44:50 - I think It's explained in the documentation why this search approach is not always the best. If you want to search in languages that do not use delimiters - like Japanese, Chinese, you won't get the results you expect. In that case it's suggested to use n-grams.
+1 for great content. It's refreshing to see some more in-depth insights. And thanks for taking a stab at the optimal shard size question and adding some perspective, even though there's no definitve answer (besides it depends, that is).
Sure, I got what you mean :) However, I think of "security by obscurity" as an "extra", like using a non-standard port for a service. That would make some service less likely to be found and attempted to be exploioted in the first place. Not sufficient in and of itself, but useful in any case.
@@MBJ2323 Yes but those obfuscations are tested by highly skilled professional cryptographers and penetration testers so algorithms like AES is the standard for a reason. Using AES is a good practice and it is NOT security by obscurity. Security by obscurity means that you implement some sort of custom-made encryption algorithms or do some other sort of "customized security" vs what the norm is so that attackers "cant figure it out". Trust me, they will have an easier time with your customized security than with AES, RSA..etc
its 2021 and this is still the best presentation on elastic i have seen.
Thank you Tony!
44:50 - I think It's explained in the documentation why this search approach is not always the best. If you want to search in languages that do not use delimiters - like Japanese, Chinese, you won't get the results you expect. In that case it's suggested to use n-grams.
+1 for great content. It's refreshing to see some more in-depth insights. And thanks for taking a stab at the optimal shard size question and adding some perspective, even though there's no definitve answer (besides it depends, that is).
love it . is there a way get the pdf?
Great content. Are these slides available somewhere?
Thank you for posting this!
Awesome video to learn Elasticsearch .
great talk! very informative, thanks
Excellent tips. Thank you.
Very insightful, thank you!
Great content! Thanks
please share me presentation
"Security by obscurity is always a good idea."
EasyMac308 sure it can give a false sense of security, but maybe it’s better than being the lowest hanging fruit.
Sure, I got what you mean :) However, I think of "security by obscurity" as an "extra", like using a non-standard port for a service. That would make some service less likely to be found and attempted to be exploioted in the first place. Not sufficient in and of itself, but useful in any case.
isn't all security practices we have nowadays about obfuscation?
@@MBJ2323 Yes but those obfuscations are tested by highly skilled professional cryptographers and penetration testers so algorithms like AES is the standard for a reason. Using AES is a good practice and it is NOT security by obscurity. Security by obscurity means that you implement some sort of custom-made encryption algorithms or do some other sort of "customized security" vs what the norm is so that attackers "cant figure it out". Trust me, they will have an easier time with your customized security than with AES, RSA..etc