Book Image

Learning Puppet Security

Book Image

Learning Puppet Security

Overview of this book

Table of Contents (17 chapters)
Learning Puppet Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we explored centralized logging. We've seen why one might want to implement it and what the benefits are.

We then looked at the Logstash environment and the ELK stack. This includes Elasticsearch, Logstash, and Kibana that provide a complete log management solution that can scale to many hosts.

After doing this, we explored how to install all of these pieces using Puppet. We went through the acts of installing Elasticsearch, Logstash, and then Kibana using Puppet to automate the system.

Finally, we explored how to use Puppet to manage your other hosts to ship logs to this centralized logging solution and do this in a repeatable manner.

By doing all this, we saw many examples of how to implement solutions in Puppet. The building block of tools available to you continues to grow. While we didn't explore how to bring every log into this solution, we've given you enough knowledge to expand what we've learned to be used in other situations.

More information on the ELK stack...