Isanka RajapakshaLet’s Learn Elastic Stack(Part 5) — Filebeat ArchitectureThe Elastic Stack is comprised of four components, Elasticsearch, Logstash, Kibana, and Beats. The last one is a family of log shippers…Jun 30, 2022Jun 30, 2022
Isanka RajapakshaLet’s Learn Elastic Stack (Part 4) — Kibana ArchitectureKibana enables you to give shape to your data and navigate the Elastic Stack. Kibana is the visualization platform that is built on top of…Jun 30, 2022Jun 30, 2022
Isanka RajapakshaLet’s Learn ELK(Part 3) — Logstash ArchitectureIn the ELK Stack (Elasticsearch, Logstash and Kibana), the crucial task of parsing data is given to the “L” in the stack — Logstash.Jun 21, 2022Jun 21, 2022
Isanka RajapakshaLet’s Learn ELK(Part 2) — Elasticsearch ArchitectureWhat is Elasticsearch?Jun 3, 2022Jun 3, 2022
Isanka RajapakshaLet’s Learn ELK — Introduction to ELK (Part 1)he fastest-growing companies tend to be those that pull the most value from the widest range of relevant data. Along with huge…May 10, 2022May 10, 2022
Isanka RajapakshaSecuring your web applications with SAML 2.0 using WSO2 Identity ServerThis article will guide you on how to integrate SAML 2.0 into your web application with the SAML SDK in WSO2 Identity Server which allows…Mar 28, 20221Mar 28, 20221
Isanka RajapakshaDon’t blindly use Third-Party DependenciesAvoiding spending time and effort solving problems that others have already solved can be used to achieve high speed, low cost and quality…Feb 27, 2022Feb 27, 2022
Isanka RajapakshaAre you aware of Third-Party Dependencies?On Friday 9 December 2021, the information security world was rocked by the disclosure of Log4j (CVE-2021–44228), a zero-day vulnerability…Feb 21, 2022Feb 21, 2022
Isanka RajapakshaOverview about OAuth2.0When there was no such thing as OAuth 2.0Dec 23, 2021Dec 23, 2021
Isanka RajapakshaScan WSO2 Docker Images with TrivyEvery once in a while, security evolves to the point where it appears to be quite frightening to think about. Security considerations and…Nov 16, 2021Nov 16, 2021