Book Image

Mastering Kibana 6.x

Book Image

Mastering Kibana 6.x

Overview of this book

Kibana is one of the popular tools among data enthusiasts for slicing and dicing large datasets and uncovering Business Intelligence (BI) with the help of its rich and powerful visualizations. To begin with, Mastering Kibana 6.x quickly introduces you to the features of Kibana 6.x, before teaching you how to create smart dashboards in no time. You will explore metric analytics and graph exploration, followed by understanding how to quickly customize Kibana dashboards. In addition to this, you will learn advanced analytics such as maps, hits, and list analytics. All this will help you enhance your skills in running and comparing multiple queries and filters, influencing your data visualization skills at scale. With Kibana’s Timelion feature, you can analyze time series data with histograms and stats analytics. By the end of this book, you will have created a speedy machine learning job using X-Pack capabilities.
Table of Contents (21 chapters)
Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
Index

Chapter 9. Understanding X-Pack Features

The default Elastic Stack comes with Elasticsearch, Kibana, Logstash, and Beats. We can extend the Elastic Stack setup by installing X-Pack. It has different features, such as providing security, monitoring, reporting, alerting, and graph and machine learning capabilities in an easy-to-install package. By default, there is no security in Elastic Stack, and through X-Pack, we can enable authentication and define roles and permissions. It monitors the Elastic Stack and provides us with the feature to monitor the application's health seamlessly. Also, we can easily generate PDF reports, using Kibana visualization, after installing X-Pack. We can seamlessly integrate X-Pack in a running Elastic Stack setup by a simple installation process. The X-Pack security feature provides us with the option to secure Elastic Stack. Using it, we can set password protection, add authentication, filter on IP, or encrypt communications.

In this chapter, we will cover the...