Author

Articles by Lilach Adler

Videos

Log it like you mean it: Best practices for security

Robust security logging is essential in today's threat landscape. This blog offers practical strategies and actionable recommendations to help organizations improve their security logging practices and enhance their overall cybersecurity posture.

Videos

How to perform a zero-downtime upgrade of Elasticsearch in production

Learn some best practices for upgrading your production Elasticsearch clusters without service outages for your users.

Videos

How to deploy the Elastic Stack using ECK to monitor OpenShift

Learn how to orchestrate and operate the Elastic Stack using Red Hat OpenShift and Elastic Cloud on Kubernetes (ECK). And then learn how to use your deployment to monitor your OpenShift logs and metrics.