Operations | Monitoring | ITSM | DevOps | Cloud

October 2023

Using Cribl Search to Aid in Threat Hunting by Enriching Data in Motion

Cribl Search is reshaping the data search paradigm, empowering users to uncover and analyze data directly from its source. Cribl Search can easily reach out and query data already collected in Amazon S3 (or S3 compatible), Amazon Security Lake, Azure Blob, Google Cloud Storage, and more. By searching data where it lives, you can dramatically speed up your search process by avoiding the need to move data before analyzing it.

Troubleshoot and Monitor LogStash using Cribl Edge and Cribl Search

I have worked as a helpdesk specialist, cyber security analyst, information systems security engineer, professional services consultant, etc. At this point in my career, I have seen enough to relate with anyone in the IT world. Let’s narrow our focus and chat about monitoring system health and troubleshooting. Tool sprawl is the standard.

Kubernetes + Cribl Edge: Because Logging and Metrics Shouldn't Be a Mystery Novel!

To fully utilize the capabilities of Kubernetes, it’s crucial to have a reliable system for gathering and organizing logs, metrics, and events. With the complex nature of container orchestration, it’s crucial to understand the significance and process behind the data generated in a Kubernetes environment at scale. Cribl Edge works seamlessly with Kubernetes and can cater to various needs.

Building the Future of Data for IT and Security

Today, Cribl surpassed $100 million in annual recurring revenue (ARR), becoming one of the fastest companies to ever reach this milestone in under four years––an incredible achievement on our journey to building a generational company. Reaching $100 million in ARR so quickly shows that our unique approach and steadfast focus on IT and Security continues to be validated by the market.

Using the Cribl API - Part 1

Cribl’s interface is Super Neato: Reactive, beautiful, and easy to use. But sometimes you need to access settings and configurations programmatically. The good news is that interactive API docs are baked into your Cribl instance. The better news is that everything that happens in the GUI is making API calls. With your browser’s developer mode, you can easily take a peak behind the curtain to see exactly how the API was called and what the payload looked like.

Leveraging Tines and Cribl Search for Security Automation

At Cribl, we have the privilege of helping our customers achieve their strategic data goals by giving them visibility and control over all of their observability data. The reality today is that data is commonly stored across many places. Whether intentional (such as using Cribl Stream to create a security data lake) or unintentional (because of silos and tool sprawl), organizations desire the ability to access and analyze all of this information at any time.

Cribl Stream Demo with Max Weber

Join Cribl's Ed Bailey and Max Weber, Senior Detection Engineer, for a fun discussion about the challenges of detection engineering and how Max is solving these problems every day. We will discuss the current state of detection engineering, why data engineering is a prerequisite for better detection engineering, and what Max would like to see to help drive better outcomes. Max will demo Cribl Stream and show how his data engineering skills drive better detections.

Connect and Federate Searches Across Your Cloud Data Lakes with Cribl Search

The way we handle massive volumes of data from multiple sources is about to change fundamentally. The traditional data processing systems don’t always fit into our budget (unless you have some pretty deep pockets). Our wallets constantly need to expand to keep up with the changing data veracity and volume, which isn’t always feasible. Yet we keep doing it because data is a commodity.

Unpacking the Hype: Navigating the Complexities of Advanced Data Analytics in Cybersecurity

The cybersecurity industry is experiencing an explosion of innovative tools designed to tackle complex security challenges. However, the hype surrounding these tools has outpaced their actual capabilities, leading many teams to struggle with complexity and extracting value from their investment. In this conversation with Optiv‘s Randy Lariar, we explore the potential and dangers of bringing advanced data analytics and artificial intelligence tools to the cybersecurity space.

The Quest to Process Microsoft Windows Event Logs in Snare Format with Cribl

One of the things I really love about working for Cribl is the ability to help our customers optimize their data. Microsoft Windows Event Logs are something I have always looked to as a proverbial Rosetta Stone to help translate semi-structured, classic-style events into something more efficient and less resource-intensive to search. Extracting field values requires a large number of regular expressions to parse the events, which isn’t ideal.

Revolutionizing Data Strategy: Achieving 99.94% Cost Savings and Accelerated Performance with Cribl Search

Imagine sending logs to cost-effective storage, converting them into efficient metrics, and forwarding only essential data for analysis. This change can slash ingest and long-term storage expenses by an order of magnitude! Enter Cribl Search—an ingenious solution that skillfully navigates storage, transforms logs into actionable metrics, and seamlessly channels vital data to your analysis systems. The result? Over 99.94% reduction in volume, enhanced efficiency and substantial cost savings.

(Crowd)Strike While the Data Is Hot: Getting Started with CrowdStream, Powered by Cribl

In today’s landscape, what’s considered security data has expanded to encompass more diverse data types like network data, behavioral analytics, and application metrics. These sources are now essential for a comprehensive security strategy, and visibility into all that data makes proactive threat detection possible. That said, organizations often struggle to process data from various vendors and merge telemetry sets to gain a complete view of their environments.

Future-Proof Your Observability Strategy With CrowdStrike and Cribl

Traditional logging tools are struggling to keep up with the explosive pace of data growth. Data collection isn’t the most straightforward process — so deploying and configuring all the tools necessary to manage this growth is more difficult than ever, and navigating evolving logging and monitoring requirements only adds another layer of complexity to the situation.

How to Build a ROI Plan for Cribl Stream

Getting your organization to invest in a new tool requires telling a story that helps decision-makers understand its benefits. In a recent webinar, our experts discussed how to define an ROI for Cribl Stream. They also shared a sample proposal you can use to craft the story you’ll tell to leadership, and gave some tips and tricks for justifying the purchase of these key tools for your business. Engineers and architects understand core technical problems better than anyone.

Query 3rd Party API Datasets in Real Time with Cribl Search

In today’s world of relentless data growth, security-relevant logs represent a small snapshot of an organization’s overall environment. Teams are beset with a variety of data types, including performance metrics and traces, asset configuration and state, audit logs, and much more. On top of that, teams are expected to scan all of this to compare against industry best practices and join this data with logs and metrics for added context.