Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

A New Approach to the Service Model in the Data Industry

In this livestream, I had a great discussion with Paul Stout and Scott Gray from nth degree about how the service model has evolved from a focus on time and materials to outcome-based services. Watch the full conversation here and leave with a roadmap for improving your next service engagement. Security teams often have a love-hate relationship with onboarding new tools.

Better, Faster, Stronger Network Monitoring: Cribl and Model Driven Telemetry

New in Cribl 4.5, the Model Driven Telemetry Source enables you to collect, transform, and route Model Driven Telemetry (MDT) data. In this blog, you’ll learn how to explore the YANG Suite to understand the wide variety of datasets available to transmit as well as how to configure the tools to get data flowing from Cisco IOS XE network devices to Cribl Stream.

The UK Telecommunication Security Act (TSA): When Life Gives You Lemons, Make Lemonade

On October 1, 2022, the UK Telecommunications Security Act (TSA) went into effect, imposing new security requirements for public telecom companies. The purpose of the act is noble, as it wants to ensure the reliability and resilience of the UK telecommunications network that underpins virtually every aspect of the economy and modern society.

Cribl Search Now Supports Email Alerts For Your Critical Notifications!

Cribl Search helps find and access data regardless of the format it’s in or where it lives. Search provides a federated solution that reaches into existing object stores and explores data without moving it or having to index it first. This same interface can also connect to APIs, databases, or existing tooling, and can even join results from all these disparate datasets and display them in comprehensive dashboards.

The Data Lake Dilemma: Why Businesses Need a New Approach

In today’s data-driven landscape, every organization knows the immense value their data holds, but with the explosion of data from diverse sources, traditional data storage and management solutions are proving inadequate. Organizations are urgently seeking new ways to handle their data effectively.

Welcoming Henry the Honey Badger: The New Face of Cribl

At Cribl, we’ve always prided ourselves on solving complex data challenges for our customers, but doing so with a bold spirit and a can-do attitude. Our journey with Ian the Goat as our mascot has been nothing short of incredible. Ian represented our agile and adaptable approach to solving complex data challenges. However, as we pivot towards tackling even bigger data puzzles for our customers, we believe it’s time for our mascot to reflect this evolution.

One Reason Why Your Nodes' Memory Usage Is Running High

When you’re using Cribl Stream and Cribl Edge to send data to hundreds of Splunk indexers using Load Balancing-enabed Destinations, it is sometimes necessary to analyze memory usage. In this blog post, we delve into buffer management, memory usage calculations, and mitigation strategies to help you optimize your configuration and avoid memory issues.

Data Chaos MUST Be Curbed, but How?

My introduction to the world of data science was writing anomaly detection for a SIEM that catered to banks and credit unions. Some of these places were running on 50-year-old IBM core banking servers — meaning that someone trying to turn off a light in a server room could take down an entire bank with a literal flip of the wrong switch. While some companies take their time updating infrastructure, others still embody the move-fast-and-break-things philosophy of the early dot-com era giants.

The Ultimate CPU Alert - Reloaded, Again!

It’s been nearly ten years since “The Ultimate CPU Alert – Reloaded” and its Linux version were shared with the SolarWinds community. At that time, managing CPU data from 11,000 nodes, with updates every five minutes to a central MSSQL database, was a significant challenge. The goal was to develop alerting logic to identify when a server was experiencing high CPU usage accurately.

Mastering Log Retention Policy: A Guide to Securing Your Data

The strategic implementation of a security log retention policy is critical for safeguarding digital assets and key company data. This practice is foundational for detecting and analyzing security threats in real-time and conducting thorough post-event investigations. Integrating the nuances of log analytics system costs, which escalate with data volume due to the infrastructure needed for storage and processing, highlights a critical aspect of security log retention.