It’s over! We updated our Elasticsearch from version 6.8 to 7.10! The latest version of ElasticSearch appeared on 11.11!
We use elastic stack in our service + several other technologies. We also try to keep the concept of “stay on latest” and constantly get better.
For us, there are several main advantages of updating to the most current version:
- Performance. With each release, the Elasticsearch team tries to increase the performance and efficiency of the entire stack. For example, by introducing a new snapshot search engine and using high-cost “hot” nodes to lower cost “warm” nodes with less performant disks. Searchable snapshots, a new beta feature that allows us to directly search our snapshots without a restore. “Store more and spend less”
- Improvements to the compression mechanism. Elastic tests show that the new version allows us to reduce the space taken up by up to 10% with new compression of saved fields! “be smaller, in a big way”
- Elasticsearch reduced aggregation memory consumption by maintaining serialized results, and in 7.9 they increased the search.max_buckets limit to 65,535.
- Fix tons of different bugs that were from 6.8 to 7.10.
The main benefits for our users/customers are faster search and use of all its new features. Few examples with search.
Underestimated exploits of the month with cvss score lower than Vulners AI score:
Google chrome releases zero-day vulnerabilities fix every week this month. Let’s take a look at them:
The same option using the vulners API wrapper:
import vulners vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE") all_short_results = vulners_api.search( 'affectedSoftware.name:chrome AND affectedSoftware.version:[86 TO 86.4]') full_documents_info = vulners_api.documentList( [doc_id['id'] for doc_id in all_short_results], fields=["*"])
Those who regularly use the Vulners API will feel the greater effect of the new performance.
Other example about subscriptions. Suppose you are interested in IOS and GitLab, which are so often used. New vulnerabilities are often found in this software, so you should subscribe to them:
Or if you update your software only when critical vulnerabilities appear:
Try our custom subscriptions:
- Go to the subscriptions page: https://vulners.com/subscriptions
- Fill all necessary fields and add new subscribe:
Really short feedback -> here