Skip to main content
Behind the scenes of an ELK system

Behind every security measure you take, you should have an information management system helping you take decisions. If you work with security, you need a way to collect, process, save and analyze huge amounts of data that should be used to control how your systems are behaving, find anomalies and evaluate the results of your actions.

Have you ever wondered how to manage billions of logs and metrics from thousands of devices in your infrastructure? If you need high-availability and a resilient and stable system to process your data this is the tutorial for you.

Sentralisert logging ved UiO

A presentation about why and how we are using data analysis of log information at the University of Oslo with elasticsearch, logstash and kibana.

Subscribe to logstash