|QL during incident analysis. Our AI leverages Kibana’s Agent Builder tools to intelligently search your data, identify patterns, and correlate findings with code changes for faster root cause analysis.Why Use Elasticsearch with Steadwing?
Semantic Search
Query logs using natural language - no complex syntax needed
ES|QL Analysis
Run powerful analytical queries to aggregate and analyze data
Custom Tools
Leverage your pre-configured Agent Builder tools
Smart Correlation
Automatically link log patterns to code changes and deployments
Setup Instructions
Step 1: Get Your Kibana URL
Your Kibana URL format depends on your deployment type: Elastic Cloud:Step 2: Create an API Key
- Navigate to Kibana → Stack Management → API Keys
- Click Create API Key
- Configure the following privileges:
read_onechat- Access to Agent Builder MCPspace_read- Access to Kibana spacesread+view_index_metadata- Query your indices
- Click Create API Key
- Copy the API key - you’ll need it in Step 3
Step 3: Connect Elasticsearch in Steadwing
- Navigate to Steadwing Settings
- Find the Elasticsearch integration card
- Click to expand the collapsible form
- Fill in the required fields:
- Kibana URL: Your full Kibana instance URL (e.g.,
https://abc123def.kb.us-east-1.aws.found.io) - API Key: The API key you created
- Kibana URL: Your full Kibana instance URL (e.g.,
- Toggle the switch to Enable the integration
How It Works
When analyzing an incident, Steadwing automatically:- Discovers Tools - Identifies available tools in your Kibana Agent Builder
- Extracts Context - Parses error messages for service names, timestamps, and error types
- Queries Strategically:
- Semantic search for broad pattern matching
- ES|QL for detailed aggregations and analysis
- Custom tools if configured
- Correlates Findings - Combines Elasticsearch data with code changes, metrics, and deployments
- Generates Timeline - Builds chronological view of events leading to the incident
Requirements
- Elastic Cloud 9.2+ or Elastic Serverless deployment
- Kibana instance with Agent Builder enabled
- API Key with appropriate privileges
Use Cases
Error Investigation:What Data Can Steadwing Access?
Read-Only Access:- Only indices specified in your API key (e.g.,
logs-*,metrics-*) - Time-bounded queries (typically 1-6 hours around incident)
- Limited results (50-100 per query)
- Cannot write, update, or delete data
- Cannot modify Kibana dashboards or settings
- API keys encrypted at rest
- Queries executed in real-time - no data storage
Uninstall
To disconnect the integration:- In Steadwing Settings, disable the Elasticsearch integration
- In Kibana, delete the API key:
- Navigate to Stack Management → API Keys
- Find “steadwing-rca-integration” (or your chosen name)
- Click Delete
FAQs
Can Steadwing modify my Elasticsearch data?
Can Steadwing modify my Elasticsearch data?
No. The API key only has read permissions. Steadwing cannot write, update, or delete any data in your Elasticsearch cluster.
What Elasticsearch versions are supported?
What Elasticsearch versions are supported?
Elastic Cloud 9.2+ and Elastic Serverless. Older versions are not supported due to Agent Builder requirements.
Do I need to create custom tools in Agent Builder?
Do I need to create custom tools in Agent Builder?
No. Steadwing can use semantic search and ES|QL without custom tools. However, custom tools can improve results for organization-specific queries.
Why am I getting 403 Forbidden errors?
Why am I getting 403 Forbidden errors?
Verify your API key includes
read_onechat and space_read privileges. These are required for Agent Builder access.How much data does it query?
How much data does it query?
Only data within the incident timeframe (typically 1-6 hours). Queries are limited to 50-100 results to prevent overwhelming data transfer.
What if I don't have Agent Builder enabled?
What if I don't have Agent Builder enabled?
Agent Builder must be enabled in your Kibana instance. Contact Elastic support to enable it for your deployment.
Can I scope access to specific indices?
Can I scope access to specific indices?
Yes. In the API key privileges, specify only the indices you want Steadwing to access (e.g.,
logs-production-* instead of logs-*).Does this work with on-premises Elasticsearch?
Does this work with on-premises Elasticsearch?
Currently, only Elastic Cloud 9.2+ and Elastic Serverless are supported. On-premises deployments require these versions with Agent Builder enabled.