Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Open-Source Search and Analytics Sovereignty
- Examination of Elastic license changes and subsequent forks.
- Feature parity between OpenSearch and Elasticsearch in 2025-2026.
- Application scenarios: enterprise search, log analytics, SIEM, and observability.
Cluster Architecture
- Node roles: master, data, coordinating, and ingest.
- Security plugin features: TLS internode communication, certificates, and PKI.
- Preventing split-brain scenarios through discovery.seed_hosts and minimum master nodes configurations.
Data Ingestion
- REST API indexing, bulk loading procedures, and mapping definitions.
- Utilizing Beats, Fluent Bit, and Logstash pipelines.
- Employing the OpenTelemetry Collector for traces and metrics.
Search and Dashboards
- Query DSL capabilities: match, term, range, aggregations, and nested fields.
- Creating visualizations and dashboards in OpenSearch Dashboards.
- SIEM applications: configuring alert rules and anomaly detection.
Index Management
- ILM operations: rollover, shrinking, and deletion.
- Implementing the hot-warm-cold data architecture.
- Optimizing mappings and text analysis.
Security and Access Control
- RBAC implementation involving users, roles, and tenants.
- Authentication via SAML and OpenID Connect.
- Document-level security and field masking techniques.
Backup and Recovery
- Configuring snapshot repositories to MinIO, S3, or NFS.
- Automating snapshots using Curator or ISM.
- Restoring specific indices and achieving cluster-wide disaster recovery.
Requirements
- A foundational understanding of search engines and inverted indexes.
- Practical experience with REST APIs and JSON.
- Basic Linux administration skills, including familiarity with systemd, logs, and packages.
Target Audience
- Search and log analytics engineers.
- Teams transitioning from managed Elasticsearch or Splunk solutions.
- Security analysts developing sovereign SIEM backends.
14 Hours
Testimonials (1)
the trainer was very good and made the training perfect for my needs