Essays about: "Kibana"

Showing result 1 - 5 of 10 essays containing the word Kibana.

  1. 1. A Comparative Analysis of the Ingestion and Storage Performance of Log Aggregation Solutions: Elastic Stack & SigNoz

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Robert Duras; [2024]
    Keywords : Elastic Stack; ELK; SigNoz; Beats; Logstash; Elasticsearch; Kibana; OpenTelemetry; ClickHouse; Log; Logging; Log Data; Log Aggregation; Performance; Ingestion; Storage;

    Abstract : As infrastructures and software grow in complexity the need to keep track of things becomes important. It is the job of log aggregation solutions to condense log data into a form that is easier to search, visualize, and analyze. READ MORE

  2. 2. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  3. 3. A comparative analysis of log management solutions: ELK stack versus PLG stack

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Joakim Eriksson; Anawil Karavek; [2023]
    Keywords : ELK; PLG; Log management; Elasticsearch; Logstash; Kibana; Promtail; Loki; Grafana;

    Abstract : Managing and analyzing large volumes of logs can be challenging, and a log management solution can effectively address this issue. However, selecting the right log management solution can be a daunting task, considering various factors such as desired features and the solution's efficiency in terms of storage and resource usage. READ MORE

  4. 4. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from Uppsala universitet/Datalogi

    Author : Johan Lövgren; [2023]
    Keywords : open-source; vulnerability identification; high-risk developers; öppen källkod; identifiering av sårbarheter; högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  5. 5. Elasticity of Elasticsearch

    University essay from Uppsala universitet/Avdelningen för datorteknik

    Author : Kleivi Dimitris Tsaousi; [2021]
    Keywords : Cloud computing; elasticsearch; docker; kubernetes; devops; full-text search; search engines;

    Abstract : Elasticsearch has evolved from an experimental, open-source, NoSQL database for full-text documents to an easily scalable search engine that canhandle a large amount of documents. This evolution has enabled companies todeploy Elasticsearch as an internal search engine for information retrieval (logs,documents, etc.). READ MORE