Cribl

San Francisco, CA, USA
2017
  |  By Josh Biggley
It’s been nearly ten years since “The Ultimate CPU Alert – Reloaded” and its Linux version were shared with the SolarWinds community. At that time, managing CPU data from 11,000 nodes, with updates every five minutes to a central MSSQL database, was a significant challenge. The goal was to develop alerting logic to identify when a server was experiencing high CPU usage accurately.
  |  By Bradley Chambers
The strategic implementation of a security log retention policy is critical for safeguarding digital assets and key company data. This practice is foundational for detecting and analyzing security threats in real-time and conducting thorough post-event investigations. Integrating the nuances of log analytics system costs, which escalate with data volume due to the infrastructure needed for storage and processing, highlights a critical aspect of security log retention.
  |  By Manish Bhaskar
IT and security teams have several products they use and in turn, have many admins. Some have wide privileges, while others have focused responsibilities for the various tools and touch points in an IT and security data path. Not all admins are members of all tools. But they are all typically part of a larger group bound by an email alias (aka a distribution list).
  |  By David Cavuto
An analyst’s process often involves searching through a given set of data many times, refining the question and analytics performed each time. Cribl Search was originally designed to be stateless – executing each search from the original dataset provider(s) with every execution. However, a new feature has been introduced to allow searching into previous cached results, accelerating the analyst process for certain types of iterative search development.
  |  By Perry Correll
Data is born at the edge, and the traditional approach is to collect it, then ingest it into one or more systems of analysis — or at least as much as you can afford to. And now the deep dive analysis begins. This might be the perfect solution for some datasets, but what about all the other data being collected on the edge? All the logs, metrics, and state information you seldom (if ever) retrieve?
  |  By Yasmin Hovakeemian
What might you accomplish if you could easily search your data lakes without paying to move the data first? The most likely outcome is that you address a critical security incident quicker than ever, save your organization millions of dollars, get a promotion, and then go down in history as the best-looking, most talented analyst to have searched a storage bucket.
  |  By Yasmin Hovakeemian
On a scale from walk-in-the-park → scaling Mount Everest, how easy is it for you to search your S3 buckets? Retrieving data to respond to security incidents, demonstrate compliance, or extract insights shouldn’t require jumping through hoops or overpaying for access.Cribl Search has native support for platforms like Amazon Security Lake, Amazon S3, Azure Blob, and Google Cloud Storage, enabling seamless data analysis right at its source.
  |  By Desi Gavis-Hughson
Organizations today face a growing list of obstacles as they try to improve their detection, coverage, and accuracy. For one, data proliferation is happening at an astronomical rate. When was the last time your network bandwidth went down? What about your license costs for data storage or your SIEM? Difficulties arise from overlapping and poorly integrated tools that generate disparate data streams and several operational efficiencies.
  |  By Jenna Eagle
Microsoft Defender offers everyone comprehensive threat prevention, detection, and response capabilities—from individuals looking to protect their families to the world’s largest enterprises. Microsoft Defender allows IT and Security teams to prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Have you ever wondered if you can use Cribl Stream to help manage your Microsoft Defender for Endpoint logs? The answer is Yes (plus benefits)!
  |  By Jon Rust
Cribl’s suite of products excel at collecting and organizing your IT and security event data. Did you know it can also help with IoT data collection and analysis? If you can get the text of the data into Cribl, in most cases, we can process it, transform it, and send it to where you want it to go. A few years ago, I bought a weather station. I immediately hooked up some home automation gear to show me the temperature, humidity, and air quality. But the geek in me wants more.
  |  By Cribl
Join us for an important conversation with Cribl's Ed Bailey and Jackie McGuire, as we navigate the intricate balance of maximizing organizational value with a constrained budget. In today's challenging economic climate, where maintaining operations often means minimal to no additional spending, adaptive strategies become crucial. This is more than just a best-case scenario; it's a necessary approach for business resilience. Ed and Jackie will share innovative ideas and strategies to help leaders skillfully manage tight budgets while delivering significant value to their organizations.
  |  By Cribl
Discover how Cribl's suite of products can be utilized to assess security and analytics tools, thereby reducing the duration of POVs and simplifying the process of tool migrations. Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Customers use Cribl's suite of products to collect, process, route, and analyze all IT and security data, delivering the flexibility, choice, and control required to adapt to their ever-changing needs.
  |  By Cribl
Please join Cribl’s Ed Bailey and Jackie McGuire for a dynamic discussion around IT and Security vendor consolidation in 2024. The current economic landscape poses challenges for companies to sustain operations without being profitable or having a clear path to profitability. As a response, businesses are either merging with similar companies or becoming part of larger entities through acquisitions. Change is afoot, so join the conversation as we dive into the ongoing transformations, discussing the implications for security and observability. Get ready for an engaging discussion.
  |  By Cribl
Join Cribl's Ed Bailey and Cjapi's James Curtis for an engaging discussion about James' new book, 'Cribl Stream Fundamentals.' We will explore why James wrote the book and what he plans next. Additionally, we'll discuss his perspective on the challenges practitioners will face in 2024 and how teams should prepare for the year ahead.
  |  By Cribl
The nth degree team joins Cribl's Ed Bailey and Andrew Duca to discuss nth degree's innovative fractional service delivery model. This is a discussion anyone who has had to engage professional services should be interested in hearing. nth degree has developed a service delivery model that enables fast engagement and removes friction around service delivery and planning. Imagine not having to get an SOW reviewed by legal for every engagement. That alone solves a big problem for almost everyone.
  |  By Cribl
Cribl’s usual suspects, Ed Bailey and Jackie McGuire, are joined by Sr Partner Marketing Manager Michelle Zhang to discuss our experiences at AWS re:Invent this past November. It was a great event, and we want to share the top themes and presentations we saw at the show. Michelle will share her experience building and strengthening Cribl’s strategic alliance network and some of the "better together" progress made over the past year for customers.
  |  By Cribl
In this video, we’ll look at how to set up AWS ElastiCache to work with Cribl.Cloud. Enriching data through Cribl Stream instead of in your SIEM can lower costs and improve your security posture.
  |  By Cribl
Join Cribl’s Jackie McGuire and Ed Bailey as they discuss AI's current and future state. They will discuss the many challenges and vast promise of this promising way to increase productivity and solve problems. In addition, Jackie and Ed will also comment on SolarWinds’ response to the SEC charges alleging Solarwinds and its CISO defrauded investors by repeatedly misleading them about its cybersecurity posture. Please join us for a great conversation.
  |  By Cribl
This video demonstrates how to create “inputs” to Cribl Search dashboards. An Input is a control widget that we can add to our Dashboards to control how they execute. They allow the user to supply a range of inputs to customize one or many of the Searches in each of the panels on a given dashboard.
  |  By Cribl
Join Ed Bailey and TAQA Group's Andrew Ochse as they discuss the diverse services that TAQA offers, look at the challenges with scaling and staffing, and explore in great detail the solutions to classic problems such as insufficient funding, poor data quality, and slow connections linking global sites to their Security Operations Center (SOC).
  |  By Cribl
How do you get the data out of your infrastructure and applications in order to properly observe, monitor, and secure their running states while minimizing overlap, wasted resources, and cost? Many business folks need a broad category of tools in all their environments to solve challenges such as up and down monitoring, metrics, a time series database (TSDB), log analytics, event streaming, security information and event management (SIEM), user behavior analytics (UBA), and data lakes. The answer to the proposed question to solve these hurdles is using an observability pipeline.
  |  By Cribl
Observability allows you to understand the behavior of applications and infrastructure from the data they produce.
  |  By Cribl
Using Splunk for long-term storage can drive up costs and slow down searches, especially as data volumes increase and teams expand their use cases.
  |  By Cribl
The observability market is changing quickly. Rushing into a monolithic observability product limits your future options by locking you in to a single vendor.
  |  By Cribl
Traditional security tools struggle to adapt to the new world of cyber threats. To keep up with the growing number of daily threats, understaffed security teams need new cloud-delivered solutions and tactics focused on generating attack resolutions, consistently and repeatedly. Enter Exabeam. Exabeam powers security teams with analytics-driven insights to uncover, investigate, and resolve threats legacy tools may miss.

Route observability data where it has the most value. Slash costs, improve performance, and get the right data to the right destinations, in the right formats, at the right time.

Cribl is a company built to solve customer challenges and enable customer choice. Its solutions deliver innovative and customizable controls to route security and machine data where it has the most value. We call this an observability pipeline, and it helps slash costs, improve performance, and get the right data, to the right destinations, in the right formats, at the right time.

LogStream Gives You The Simplicity, Flexibility, and Control...

  • To Route Your Data: Send data to the most effective destinations including low-cost storage locations like S3 for long-term retention. Route data to the best tool for the job – or all the tools for the job – by translating and formatting data into any tooling schema you require. Let different departments choose different analytics environments without having to deploy new agents or forwarders.
  • To Reduce Your Data: Reduce as much as 50% of ingested log volume to control costs and improve system performance. Eliminate duplicate fields, null values, and any elements that provide little analytical value. Filter and screen events for dynamic sampling, or aggregate log data into metrics for massive volume reduction. Do all of this without worry: You can keep a full-fidelity copy in a low-cost destination and replay it back if needed.
  • To Collect More Data: LogStream is the best way to get multiple data formats into your analytics tools. Use the LogStream universal receiver to collect from any observability data source – and even to schedule batch collection from multiple APIs. In addition, recall data from low-cost storage to replay logs to analytics tools for later investigations with ad-hoc data collection.
  • To Shape Your Data: Shape all of the data you need to drive decisions about your environment. Translate and transform data from all of your sources to the tools you choose. Get a more complete picture of your data by enriching logs with third-party data. LogStream collects data from all of your sources and shapes it into actionable logs and metrics for analysis.

Cribl’s mission is to unlock the value of all your observability data, regardless of source or destination.

Download LogStream for free to get started!