Search with OpenSearch Features

Oracle-managed open source technology

Proven open source technology

OCI Search with OpenSearch takes a proven community-driven, open source search solution and builds a management layer onto it. Simply point Elasticsearch-based APIs to an OCI Search endpoint to get up and running quickly. OCI offers OpenSearch v1.2.4, v2.3, and v2.11; all are compatible with Elasticsearch 7.10.

Oracle management layer

OCI is responsible for administrative tasks, including deployment, provisioning, patching, and resizing (scaling up or out). OCI Search enables operators to focus on data, not maintenance.

Backups your way

OCI Search users benefit from automated backups of their clusters to an OCI Object Storage bucket within their tenancy, or they can choose to use the OpenSearch Snapshot API to move backups to their own OCI Object Storage bucket. Data provided by backups to Object Storage is secured in flight and at rest. All data stored within OpenSearch is encrypted both at rest and in flight.

Flexible scaling

OCI Search offers a pool of resources based on OCI flexible shapes. Instead of being tied to “fixed” shapes, all customers get fine-grained provisioning control of cores, memory, and storage for their use cases. Only Oracle offers this level of customizability, allowing customers to provision the exact amount of infrastructure required by their workload, thus minimizing waste.

Integrated with OCI Identity and Access Management

OCI Search is fully integrated with Oracle Cloud Infrastructure Identity and Access Management and inherits OCI's simple, integrated, and prescriptive security philosophy.

Encryption

All data at rest and in flight is fully encrypted. OCI Search helps you remain compliant with the Federal Information Processing Standards out of the box.

Index State Management

Customers can use the OpenSearch Index State Management plugin to perform automated, policy-based index lifecycle management actions such as rollovers, merges, deletions, and schedules.

Performance analyzer

For OCI Search deployments with OpenSearch v2.3 and above, customers can use the performance analyzer plugin to query numerous performance metrics for their cluster, including aggregations of those metrics via REST API.

Supported languages

Through the use of language analyzers (tokenizers), the project supports a number of different languages. See the full list of supported languages for more information.

Security Analytics

The new out-of-the-box Security Analytics helps you detect, investigate, and respond to threats in near real time. Gather a wide variety of data sources, correlate them as illustrated, and detect early potential threats with prepackaged or customizable detection rules that follow a generic, open source format. Create your own notification process so your security team is alerted of potential issues in near real time.

Open source detection rules

Get more than 2,200 prepackaged rules for your security event log sources.

Unified interface

Access user-friendly security threat detection, investigation, and reporting tools.

Automated alerts

Create alerts based on matched detection rules so incident response teams are notified in near real time.

Correlation engine

Configure correlation rules to automatically link security findings and investigate them using a visual knowledge graph.

Customizable tools

Use any custom log source and define your own rules to detect potential threats.

Observability

OpenSearch Dashboards

You can use OpenSearch observability tools to detect, diagnose, and remedy issues that affect the performance, scalability, or availability of your software or infrastructure. A common open-standards-based schema coupled with a piped processing language (PPL) optimized for observability use cases simplifies the correlation and analysis of logs, metrics, and trace telemetry to support fast time to resolution and a better experience for your end users.



Log monitoring

Perform comprehensive monitoring using tools such as log tail, log surround, log patterns, and log-based metrics.

Anomaly detection

Detect anomalies and analyze streaming data with rich transformation and aggregation.

Correlation engine

Configure correlation rules to automatically link security findings and investigate them using a visual knowledge graph.