Open in app

Sign In

Write

Sign In

Isanka Rajapaksha
Isanka Rajapaksha

156 Followers

Home

About

Jun 30, 2022

Let’s Learn Elastic Stack(Part 5) — Filebeat Architecture

Hello readers, If you’re a beginner to Elastic stack, I recommend you to read my previous blogs (Part 1) — Introduction, (Part 2) — Elasticsearch, (Part 3) — Logstash Architecture, (Part 4) — Kibana Architecture to get some prior knowledge before learning Filebeat. The Elastic Stack is comprised of four…

Elastic Stack

4 min read

Let’s Learn Elastic Stack(Part 5) — Filebeat Architecture
Let’s Learn Elastic Stack(Part 5) — Filebeat Architecture
Elastic Stack

4 min read


Jun 30, 2022

Let’s Learn Elastic Stack (Part 4) — Kibana Architecture

Hello readers, If you’re a beginner to Elastic stack, I recommend you to read my previous blogs (Part 1) — Introduction, (Part 2) — Elasticsearch, (Part 3) — Logstash Architecture to get some prior knowledge before learning Kibana. Kibana enables you to give shape to your data and navigate the…

Elastic Stack

5 min read

Let’s Learn Elastic Stack (Part 4) — Kibana Architecture
Let’s Learn Elastic Stack (Part 4) — Kibana Architecture
Elastic Stack

5 min read


Jun 21, 2022

Let’s Learn Elastic Stack (Part 3) — Logstash Architecture

Hello readers, If you’re a beginner to Elastic stack, I recommend you to read my previous blogs (Part 1) — Introduction, (Part 2) — Elasticsearch to get some prior knowledge before learning Logstash. In the Elastic Stack (Elasticsearch, Logstash, Kibana and Beats), the crucial task of parsing data is given…

5 min read

Let’s Learn ELK(Part 3) — Logstash Architecture
Let’s Learn ELK(Part 3) — Logstash Architecture

5 min read


Jun 3, 2022

Let’s Learn Elastic Stack(Part 2) — Elasticsearch Architecture

Hello readers, If you’re a beginner to Elastic stack, I recommend you to read my previous blog Let’s Learn Elastic Stack (Part 1) — Introduction to get a basic idea on Elastic stack. What is Elasticsearch? Elasticsearch is a real-time distributed search and analytics engine with high availability. It is used for full-text…

6 min read

Let’s Learn ELK(Part 2) — Elasticsearch Architecture
Let’s Learn ELK(Part 2) — Elasticsearch Architecture

6 min read


May 10, 2022

Let’s Learn Elastic Stack (Part 1)— Introduction

The fastest-growing companies tend to be those that pull the most value from the widest range of relevant data. Along with huge opportunities, though, data analysis can pose huge challenges.The …

4 min read

Let’s Learn ELK — Introduction to ELK (Part 1)
Let’s Learn ELK — Introduction to ELK (Part 1)

4 min read


Mar 28, 2022

Securing your web applications with SAML 2.0 using WSO2 Identity Server

This article will guide you on how to integrate SAML 2.0 into your web application with the SAML SDK in WSO2 Identity Server which allows developers to configure existing webapps in an easily configurable manner. …

Wso2

7 min read

Securing your web applications with SAML 2.0 using WSO2 Identity Server
Securing your web applications with SAML 2.0 using WSO2 Identity Server
Wso2

7 min read


Feb 27, 2022

Don’t blindly use Third-Party Dependencies

Avoiding spending time and effort solving problems that others have already solved can be used to achieve high speed, low cost and quality in software development. The most common way of putting this principle into practice is by using third-party libraries. …

Third Party Library

6 min read

Don’t blindly use Third-Party Dependencies
Don’t blindly use Third-Party Dependencies
Third Party Library

6 min read


Feb 21, 2022

Are you aware of Third-Party Dependencies?

On Friday 9 December 2021, the information security world was rocked by the disclosure of Log4j (CVE-2021–44228), a zero-day vulnerability in the widely used Java logging library Apache Log4j, which allows attackers to remotely execute code and gain access to machines. This has been described as one of the most…

5 min read

Are you aware of Third-Party Dependencies?
Are you aware of Third-Party Dependencies?

5 min read


Dec 23, 2021

Overview about OAuth2.0

When there was no such thing as OAuth 2.0 If you’re a very first beginner to the OAuth 2.0, you need to look back in history, when there was no such thing as OAuth 2.0 before dig deep into the concepts. Let’s take an example. Back in the day, if you wanted to find your Facebook friends on ABC…

4 min read

Overview about OAuth2.0
Overview about OAuth2.0

4 min read


Nov 16, 2021

Scan WSO2 Docker Images with Trivy

Every once in a while, security evolves to the point where it appears to be quite frightening to think about. Security considerations and protocols must be in place before releasing applications to a production environment in order to protect your assets. …

4 min read

Scan WSO2 Docker Images with Trivy
Scan WSO2 Docker Images with Trivy

4 min read

Isanka Rajapaksha

Isanka Rajapaksha

156 Followers

Software Engineer | WSO2

Following
  • Amit Shekhar

    Amit Shekhar

  • Shanika Wickramasinghe

    Shanika Wickramasinghe

  • Achintha Isuru

    Achintha Isuru

  • Entreprogrammer

    Entreprogrammer

  • Chamath

    Chamath

See all (97)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech