What is Kibana?
Creative Commons License

What is Kibana?

Kibana is a free, browser-based data harvesting, analysis, and application monitoring tool developed by Elastic NV. It is also open-sourced and cross-platform compatible. Its repository can be found on github.com. My research showed that it is a good tool for looking at large amounts of data logs to predict and see trends. It’s also a great way to spot errors or other significant events in applications. It is an extremely popular log analysis tool that is used worldwide.

The data that is collected can be displayed in a variety of visual options such as; Histograms, Line Graphs, Pie Charts, Sunbursts, Bar Graphs, Heat Maps, Region Maps, Coordinate Maps, Gauge, Goals, and Timelion views. The data displayed is collected in real-time with different settings to choose from (hourly or daily). It is an ideal tool for entry-level data analysts who would benefit from a dashboard to store their visualizations and to translate data into information.

For seasoned data analysts, several developer tools can be utilized for custom visualizations as well as filters and search queries. After creation, the reports can be downloaded into CSV files or shared via URL. There is also the ability to use Third Party plugins, but it is not advised by several sources on the web that say it is a tedious process to apply them?(Tutorials Point, n.d.).

References

Kibana. (n.d.). Your Window Into the Elastic Stack. Retrieved from elastic.co: elastic.co

Tutorials Point. (n.d.). Kibana - Overview. Retrieved from tutorialspoint.com: tutorialspoint.com

要查看或添加评论,请登录

Christian Otteman的更多文章

  • Threat Hunting Using Mitre Att&ck Matrix/Framework

    Threat Hunting Using Mitre Att&ck Matrix/Framework

    In 2013, the MITRE federal nonprofit research project sought to identify and deliver best practices in defense of…

  • All about Threat Intelligence

    All about Threat Intelligence

    Threat intelligence is defined as “the process of acquiring information from multiple sources to gain knowledge about…

  • Free Cash Flow & Cash Conversion Cycle

    Free Cash Flow & Cash Conversion Cycle

    Introduction The following is an examination of Free Cash Flow and the Cash Conversion Cycle. Free cash flow is defined…

  • Receivables, Inventory, and Payables Turnover

    Receivables, Inventory, and Payables Turnover

    When a company makes a sale, it does not receive cash right away. Making the sale and receiving cash are two different…

  • Dropper & C2C Malware

    Dropper & C2C Malware

    The purpose of Dropper Malware is to aid in installing other types of malware once they gain access to the system. An…

  • Cloud Malware Injection Attacks

    Cloud Malware Injection Attacks

    Many types of cyber-attacks happen in a cloud environment, but the focus of today is malware injection attacks. During…

  • Life Cycle and Impact of Polystyrene Food Trays

    Life Cycle and Impact of Polystyrene Food Trays

    Life Cycle Stages There are four stages Polystyrene goes through Cradle to Grave. The first stage, material extraction,…

  • Writing Stages

    Writing Stages

    There are several differences between Large-Scale and Small-Scale revisions. Large-Scale revisions involve looking at…

  • Cradle to Grave Vs. Cradle to Cradle

    Cradle to Grave Vs. Cradle to Cradle

    These are interesting concepts that define two different life cycle views. The cradle to grave life cycle “means going…

  • A Look at Security Risk Assessments

    A Look at Security Risk Assessments

    A security risk assessment is defined as: “A Probability determination of asset losses based on asset valuation, threat…

社区洞察

其他会员也浏览了