Chicago 2014 - Proposal

Gold sponsors

Back to proposals overview - program

Security, Logs and the ELK Stack


Monitoring logs is an integral part of maintaining control over the security of your infrastructure. In this presentation, I will present an overview of Elasticsearch, Logstash, and Kibana and the various duties they perform in the ELK stack. Each of these tools has an important role in introspecting your logs, in order to surface critical information in an automated system. By configuring certain event traps, the ELK stack can trigger notifications or action items based on conditional logic. The ELK stack also provides a convenient mechanism for recording significant events and securing them for later forensic analysis. Learn about best practices for logging with regards to security, and configuring the system to optimally ingest and react to suspicious events.

blog comments powered by Disqus
Signal Datadog CloudBees ScriptRock CHEF Rackspace XebiaLabs Elasticsearch Microsoft Orbitz Circonus

Silver sponsors

DRW Trading VictorOps ServerCentral Puppet Labs Enova 10th Magnitude

Bronze sponsors

Opinion Lab

Media sponsors

O'Reilly Media Arrested DevOps Food Fight Show The Ship Show Blacks in Technology

Wifi sponsors

Cisco Meraki Backstop Solutions Group