Operations | Monitoring | ITSM | DevOps | Cloud

Certificate revocation is broken but we pretend it works

Last week, someone commented on my post about 47-day certificates: This perfectly captures our collective delusion that SSL certificate revocation works. You click a button, the certificate stops working. And why wouldn’t we believe that? Every CA has a big “Revoke Certificate” button right there in the dashboard. It must do something, right? Here’s the dirty truth: most revoked certificates keep working.

SIEM Migration in 68 Days

In this session, we will discuss how the University of Pittsburgh was able to modernize their data processing strategy, migrate to a new SIEM solution, and avoid ballooning SIEM costs all within 68 days from the first install of a Cribl product. We will showcase how we were able to use Cribl's software to easily handle the following scenarios: 100% agent replacement and consolidation using Cribl Stream Workers and Edge.

The Modern SOC: Transforming security operations with Al and automation

Security teams are dealing with massive data growth, siloed tools, and constant alert fatigue. All of this makes it harder to detect and respond to threats. AI has become a key part of the solution, but its effectiveness depends on having access to complete, high-quality data. In this session, Palo Alto Networks and Deloitte will explore how AI and automation are redefining the modern Security Operations Center (SOC). Learn how leading organizations are leveraging intelligent workflows, automated threat detection, and machine learning to accelerate response times, reduce analyst fatigue, and strengthen overall security posture.

What the RFC?! Making sense of syslog before you migrate

Syslog: it's everywhere, it’s ancient, and let’s be honest — it rarely shows up the way the RFC says it should. Before you cut over to Cribl Stream, it pays to understand exactly what you're dealing with and why it matters. In this talk, we’ll demystify the syslog format (yes, the actual RFC 3164 and 5424 stuff), look at what happens when data goes rogue, and explore how Cribl can help bring order to the chaos.

Introducing Network Destinations: ICMP Monitoring for Any IP

For those who don't know Obkio, we're a synthetic Network Performance Monitoring, Troubleshooting and Diagnostics platform. We help network teams identify, diagnose, and resolve performance issues across distributed networks, from remote offices to cloud applications. For years, we've focused on what we do best: agent-to-agent performance monitoring.

VoIP Jitter Survival Guide: How to Diagnose, Monitor & Troubleshoot

VoIP jitter is the variation in packet arrival time during voice calls, measured in milliseconds. When voice packets travel across your network at inconsistent intervals; some arriving faster, others slower—you experience jitter. Acceptable jitter for VoIP is 30 milliseconds or less. Above this threshold, you'll notice choppy audio, robotic voices, delays, and call drops that disrupt business communication.

Improve Observability in Your CI/CD Pipeline

The backbone of modern software development is automation and at the heart of that lies the CI/CD pipeline. It’s what turns code into deployable software, delivering changes to users faster, safer, and more predictably. In simple terms, a CI/CD pipeline automates everything from the moment developers push code to when it reaches production. It integrates, tests, builds, and deploys software continuously ensuring faster releases with fewer human errors.