-
Relevance
Full-text queries find all documents that match the query string and return them sorted by relevance - how good a match they are for your search terms.
By default, Elasticsearch sorts matching search results by relevance score, which measures how well each document mathces a query.
-
Query DSL
You can access all kinds of search capabilities using Elasticsearch’s omprehensive JSON-style query language (Query DSL).
Elasticsearch provides a full Query DSL (Domain Specific Language) based on JSON to define queries.
Think of the Query DSL as an AST (Abstract Syntax Tree) of queries, consisting of two types of clauses:
- Leaf query clauses
- Compouned query clauses
-
SQL access
Elasticsearch SQL aims to provide a powerful yet lightweight SQL interface to Elasticsearch.
Elasticsearch SQL is an X-Pack component that allows SQL-like queries to be executed in realtime against Elasticsearch.
-
Shards
There are two types of shards:
primaries
andreplicas
.Each document in an index belongs to one primary shard.
A replica shard is a copy of a primary shard.
扫描二维码关注公众号,回复: 12246677 查看本文章 -
CCR(Cross-Cluster replication)
CCR provides a way to automaticlly synchronize indices from primary cluster to a secondary remote cluster that can serve as a hot backup.
-
Resiliency
The cluster status will remain
yellow
if you are only running a single instance of Elasticsearch.A single node cluster is fully functional, but data cannot be
relicated
to another node to provide resiliency.Replica shards must be avaiable for the cluster status to be
green
.If the cluster status is
red
, some data is unavaiable. -
Bulk API
If you have a lot of documents to index, you can submit them in batches with the bulk API.
Performs multiple indexing or delete operations in a single API call. It reduces overhead and can greatly increase indexing speed.
-
EUI(Elastic UI framework)
The Elastic UI framework is a design library in use at Elastic to build internal products that need to share our aesthetics.
-
SIEM
Security Information and Event Management(SIEM) is a subsection within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM).
They provide real-time analysis of security alerts generated by applications and network hardware.
-
SIM(Security Information Management)
Security Information Management (SIM) is an information security industry term for the collection of data such as
log files
into a central repository -
Information Security
Information security (shortened to infosec) is the practice of protecting information by mitigating information risks.
-
SEM(Security Event Management)
Security Event Management and related SIM, SIEM, are computer secrity disciplines that use data inspection tools to centralize the storage and interpretation of logs or events generated by other software running on a network.
-
ECS(Elastic Common Schema)
The Elastic Common Schema is an open source specification, developed with support from the Elastic user community.
The goal of ECS is to enable and encourage users of Elasticsearch to normalize their event data, so that they can better analyze, visualize, and correlate the data represented in their events.
-
Beats
Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch.
Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana.
-
Observability
At Elastic, we view observability as an attribute of any system that you build and want to monitor.
-
Bootstrap Password
The bootstrap password is a transient password that enables you to run the tools that set all the
built-in user
passwords. -
Built-in users || superuser
The Elastic Stack security features provide
built-in user
credentials to help you get up and running.These users have a fixed set of priviledges and cannot be authenticated until their passwords have been set.
Built-in users are stored in a special
.security
index, which is managed by Elasticsearch.The
elastic
user(a built-in superuser) can be used to set all of the built-in user passwords. -
Realm
Realms define the administrative boundary within which the authentication server has authority to authrnticate users and services.
-
Built-in roles
The Elastic Stack security features apply a default
role
to allusers
, includinganonymouse users
.A
user
with thesuperuser
role can also manage users and roles and impersonate any other user in the system. -
RBAC(Role-Based Access Control)
《理解LDAP||Active Directory||PKI||RBAC||SAML||Kerberos》
The security features provide a role-based access control (RBAC) mechanism, which enables you to authorize
users
by assigningprivileges
toroles
and assigningroles
tousers
orgroups
. -
real-time pipelining capabilities
深入理解ElasticSearch关键词
猜你喜欢
转载自blog.csdn.net/The_Time_Runner/article/details/111411126
今日推荐
周排行