{"id":1698,"date":"2014-12-16T19:19:03","date_gmt":"2014-12-16T19:19:02","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=1698"},"modified":"2023-11-28T11:22:23","modified_gmt":"2023-11-28T19:22:23","slug":"memcached-security-best-practices","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/memcached-security-best-practices\/","title":{"rendered":"Buenas pr\u00e1cticas de seguridad de Memcached"},"content":{"rendered":"<p><a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">Memcached<\/a> la seguridad es un tema candente desde que los chicos de sensepost publicaron go-derper en blackhat.<\/p>\n<p>La presentaci\u00f3n fue bastante buena e informativa, pero parece que el bombo que se le ha dado ha dejado a mucha gente confusa. Aunque gran parte de este tema se trat\u00f3 en la presentaci\u00f3n, es necesario repetirlo en la medida de lo posible.<\/p>\n<h3>Primero y siempre, cortafuegos<\/h3>\n<p>Esto es realmente parte de la prueba de nivel sysadmin y no tiene nada que ver con <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> en particular, pero voy a seguir adelante y mencionarlo de todos modos.<\/p>\n<p>Siempre se empieza por un cortafuegos <em>todo<\/em> y luego permitir que s\u00f3lo las cosas que necesitas pasen por los lugares que necesitas que pasen.<\/p>\n<p>No voy a ense\u00f1arte a usar tu cortafuegos, pero empieza con la configuraci\u00f3n que desactiva toda conectividad a tu caja.<\/p>\n<p>Si est\u00e1 ejecutando un servidor web, permita conexiones al puerto <code>443<\/code>. Si tambi\u00e9n desea conexiones no SSL, permita el puerto <code>80<\/code>. Si ese es el \u00fanico servicio que presta, su cortafuegos ya est\u00e1 completo.<\/p>\n<p>Me gustar\u00eda se\u00f1alar que <a href=\"https:\/\/aws.amazon.com\/ec2\/\"><u><span style=\"color: #0066cc\">Amazon EC2<\/span><\/u><\/a> hace esto <em>por defecto<\/em>Sin embargo, hay suficientes cortafuegos mal configurados como para que hayan sentido la necesidad de enviar un formulario a muchos de sus usuarios para hacerles saber que \"tienen al menos un grupo de seguridad que permite que todo Internet tenga acceso al puerto m\u00e1s utilizado por...\". <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> (11211)\".<\/p>\n<h3>Compruebe sus fijaciones<\/h3>\n<p>Si su aplicaci\u00f3n s\u00f3lo se ejecuta en un servidor (con la app y el <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> en el mismo equipo), puede enlazarlo a localhost a\u00f1adiendo<\/p>\n<div class=\"geshifilter\">\n<div class=\"text geshifilter-text\" style=\"font-family: monospace\">-l 127.0.0.1<\/div>\n<\/div>\n<p>a la <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> banderas. Ahora, a pesar de que ha firewall acceso a <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a>Tienes que ser <em>en<\/em> la m\u00e1quina para contactar incluso con la cach\u00e9 cuando alguien rompe la configuraci\u00f3n de su cortafuegos.<\/p>\n<h3>Si lo necesita, utilice SASL<\/h3>\n<p>Las \u00faltimas versiones de <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> admite cifrado <a href=\"https:\/\/en.wikipedia.org\/wiki\/Simple_Authentication_and_Security_Layer\"><u><span style=\"color: #0066cc\">SASL<\/span><\/u><\/a> autentificaci\u00f3n.<\/p>\n<p>Aunque ya haya protegido su <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> desactivados, puede exigir a los clientes que realicen una autenticaci\u00f3n fuerte antes de utilizar el servicio.<\/p>\n<h3>Por favor, <em>Por favor,<\/em> No ejecutar como root<\/h3>\n<p><span style=\"font-weight: 400\">Bajo ninguna circunstancia debe intentar ejecutar <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> como ra\u00edz; se <em>no<\/em>\u00a0<\/span>quiere ejecutar como root. Se esfuerza por evitarlo. Sin embargo, muchas personas tienen una \"soluci\u00f3n\" que permite<a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\"> memcached <\/a>para iniciar como root (que no voy a repetir) s\u00f3lo por el bien de hacer su infraestructura menos segura.<\/p>\n<p>Si alguien se salta de alg\u00fan modo el cortafuegos que ha configurado para impedir el acceso a <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> y de alguna manera se las arregla para encontrar un agujero de seguridad en <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/scaling-memcached-vbuckets\/\">memcached<\/a> permitiendo la ejecuci\u00f3n de c\u00f3digo, \u00bf <em>realmente<\/em> \u00bfQuieres entregar el acceso root?<\/p>\n<p>No hay problemas conocidos, pero no auditamos el c\u00f3digo para asegurarnos de que es seguro ejecutarlo como root. Eso est\u00e1 bien, porque ning\u00fan administrador de sistemas responsable ejecutar\u00eda un servicio como root sin una justificaci\u00f3n muy s\u00f3lida, y probablemente mucho trabajo en la creaci\u00f3n de un entorno enjaulado.<\/p>\n<h3>Compruebe la configuraci\u00f3n del cortafuegos<\/h3>\n<p>Mira, no estoy dudando de que sepas c\u00f3mo configurar tu cortafuegos, pero ten paciencia conmigo.<\/p>\n<div><a href=\"https:\/\/nerduo.com\/thebattle\/\"><img decoding=\"async\" class=\"floatleft\" title=\"Saber es la mitad de la batalla\" src=\"https:\/\/dustin.github.com\/images\/thebattle.png\" alt=\"Knowing\" \/><\/a><\/div>\n<p>Agarra <a href=\"https:\/\/nmap.org\/\"><u><span style=\"color: #0066cc\">nmap<\/span><\/u><\/a> o similar. Ejecute un escaneo completo de puertos en su equipo: uno desde un sistema fiable, otro desde un sistema semiconfiable y otro desde un sistema completamente no fiable.<\/p>\n<p>Si hay alguna respuesta para alg\u00fan servicio que no puedas justificar, ahora lo sabes y puedes solucionarlo.<\/p>\n<p>Eso es <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/es\/memcached-replacement\/\">no s\u00f3lo memcached<\/a> - es decir, gearman, beanstalkd, snmpd, un servidor de correo, un servidor DNS, un servidor LDAP, etc.<\/p>\n<p>Para cualquier servicio que <em>do<\/em> tienen en funcionamiento y a disposici\u00f3n del p\u00fablico, aseg\u00farese de <em>completamente<\/em> comprender las implicaciones de seguridad de la ejecuci\u00f3n de este servicio.<\/p>\n<p>No te averg\u00fcences de preguntar si no lo entiendes todo. Es mucho mejor que ser un ejemplo en una presentaci\u00f3n en el pr\u00f3ximo black hat porque est\u00e1s ejecutando un servicio que no ten\u00edas previsto y filtraste informaci\u00f3n importante.<\/p>","protected":false},"excerpt":{"rendered":"<p>Memcached security is a hot topic since the sensepost guys released go-derper\u00a0at blackhat. The presentation was pretty good and informative, but it seems like the hype around it has left a bunch of people confused. Although much of this was [&hellip;]<\/p>","protected":false},"author":34,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"ppma_author":[8992],"class_list":["post-1698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Memcached Security Best Practices: 5 to Keep an Eye On<\/title>\n<meta name=\"description\" content=\"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/memcached-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Memcached Security Best Practices\" \/>\n<meta property=\"og:description\" content=\"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/memcached-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-16T19:19:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-28T19:22:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dustin.github.com\/images\/thebattle.png\" \/>\n<meta name=\"author\" content=\"Dustin Sallings, Chief Architect, Couchbase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dustin Sallings, Chief Architect, Couchbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\"},\"author\":{\"name\":\"Dustin Sallings, Chief Architect, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0\"},\"headline\":\"Memcached Security Best Practices\",\"datePublished\":\"2014-12-16T19:19:02+00:00\",\"dateModified\":\"2023-11-28T19:22:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\"},\"wordCount\":637,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\",\"name\":\"Memcached Security Best Practices: 5 to Keep an Eye On\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2014-12-16T19:19:02+00:00\",\"dateModified\":\"2023-11-28T19:22:23+00:00\",\"description\":\"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Memcached Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0\",\"name\":\"Dustin Sallings, Chief Architect, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/c5bddc8d7dab8b5c9121282556b0dbff\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g\",\"caption\":\"Dustin Sallings, Chief Architect, Couchbase\"},\"description\":\"Dustin Sallings is a Chief Architect at Couchbase. Dustin is an Author of spymemcached and core contributor to Couchbase and Memcached projects.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/es\/author\/dustin-sallings\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Memcached Security Best Practices: 5 to Keep an Eye On","description":"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/memcached-security-best-practices\/","og_locale":"es_MX","og_type":"article","og_title":"Memcached Security Best Practices","og_description":"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.","og_url":"https:\/\/www.couchbase.com\/blog\/es\/memcached-security-best-practices\/","og_site_name":"The Couchbase Blog","article_published_time":"2014-12-16T19:19:02+00:00","article_modified_time":"2023-11-28T19:22:23+00:00","og_image":[{"url":"https:\/\/dustin.github.com\/images\/thebattle.png","type":"","width":"","height":""}],"author":"Dustin Sallings, Chief Architect, Couchbase","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dustin Sallings, Chief Architect, Couchbase","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/"},"author":{"name":"Dustin Sallings, Chief Architect, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0"},"headline":"Memcached Security Best Practices","datePublished":"2014-12-16T19:19:02+00:00","dateModified":"2023-11-28T19:22:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/"},"wordCount":637,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","articleSection":["Uncategorized"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/","url":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/","name":"Memcached Security Best Practices: 5 to Keep an Eye On","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2014-12-16T19:19:02+00:00","dateModified":"2023-11-28T19:22:23+00:00","description":"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Memcached Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0","name":"Dustin Sallings, Arquitecto Jefe, Couchbase","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/c5bddc8d7dab8b5c9121282556b0dbff","url":"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g","caption":"Dustin Sallings, Chief Architect, Couchbase"},"description":"Dustin Sallings is a Chief Architect at Couchbase. Dustin is an Author of spymemcached and core contributor to Couchbase and Memcached projects.","url":"https:\/\/www.couchbase.com\/blog\/es\/author\/dustin-sallings\/"}]}},"authors":[{"term_id":8992,"user_id":34,"is_guest":0,"slug":"dustin-sallings","display_name":"Dustin Sallings, Chief Architect, Couchbase","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g","author_category":"","last_name":"Sallings","first_name":"Dustin","job_title":"","user_url":"","description":"Dustin Sallings es Arquitecto Jefe en Couchbase. Dustin es autor de spymemcached y colaborador principal de Couchbase y <a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/3.x\/developer\/dev-guide-3.0\/memcached.html#projects\">Proyectos Memcached.<\/a>"}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/1698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=1698"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/1698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=1698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=1698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=1698"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=1698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}