Why Encryption at Rest Matters for Your Business
Daniel Gleim || 2025-04-22
In this article, we’ll explore what Encryption at Rest is, how it works, and why it’s an essential part of a modern data security strategy.
read more
How to Create a Search Engine
Daniel Gleim || 2025-04-14
In this blog post, we’ll walk through the fundamentals of creating a search engine — from the way data is stored and analyzed to how search queries are handled.
read more
How to Transition from Elasticsearch Enterprise to SearchGuard Community Edition
Daniel Gleim || 2025-04-09
How to migrate from Elasticsearch Enterprise to the SearchGuard Community Edition to reduce costs without compromising on security features.
read more
Are you using Elasticsearch? You are probably paying too much
Daniel Gleim || 2025-04-01
For users of Elasticsearch Enterprise, the free Search Guard Community Edition offers an excellent way to transition while retaining key security features.
read more
Understanding Kerberos Part 1: The Basics
Jochen Kressin || 2024-05-27
This article delves into the details of Kerberos, explores its most common applications, and discusses its advantages and disadvantages over other authentication methods like SAML (Security Assertion Markup Language) and OIDC (OpenID Connec ...
read more
Common Elasticsearch Errors and How to Solve Them - Part 1
Jochen Kressin || 2024-04-24
In this blog post series, we’ll cover the most common Elasticsearch errors in detail and provide a step-by-step guide to troubleshooting them.
read more
EasyPark App Breach: Embracing Zero Trust Architecture
Claudia Kressin || 2024-03-18
The recent EasyPark app breach serves as a stark reminder of the ever-looming threat of cyber attacks in today's digital landscape. As organizations grapple with the aftermath of such incidents, it's crucial to reassess our approach to data security. ...
read more
Handling Configuration Variables in Search Guard FLX
Jochen Kressin || 2022-08-09
This article will show you how you can use the new configuration variables feature in FLX to get rid of any sensitive information in configuration files.
read more
Exclude Elasticsearch permissions from Search Guard roles
Jochen Kressin || 2020-11-18
How to combine including and excluding Elasticsearch permissions for Search Guard roles to create flexible and dynamic access controls.
read more
Security lessons from the Dark Web
Ewa Anna Szyszka || 2020-10-05
In this article we focus on the security lessons that can be learned from the Dark Web, which is only a small part of the Deep Web.
read more
What are micro-perimeters in the Zero-Trusted Networks approach?
Jochen Kressin || 2020-10-01
How micro-perimeters are defined, why they are increasing your security infrastructure, and how can they be applied to Elasticsearch
read more
The Anatomy of Single Sign On
Ewa Anna Szyszka || 2020-09-24
Single Sign On is a subset of federated authentication management and can be split into two main tasks: Federation and Delegation.
read more
Demystifying Kubernetes
Ewa Anna Szyszka || 2020-09-17
This article provides a high-level overview on Kubernetes and how it can help you set up a fully containerised environment.
read more
Machine Learning in Information Security
Ewa Anna Szyszka || 2020-09-07
Data is the new oil and the fundament of our digital economy today. How can we use AI to create a more secure tomorrow?
read more
Quantum Computing and the future of security
Ewa Anna Szyszka || 2020-08-06
What does the arrival of quantum computers mean for the future of security and what vulnerabilities would the popularization of quantum computation bring?
read more
MITRE names Search Guard as a CVE Numbering Authority
Fabian Michalsen || 2019-07-03
floragunn GmbH has been named as a CVE numbering authority (CNA) by MITRE on June 26th. We look forward to participating in and supporting the CVE project.
read more
Using Kerberos with Elasticsearch and Kibana
Cliff Stayley || 2019-01-16
How to setup Kerberos authentication for Elasticsearch and Kibana by using Search Guard, the enterprise security suite for Elasticsearch.
read more
Creating Search Guard TLS certificates with OpenSSL
Jochen Kressin || 2019-01-04
This article shows how to create TLS certificates for securing Elasticsearch with Search Guard from scratch by using OpenSSL.
read more
Zero-trusted networks
Cliff Staley || 2019-01-02
To secure your data in Elasticsearch, leveraging perimeter security is not sufficient anymore. Why you should switch to a zero-trusted network approach.
read more
Field anonymization
Cliff Staley || 2018-12-21
How to use Search Guard to anonymise sensitive data in your Elasticsearch cluster on the fly without any modifcations at ingest time.
read more
An introduction to TLS
Jochen Kressin || 2018-08-20
This article explains the basics of TLS and why it is the best technology for securing and encrypting data in an Elasticsearch cluster at the moment.
read more
Kibana Single Sign-On with OpenID and Keycloak
Jochen Kressin || 2018-07-12
Use Search Guard to implement Kibana Single Sign On with OpenID. Use your favorite identity provider like Keycloak, Okta or Auth0 with the Elastic stack.
read more
Using JSON web tokens to secure Elasticsearch
Cliff Staley || 2018-03-19
How to set up and use JSON web tokens to implement Single-Sign-On access to Elasticsearch and Kibana, and how to integrate with Keycloak.
read more
Security for distributed systems
Cliff Staley || 2018-02-20
In this article, we focus on some critical features of implementing security for distributed systems and see how do they affect Elasticsearch and Kibana.
read more
Search Guard puts security first
Jochen Kressin || 2018-01-30
Search Guard provides the highest level of security for Elasticsearch possible. Our mission is to always put security first.
read more
What's new in Search Guard 6: Attribute based document access
Claudia Kressin || 2018-01-15
The Search Guard security suite for Elasticsearch and Kibana provides attribute based access control for documents in your Elasticsearch cluster
read more
Security means Open Source by definition
Claudia Kressin || 2017-10-26
The source code of Search Guard was always publicly available. Any security solution has to be open source by definition.
read more
Don’t rely on proxies for Elasticsearch security
Jochen Kressin || 2017-05-27
This article shows why using a proxy for implementing security for Elasticsearch is a bad idea, and why you should use Search Guard instead.
read more
Transport client authentication and authorization
Jochen Kressin || 2016-11-13
How to use an Elasticsearch transport client with Search Guard authentication and authorization.
read more
Document- and field-level security with Search Guard
Jochen Kressin || 2016-08-17
Use document- and field-level security with Elasticsearch and Kibana to restrict access to documents and fields.
read more
Why does Search Guard require SSL/TLS?
Jochen Kressin || 2016-07-09
In this article we explain how Search Guard uses TLS to protect the traffic in your Elasticsearch cluster on REST and transport layer.
read more