Preventing data loss for data in motion is a challenge that Cribl Stream Persistent Queues (PQ) can help prevent when the downstream Destination is unreachable. In this blog post, we’ll talk about how to configure and calculate PQ sizing to avoid disruption while the Destination is unreachable for a few minutes or a few hours. The example follows a real-world architecture, in which we have.
The process of adding new data to operations and security analytics tools is familiar to admins. New data onboarding can be a tiresome process that takes up too much time and delays getting value from the new data. The process typically begins with the admin engaging the data source owner, getting the wrong data sample, and then having to try again.
Ah, the age-old question of how to manage screen time for kids – it’s like trying to navigate a minefield of Peppa Pig, Paw Patrol, and PJ Masks! I mean, who knew Octonauts and Bubble Guppies would become household names? As a dad of two young kids, managing screen time is a balancing act, especially keeping our 5-year-old happy with access to her shows.
It’s been about 8 months since we first launched Cribl Search. For our early adopters, it’s been a game changer, and with each monthly release, we continue to innovate — expanding access to new datasets and adding new functionalities. If Crib Search is new to you, here is a quick recap. Cribl Search flips the observability data search paradigm on its head. You no longer have to collect, ingest, and index your data before you can search it.
When I was still writing code, our Splunk license only had enough capacity to monitor our Production environment. So we stood up a self-managed Elastic cluster for our lower environments. This quickly became unmanageable as we started logging more and adding additional environments. As I spend more time in the field, I see this pattern repeated over and over.
When working with sensitive data, there’s no skimping on security. Keeping data protected and private is paramount at Cribl, which is why we prioritized building a robust framework for Role-Based Access Control (RBAC), and with this latest release, we created an authorization system across the entire Cribl suite. WOOHOO!!
During our March Cribl User Group livestream, Cribl’s own Eugene Katz covered some of the updates we made to our documentation on Architectural Considerations for deploying Cribl Stream. Topics included our guidelines for determining the ideal number of worker nodes, accounting for throughput variability, and preparing for system failure. The full video has more information on these and other things to consider when determining the right balance between cost and risk for your organization.
In this blog series, we’ll explore how Corelight and Cribl Stream work together to improve observability in Security Operations Centers (SOCs). In today’s rapidly changing threat landscape, it’s crucial to efficiently monitor and manage data for effective security operations. Corelight provides exceptional network visibility, while Cribl Stream gives you control and the flexibility to optimize data pipelines and gain valuable insights.
The common failure scenarios that occur in the cybersecurity world are typically assumed to be costs of doing business, but they’re actually more predictable and avoidable than you might imagine. Even if you’ve been lucky enough to avoid failed data sources or backups, a SIEM getting knocked offline, and other cybersecurity attack situations until now — in today’s day and age, they’re still inevitable.
Hey there, Cribl fans! We hope you’re ready to move into the second half of summer with a splash because we have some exciting news to share. Our latest product launch is all about enabling teams and multiple users to work together seamlessly while focusing on security, access control, and providing valuable data insights on demand. Who says you can’t have it all? Let’s dive right into the details!
Many of us remember the public service announcements asking parents if they knew where their kids were at night. They were ominous and a little alarming. Asking yourself the same question about your data can be equally as scary, but Cribl Edge can help.
As someone who admittedly gets bored easily, one of my favorite things about working for a company like Cribl is the huge amount of technologies in our ecosystem I get exposure to. Over time, I also get to observe trends in the market – it’s always so cool to see big upswings in adoption for various platforms and tech. One such trend I’ve observed over the last year is a noticeable uptake and presence in the market of Google Chronicle.
Event Hubs is Microsoft’s cloud-native real-time event streaming service. For Event Hubs to work, data must be pushed to or pulled from it. That is where Cribl Stream comes in. Event Hubs is a source and destination inside Cribl Stream and the control for how you route, shape, and transform your data from Event Hubs. But, one does not simply Stream into (or from) Event Hubs. There is a lot that goes into architecting an Event Hubs Source.
Psst, hey pal, would you like to buy a time machine? I am not talking about some H.G. Wells monstrosity where you somehow end up being chased by dinosaurs or become your own grandparent. But a time machine for your observability data. License costs and tool performance often keep organizations from ingesting all their data or require them to limit data retention time. Security incidents are often discovered long after these retention times are exhausted or require data that was never ingested.
Can you believe we’re already halfway through 2023? Time flies when you’re busy innovating and having fun (yet somehow also seems so slow when you are waiting for your next vacation!!). At Cribl, we’ve been hard at work releasing wave after wave of incredible new features and capabilities across our entire product suite.