Open in app

Sign in

Write

Sign in

Isanka Rajapaksha
Isanka Rajapaksha

167 followers

Home

Lists

About

Let’s Learn Elastic Stack(Part 5) — Filebeat Architecture

The Elastic Stack is comprised of four components, Elasticsearch, Logstash, Kibana, and Beats. The last one is a family of log shippers…

Jun 30, 2022
Let’s Learn Elastic Stack(Part 5) — Filebeat Architecture
Let’s Learn Elastic Stack(Part 5) — Filebeat Architecture
Jun 30, 2022

Let’s Learn Elastic Stack (Part 4) — Kibana Architecture

Kibana enables you to give shape to your data and navigate the Elastic Stack. Kibana is the visualization platform that is built on top of…

Jun 30, 2022
Let’s Learn Elastic Stack (Part 4) — Kibana Architecture
Let’s Learn Elastic Stack (Part 4) — Kibana Architecture
Jun 30, 2022

Let’s Learn ELK(Part 3) — Logstash Architecture

In the ELK Stack (Elasticsearch, Logstash and Kibana), the crucial task of parsing data is given to the “L” in the stack — Logstash.

Jun 21, 2022
Let’s Learn ELK(Part 3) — Logstash Architecture
Let’s Learn ELK(Part 3) — Logstash Architecture
Jun 21, 2022

Let’s Learn ELK(Part 2) — Elasticsearch Architecture

What is Elasticsearch?

Jun 3, 2022
Let’s Learn ELK(Part 2) — Elasticsearch Architecture
Let’s Learn ELK(Part 2) — Elasticsearch Architecture
Jun 3, 2022

Let’s Learn ELK — Introduction to ELK (Part 1)

he fastest-growing companies tend to be those that pull the most value from the widest range of relevant data. Along with huge…

May 10, 2022
Let’s Learn ELK — Introduction to ELK (Part 1)
Let’s Learn ELK — Introduction to ELK (Part 1)
May 10, 2022

Securing your web applications with SAML 2.0 using WSO2 Identity Server

This article will guide you on how to integrate SAML 2.0 into your web application with the SAML SDK in WSO2 Identity Server which allows…

Mar 28, 2022
1
Securing your web applications with SAML 2.0 using WSO2 Identity Server
Securing your web applications with SAML 2.0 using WSO2 Identity Server
Mar 28, 2022
1

Don’t blindly use Third-Party Dependencies

Avoiding spending time and effort solving problems that others have already solved can be used to achieve high speed, low cost and quality…

Feb 27, 2022
Don’t blindly use Third-Party Dependencies
Don’t blindly use Third-Party Dependencies
Feb 27, 2022

Are you aware of Third-Party Dependencies?

On Friday 9 December 2021, the information security world was rocked by the disclosure of Log4j (CVE-2021–44228), a zero-day vulnerability…

Feb 21, 2022
Are you aware of Third-Party Dependencies?
Are you aware of Third-Party Dependencies?
Feb 21, 2022

Overview about OAuth2.0

When there was no such thing as OAuth 2.0

Dec 23, 2021
Overview about OAuth2.0
Overview about OAuth2.0
Dec 23, 2021

Scan WSO2 Docker Images with Trivy

Every once in a while, security evolves to the point where it appears to be quite frightening to think about. Security considerations and…

Nov 16, 2021
Scan WSO2 Docker Images with Trivy
Scan WSO2 Docker Images with Trivy
Nov 16, 2021
Isanka Rajapaksha

Isanka Rajapaksha

167 followers

Software Engineer | Ufinity Pte Ltd

Following
  • Data Science Collective

    Data Science Collective

  • Sachin Mamoru

    Sachin Mamoru

  • Achintha Isuru

    Achintha Isuru

  • Chinthaka Weerakkody

    Chinthaka Weerakkody

  • Sanjiva Weerawarana

    Sanjiva Weerawarana

See all (98)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech