Book description
Use the Elastic Stack for search, security, and observability-related use cases while working with large amounts of data on-premise and on the cloud
Key Features
- Learn the core components of the Elastic Stack and how they work together
- Build search experiences, monitor and observe your environments, and defend your organization from cyber attacks
- Get to grips with common architecture patterns and best practices for successfully deploying the Elastic Stack
Book Description
The Elastic Stack helps you work with massive volumes of data to power use cases in the search, observability, and security solution areas.
This three-part book starts with an introduction to the Elastic Stack with high-level commentary on the solutions the stack can be leveraged for. The second section focuses on each core component, giving you a detailed understanding of the component and the role it plays. You'll start by working with Elasticsearch to ingest, search, analyze, and store data for your use cases. Next, you'll look at Logstash, Beats, and Elastic Agent as components that can collect, transform, and load data. Later chapters help you use Kibana as an interface to consume Elastic solutions and interact with data on Elasticsearch. The last section explores the three main use cases offered on top of the Elastic Stack. You'll start with a full-text search and look at real-world outcomes powered by search capabilities. Furthermore, you'll learn how the stack can be used to monitor and observe large and complex IT environments. Finally, you'll understand how to detect, prevent, and respond to security threats across your environment. The book ends by highlighting architecture best practices for successful Elastic Stack deployments.
By the end of this book, you'll be able to implement the Elastic Stack and derive value from it.
What you will learn
- Configure Elasticsearch clusters with different node types for various architecture patterns
- Ingest different data sources into Elasticsearch using Logstash, Beats, and Elastic Agent
- Build use cases on Kibana including data visualizations, dashboards, machine learning jobs, and alerts
- Design powerful search experiences on top of your data using the Elastic Stack
- Secure your organization and learn how the Elastic SIEM and Endpoint Security capabilities can help
- Explore common architectural considerations for accommodating more complex requirements
Who this book is for
Developers and solutions architects looking to get hands-on experience with search, security, and observability-related use cases on the Elastic Stack will find this book useful. This book will also help tech leads and product owners looking to understand the value and outcomes they can derive for their organizations using Elastic technology. No prior knowledge of the Elastic Stack is required.
Table of contents
- Getting Started with Elastic Stack 8.0
- Foreword
- Contributors
- About the author
- About the reviewers
- Preface
- Section 1: Core Components
- Chapter 1: Introduction to the Elastic Stack
- Chapter 2: Installing and Running the Elastic Stack
- Section 2: Working with the Elastic Stack
- Chapter 3: Indexing and Searching for Data
- Chapter 4: Leveraging Insights and Managing Data on Elasticsearch
- Chapter 5: Running Machine Learning Jobs on Elasticsearch
-
Chapter 6: Collecting and Shipping Data with Beats
- Technical requirements
- Introduction to Beats agents
- Collecting logs using Filebeat
- Using Metricbeat to monitor system and application metrics
- Monitoring operating system audit data using Auditbeat
- Monitoring the uptime and availability of services using Heartbeat
- Collecting network traffic data using Packetbeat
- Summary
- Chapter 7: Using Logstash to Extract, Transform, and Load Data
- Chapter 8: Interacting with Your Data on Kibana
- Chapter 9: Managing Data Onboarding with Elastic Agent
- Section 3: Building Solutions with the Elastic Stack
- Chapter 10: Building Search Experiences Using the Elastic Stack
- Chapter 11: Observing Applications and Infrastructure Using the Elastic Stack
-
Chapter 12: Security Threat Detection and Response Using the Elastic Stack
- Technical requirements
- Building security capability to protect your organization
-
Building a SIEM for your SOC
- Collecting data from a range of hosts and source systems
- Monitoring and detecting security threats in near real time
- Allowing analysts to work and investigate collaboratively
- Applying threat intelligence and data enrichment to contextualize your alerts
- Enabling teams to hunt for adversarial behavior in the environment
- Providing alerting, integrations, and response actions
- Easily scaling with data volumes over suitable data retention periods
- Leveraging endpoint detection and response in your SOC
- Summary
- Chapter 13: Architecting Workloads on the Elastic Stack
- Other Books You May Enjoy
Product information
- Title: Getting Started with Elastic Stack 8.0
- Author(s):
- Release date: March 2022
- Publisher(s): Packt Publishing
- ISBN: 9781800569492
You might also like
book
Learning Elastic Stack 7.0 - Second Edition
A beginner's guide to storing, managing, and analyzing data with the updated features of Elastic 7.0 …
video
Elasticsearch 8 and the Elastic Stack: In-Depth and Hands-On
Elasticsearch 8 is a powerful tool for analyzing big datasets in a matter of milliseconds! It’s …
video
Getting Started with Kubernetes LiveLessons, 2nd Edition
6+ Hours of Video Instruction An updated edition of this video title is available. Please go …
book
Docker: Up & Running, 3rd Edition
Docker and Linux containers have fundamentally changed the way that organizations develop, deliver, and run software …