YoVDO

Shield Your Cluster - Security and Elasticsearch

Offered By: GOTO Conferences via YouTube

Tags

GOTO Conferences Courses Logstash Courses Role-Based Access Control Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore various methods to secure an Elasticsearch cluster and ELK environment in this 39-minute conference talk from GOTO Amsterdam 2015. Delve into standard use cases, including implementing HTTP proxies, IP filtering, and authentication mechanisms. Learn about role-based access control, audit trails, and integration with tools like Logstash and Marvel. Discover practical insights on operational overhead, anonymous access, and SSL configuration simplification. Gain valuable knowledge on securing your Elasticsearch infrastructure through real-world examples and best practices presented by an Elasticsearch & Shield developer.

Syllabus

Introduction
About
nginx in front
operational overhead
IP Filtering
Authentication
ESusers realm
Anonymous access
Role Based Access Control
Audit Trail
Integration
Transport Client
Logstash
Marvel
Use-case 4: Ecommerce
Next? Simplify SSL configuration
Resources


Taught by

GOTO Conferences

Related Courses

Addressing Algorithmic Bias
GOTO Conferences via YouTube
Empowering Consumers - Evolution of Software in the Future
GOTO Conferences via YouTube
Why Static Typing Came Back
GOTO Conferences via YouTube
Higher Kinded Types in a Lower Kinded Language - Functional Programming in Kotlin
GOTO Conferences via YouTube
It's Not Hard to Test Smart - Delivering Customer Value Faster
GOTO Conferences via YouTube