{"id":10163,"date":"2021-02-18T01:00:50","date_gmt":"2021-02-18T09:00:50","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=10163"},"modified":"2021-02-11T04:24:26","modified_gmt":"2021-02-11T12:24:26","slug":"node-to-node-encryption","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/node-to-node-encryption\/","title":{"rendered":"Couchbase admite cifrado de nodo a nodo"},"content":{"rendered":"<p class=\"\">Couchbase soporta encriptaci\u00f3n de nodo a nodo o encriptaci\u00f3n de Cluster a\u00f1adiendo encriptaci\u00f3n basada en TLS a las conexiones entre los nodos dentro de un cluster de Couchbase.<\/p>\n<p dir=\"ltr\">Cuando los clientes que usan Couchbase requieren que cumplamos con regulaciones de privacidad como HIPAA (clientes financieros o de salud como ejemplo), entonces t\u00edpicamente necesitamos permitir Autenticaci\u00f3n (LDAP), Autorizaci\u00f3n (RBAC-control de acceso basado en roles), y Encriptaci\u00f3n. Tambi\u00e9n es importante soportar auditor\u00eda y redacci\u00f3n de informaci\u00f3n importante, especialmente en registros (Couchbase tiene soporte para redacci\u00f3n de registros usando etiquetas espec\u00edficas). Cuando se trata de encriptaci\u00f3n, Couchbase soporta encriptaci\u00f3n de nodo a nodo a m\u00faltiples niveles usando la configuraci\u00f3n a nivel de cluster. Esto es controlado por el usuario y puede tomar 3 valores:<\/p>\n<ol>\n<li>\n<p dir=\"ltr\"><strong>Control:<\/strong> En este nivel, s\u00f3lo se cifran las conexiones del cl\u00faster y del servidor a los servicios internos. Esto incluye b\u00e1sicamente la informaci\u00f3n de gesti\u00f3n del cl\u00faster y los procesos internos relacionados. Sin embargo, los datos entre nodos del cl\u00faster no lo est\u00e1n. As\u00ed, por ejemplo, una conexi\u00f3n de servidor a servicio de consulta est\u00e1 encriptada. Este es el comportamiento por defecto.<\/p>\n<\/li>\n<li>\n<p dir=\"ltr\"><strong>Todos:<\/strong> En este nivel, tanto las conexiones entre nodos como entre servicios est\u00e1n encriptadas. Esto significa que si hay varios servicios en un mismo nodo, las conexiones entre estos servicios tambi\u00e9n est\u00e1n encriptadas. As\u00ed, junto con la conexi\u00f3n del servidor al nodo de consulta, la comunicaci\u00f3n entre nodos de consulta, del nodo de consulta al nodo indexador y al nodo FTS, tambi\u00e9n est\u00e1n encriptadas.<\/p>\n<\/li>\n<li>\n<p dir=\"ltr\"><strong>Estricto:<\/strong> Este es un nuevo nivel a\u00f1adido en nuestra pr\u00f3xima versi\u00f3n 7.0. Establecer el nivel de cifrado del cl\u00faster en \"estricto\" equivale a establecer el nivel de cifrado del cl\u00faster en \"todos\", adem\u00e1s de desactivar todos los puertos no SSL en interfaces que no sean de bucle de retorno.<\/p>\n<\/li>\n<\/ol>\n<h2>Activaci\u00f3n del cifrado N-N<\/h2>\n<p dir=\"ltr\">Por defecto, el cifrado del cl\u00faster est\u00e1 desactivado. Cuando se activa, se establece en Control. Es necesario establecerlo expl\u00edcitamente en Todos si se desea el cifrado de nodo a nodo. Es compatible con el uso de certificados.<\/p>\n<ol>\n<li>\n<p dir=\"ltr\"><strong>Desactivar auto-failover:<\/strong> Antes de activar el cifrado de cl\u00fasteres mediante el cifrado nodo-nodo, el usuario debe desactivar la conmutaci\u00f3n por error autom\u00e1tica para evitar que los nodos de la transici\u00f3n se etiqueten como que no responden y se conmuten por error. Esto se puede hacer mediante couchbase-cli o REST API.<\/p>\n<\/li>\n<\/ol>\n<p dir=\"ltr\"><code>.\/couchbase-cli setting-autofailover -c :8091 -u nombre-usuario -p contrase\u00f1a\u00a0<\/code><br \/>\n<code>--enable-auto-failover 0 \u00a0<\/code><\/p>\n<p dir=\"ltr\">O<\/p>\n<p dir=\"ltr\"><code>curl -u nombre_usuario:contrase\u00f1a https:\/\/:8091\/settings\/autoFailover\u00a0<\/code><br \/>\n<code>-d enabled=false<\/code><\/p>\n<ol start=\"2\">\n<li>\n<p dir=\"ltr\"><strong>Activar el cifrado de nodo a nodo:<\/strong> Una vez que esto regrese con \u00e9xito, podemos activar el cifrado de nodo a nodo utilizando el comando:<\/p>\n<\/li>\n<\/ol>\n<p dir=\"ltr\"><code>.\/couchbase-cli node-to-node-encryption -c :8091 -u username\u00a0<\/code><br \/>\n<code>-p contrase\u00f1a -activar<\/code><\/p>\n<p dir=\"ltr\">Esto establece el nivel de cifrado del cl\u00faster en control y activar\u00e1 el cifrado para todos los nodos del cl\u00faster. Podemos verificar que el cifrado se ha activado correctamente utilizando el comando<code>-obtener<\/code>en lugar de<code>-activar<\/code>.<\/p>\n<ol start=\"3\">\n<li>\n<p dir=\"ltr\"><strong>Cambiar la configuraci\u00f3n de cifrado del cl\u00faster:<\/strong> Si el usuario desea cambiar el nivel de cifrado del cl\u00faster, puede utilizar el siguiente comando CLI:<\/p>\n<p><code>.\/couchbase-cli setting-security -c :8091 -u nombre-usuario -p contrase\u00f1a\u00a0<\/code><br \/>\n<code>-set -cluster-encryption-level all<\/code><\/li>\n<\/ol>\n<p dir=\"ltr\">Tambi\u00e9n pueden utilizar el comando REST API:<\/p>\n<p dir=\"ltr\"><code>curl -XPOST -u nombre_usuario:contrase\u00f1a https:\/\/:8091\/settings\/security\u00a0<\/code><br \/>\n<code>-d clusterEncryptionLevel=all<\/code><\/p>\n<ol start=\"4\">\n<li>\n<p dir=\"ltr\"><strong>Vuelva a activar la recuperaci\u00f3n autom\u00e1tica:<\/strong> Despu\u00e9s de esto, el auto-failover necesita ser habilitado de nuevo.<\/p>\n<p>Para obtener m\u00e1s informaci\u00f3n sobre la activaci\u00f3n y desactivaci\u00f3n de la recuperaci\u00f3n autom\u00e1tica, consulte:<br \/>\n<a href=\"https:\/\/docs.couchbase.com\/server\/current\/cli\/cbcli\/couchbase-cli-setting-autofailover.html\">https:\/\/docs.couchbase.com\/server\/current\/cli\/cbcli\/couchbase-cli-setting-autofailover.html<\/a> Para recuperar la configuraci\u00f3n de cifrado de todo el cl\u00faster, consulte: <a href=\"https:\/\/docs.couchbase.com\/server\/current\/rest-api\/rest-setting-security.html\">https:\/\/docs.couchbase.com\/server\/current\/rest-api\/rest-setting-security.html<\/a><\/li>\n<\/ol>\n<h2>Desactivar el cifrado de nodo a nodo<\/h2>\n<ol>\n<li>\n<p dir=\"ltr\">Cambia el nivel de cifrado del cl\u00faster a control.<\/p>\n<\/li>\n<li>\n<p dir=\"ltr\">Utilice la configuraci\u00f3n de cifrado de nodo a nodo en la CLI para desactivarlo.<\/p>\n<\/li>\n<\/ol>\n<h2>Certificados y cifrado de nodo a nodo<\/h2>\n<p dir=\"ltr\">Una cosa importante a recordar cuando se asegura el servidor con certificados X509 es deshabilitar el cifrado de nodo a nodo antes de subir o rotar los certificados ra\u00edz e intermedio. As\u00ed que si asegurar un servidor con los certificados que tenemos que seguir estos pasos:<\/p>\n<ol>\n<li>\n<p dir=\"ltr\">Desactiva el cifrado de nodo a nodo.<\/p>\n<\/li>\n<li>\n<p dir=\"ltr\">Cree certificados ra\u00edz\/intermedios y c\u00e1rguelos o r\u00f3telos en el cl\u00faster siguiendo los pasos descritos en <a href=\"https:\/\/dzone.com\/articles\/authentication-using-server-side-x509-certificates\">https:\/\/dzone.com\/articles\/authentication-using-server-side-x509-certificates<\/a>.<\/p>\n<\/li>\n<li>\n<p dir=\"ltr\">Vuelve a activar el cifrado de nodo a nodo.<\/p>\n<\/li>\n<\/ol>\n<p dir=\"ltr\">Una de las limitaciones de la encriptaci\u00f3n de nodo a nodo es el impacto en el rendimiento. Dado que todas las comunicaciones entre nodos est\u00e1n encriptadas, esto a\u00f1ade algo de sobrecarga. Sin embargo, la seguridad adicional de la comunicaci\u00f3n es una ventaja a\u00f1adida.<\/p>\n<h2>Conclusi\u00f3n<\/h2>\n<p dir=\"ltr\">Con este art\u00edculo, podemos ver c\u00f3mo Couchbase soporta encriptaci\u00f3n de nodo a nodo y encripta el tr\u00e1fico de red entre nodos individuales y m\u00faltiples servicios Couchbase desplegados en los nodos para optimizar la seguridad. Esto nos permite dar soporte a aplicaciones que requieren cumplir con regulaciones de privacidad como HIPAA.<\/p>","protected":false},"excerpt":{"rendered":"<p>Couchbase supports node-to-node encryption or Cluster encryption by adding TLS based encryption to the connections between the nodes within a Couchbase cluster. When customers using Couchbase require us to comply with privacy regulations such as HIPAA (financial or healthcare customers [&hellip;]<\/p>","protected":false},"author":6882,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815],"tags":[],"ppma_author":[9057],"class_list":["post-10163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Couchbase Support for Node-to-node Encryption - The Couchbase Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/node-to-node-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Couchbase Support for Node-to-node Encryption\" \/>\n<meta property=\"og:description\" content=\"Couchbase supports node-to-node encryption or Cluster encryption by adding TLS based encryption to the connections between the nodes within a Couchbase cluster. When customers using Couchbase require us to comply with privacy regulations such as HIPAA (financial or healthcare customers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/node-to-node-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-18T09:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2022\/11\/couchbase-nosql-dbaas.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Isha Kandaswamy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Isha Kandaswamy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/\"},\"author\":{\"name\":\"Isha Kandaswamy\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/f236f76f209f447fbc8fd46d91eb7e52\"},\"headline\":\"Couchbase Support for Node-to-node Encryption\",\"datePublished\":\"2021-02-18T09:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/\"},\"wordCount\":651,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"articleSection\":[\"Best Practices and Tutorials\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/\",\"name\":\"Couchbase Support for Node-to-node Encryption - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2021-02-18T09:00:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Couchbase Support for Node-to-node Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/f236f76f209f447fbc8fd46d91eb7e52\",\"name\":\"Isha Kandaswamy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/e8464106b598ad96e4e1446687ce93f6\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9c28181876ed38a9634b77ddbe73ada95b0f82838c0cce722be73968630d41e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9c28181876ed38a9634b77ddbe73ada95b0f82838c0cce722be73968630d41e1?s=96&d=mm&r=g\",\"caption\":\"Isha Kandaswamy\"},\"description\":\"Isha Kandaswamy is a Senior Software Engineer at Couchbase. Isha is responsible for the development of designing the different features and tools for the N1QL Query Language -SQL for Json. Also, Designing and implementing features and tools for the N1QL query language.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/es\/author\/isha-kandaswamy\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Couchbase Support for Node-to-node Encryption - The Couchbase Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/node-to-node-encryption\/","og_locale":"es_MX","og_type":"article","og_title":"Couchbase Support for Node-to-node Encryption","og_description":"Couchbase supports node-to-node encryption or Cluster encryption by adding TLS based encryption to the connections between the nodes within a Couchbase cluster. When customers using Couchbase require us to comply with privacy regulations such as HIPAA (financial or healthcare customers [&hellip;]","og_url":"https:\/\/www.couchbase.com\/blog\/es\/node-to-node-encryption\/","og_site_name":"The Couchbase Blog","article_published_time":"2021-02-18T09:00:50+00:00","og_image":[{"width":1800,"height":630,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2022\/11\/couchbase-nosql-dbaas.png","type":"image\/png"}],"author":"Isha Kandaswamy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Isha Kandaswamy","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/"},"author":{"name":"Isha Kandaswamy","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/f236f76f209f447fbc8fd46d91eb7e52"},"headline":"Couchbase Support for Node-to-node Encryption","datePublished":"2021-02-18T09:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/"},"wordCount":651,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","articleSection":["Best Practices and Tutorials"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/","url":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/","name":"Couchbase Support for Node-to-node Encryption - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2021-02-18T09:00:50+00:00","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Couchbase Support for Node-to-node Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/f236f76f209f447fbc8fd46d91eb7e52","name":"Isha Kandaswamy","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/e8464106b598ad96e4e1446687ce93f6","url":"https:\/\/secure.gravatar.com\/avatar\/9c28181876ed38a9634b77ddbe73ada95b0f82838c0cce722be73968630d41e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9c28181876ed38a9634b77ddbe73ada95b0f82838c0cce722be73968630d41e1?s=96&d=mm&r=g","caption":"Isha Kandaswamy"},"description":"Isha Kandaswamy es Ingeniero de Software Senior en Couchbase. Isha es responsable del desarrollo del dise\u00f1o de las diferentes caracter\u00edsticas y herramientas para el lenguaje de consulta N1QL -SQL para Json. Adem\u00e1s, dise\u00f1a e implementa caracter\u00edsticas y herramientas para el lenguaje de consulta N1QL.","url":"https:\/\/www.couchbase.com\/blog\/es\/author\/isha-kandaswamy\/"}]}},"authors":[{"term_id":9057,"user_id":6882,"is_guest":0,"slug":"isha-kandaswamy","display_name":"Isha Kandaswamy","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/9c28181876ed38a9634b77ddbe73ada95b0f82838c0cce722be73968630d41e1?s=96&d=mm&r=g","author_category":"","last_name":"Kandaswamy","first_name":"Isha","job_title":"","user_url":"","description":"Isha Kandaswamy es Ingeniero de Software Senior en Couchbase. Isha es responsable del desarrollo del dise\u00f1o de las diferentes caracter\u00edsticas y herramientas para el lenguaje de consulta N1QL -SQL para Json. Adem\u00e1s, dise\u00f1a e implementa caracter\u00edsticas y herramientas para el lenguaje de consulta N1QL."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/10163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/6882"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=10163"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/10163\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=10163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=10163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=10163"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=10163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}