🔐 Secure your cluster with TLS, numerous authentication backends, data masking, audit logging as well as role-based access control on indices, documents, and fields
It would be nice to have a documented set of steps for contributors to follow when benchmarking any performance improvement code changes that they make as part of their contribution. They post these on PRs to facilitate better visualization for reviewers, and can serve as a reference for future.
It would be nice to have a documented set of steps for contributors to follow when benchmarking any performance improvement code changes that they make as part of their contribution. They post these on PRs to facilitate better visualization for reviewers, and can serve as a reference for future.