Главная
Study mode:
on
1
Introduction
2
About
3
nginx in front
4
operational overhead
5
IP Filtering
6
Authentication
7
ESusers realm
8
Anonymous access
9
Role Based Access Control
10
Audit Trail
11
Integration
12
Transport Client
13
Logstash
14
Marvel
15
Use-case 4: Ecommerce
16
Next? Simplify SSL configuration
17
Resources
Description:
Explore various methods to secure an Elasticsearch cluster and ELK environment in this 39-minute conference talk from GOTO Amsterdam 2015. Delve into standard use cases, including implementing HTTP proxies, IP filtering, and authentication mechanisms. Learn about role-based access control, audit trails, and integration with tools like Logstash and Marvel. Discover practical insights on operational overhead, anonymous access, and SSL configuration simplification. Gain valuable knowledge on securing your Elasticsearch infrastructure through real-world examples and best practices presented by an Elasticsearch & Shield developer.

Shield Your Cluster - Security and Elasticsearch

GOTO Conferences
Add to list
0:00 / 0:00