Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

12 Ways We Sleighed Innovation This Year

As we wrap up an incredible year, it’s the perfect time to celebrate Cribl’s progress and innovation in 2024! This year brought many exciting features designed to solve real-world problems and make life easier for our customers. In the spirit of reflection and festivity, I’ll highlight twelve game-changing product features, releases, and enhancements— each a testament to listening, learning, and delivering value to you, our users.

Balancing Standardization & Customization: Tailoring Security Monitoring to Your Unique Environment

So you’ve gone ahead and ingested every log you can think of and built a plethora of detections in line with frameworks and best practices. You may have even dabbled into custom alerts built from your own internal assessments and findings. Or maybe it’s the opposite; you’re still early in your journey toward security maturity or logging new or custom applications without much guidance. It can be hard to feel truly comfortable with your environment’s security in both situations. Standards are good but can be too noisy and restrictive in some places and too quiet or permissive in others.

Introduction to the OpenTelemetry Sum Connector

When you have a piece of data tucked into your logs or span tags, how do you dig for that bounty of insight today? Commonly this sort of data will be numeric, like a purchase total or number of units. Wouldn’t it be nice to easily turn that data into a metric timeseries? The Sum Connector in OpenTelemetry does just that, allowing you to create sums from attributes attached to logs, spans, span events, and even data points!

What Is Cloud Infrastructure?

We all know that testing new ideas on physical IT infrastructure requires a massive upfront cost. That's why businesses adopt cloud infrastructure setups. These setups offer on-demand resources, which allow you to start new projects and pay for only what you use. This eliminates the need for expensive hardware and maintenance, enabling flexibility that organizations require.

Unlocking the Power of IIS Logs: A Comprehensive Guide

IIS (Internet Information Services) is a web server developed by Microsft, shipped as a part of the Windows Server services. It’s used to host and manage web applications and services. IIS is a particularly robust web server solution that is tightly integrated with the Windows operating system, making it a natural choice for organizations that rely on other Microsoft products.

Our team's learnings from Kubecon: Use Exemplars, Configuring OTel, and OTTL cookbook

A few weeks ago, members of Mezmo were at Kubecon and attended several sessions. You can see a post with my recap and session highlights. Today, though, I’m going to discuss three sessions that my colleagues found interesting for our peers in Observability.

Make NetFlow Flow Without Breaking The Network

Ever wondered how many NetFlow exporters or edge routers you have configured on your core switches? What if I told you that every exporter uses ~0.2% bandwidth in overhead? While that may not seem like much (and it has been a few years since most network engineers were worried about CPU overhead for NetFlow exports), older hardware and network OS versions may be more sensitive to having multiple flow exporters configured.

Scaling Observability on a Budget with Cribl for State, Local, and Education

Over the past year, I’ve noticed some interesting trends in my work with state and local governments. Across my conversations with organizations in this space, there’s a common thread: teams are getting creative about maximizing their limited resources. With budgets either flat or shrinking and operational demands increasing, these teams face tough choices. They’re being asked to maintain or improve services while working with the same, or in some cases, fewer resources than before.

Indicators of Compromise (IoCs): An Introductory Guide

To confirm cyberattack occurrences and build or enhance cyber-defense strategies, threat intelligence teams use a lot of information, including Indicators of Compromise (IoCs). These IoCs are actually forensic data that are critical in: The relevance of IoCs cannot be downplayed, but they're not all that’s needed in building an effective cybersecurity strategy. In this article, we’ll explore indicators of compromise, their types, and their relevance to threat intelligence teams.