Chicago 2014 - Proposal

Gold sponsors

Back to proposals overview - program

Security, Logs and the ELK Stack

Abstract

Monitoring logs is an integral part of maintaining control over the security of your infrastructure. In this presentation, I will present an overview of Elasticsearch, Logstash, and Kibana and the various duties they perform in the ELK stack. Each of these tools has an important role in introspecting your logs, in order to surface critical information in an automated system. By configuring certain event traps, the ELK stack can trigger notifications or action items based on conditional logic. The ELK stack also provides a convenient mechanism for recording significant events and securing them for later forensic analysis. Learn about best practices for logging with regards to security, and configuring the system to optimally ingest and react to suspicious events.

blog comments powered by Disqus
Signal Datadog CloudBees ScriptRock CHEF Rackspace XebiaLabs Elasticsearch Microsoft Orbitz Circonus


Silver sponsors

DRW Trading VictorOps ServerCentral Puppet Labs Enova 10th Magnitude


Bronze sponsors

Opinion Lab


Media sponsors

O'Reilly Media Arrested DevOps Food Fight Show The Ship Show Blacks in Technology


Wifi sponsors

Cisco Meraki Backstop Solutions Group