Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Logging From Mobile Devices Using Cribl.Cloud

Mobile devices have changed our world. They come with us everywhere and provide invaluable services. One nagging problem is how to get data out of your mobile device. Specifically, logging metrics and events can be a trial. Opening up a public-facing port, managing the log receivers, coding… Wouldn’t it be nice if this was simplified? This article will demonstrate how easy delivering logs can be using Cribl.Cloud and simple HTTP POSTs – for free.

How to Keep Your System Visible in the Age of Remote Working

Monitoring IT infrastructure and services has always been an essential IT prerequisite. However, your IT monitoring system and security measures need to upgrade with an exponential increase in the number of remote users post-pandemic. For instance, consider this: At the end of a work day, you are notified that one of your critical services has gone down. But the problem is that five teams support different processes of that service.

Introducing Software Delivery Shield for end-to-end software supply chain security

Organizations and their software delivery pipelines are continually exposed to growing cyberattack vectors. Coupled with the massive adoption of open source software, which now helps power nearly all of our public infrastructure and is highly prevalent in most proprietary software, businesses around the world are more vulnerable than ever. Today’s organizations need to be more vigilant in protecting their software development infrastructure and processes.

How We Earn It: High Customer Satisfaction

One of the gratifying things about working at Cribl is receiving daily validation that we’re making customers’ lives easier, and solving their real problems. Every time someone tells us something like this, our hearts gladden, and a goat angel gets its wings: Numbers like those also translate into…numbers. When we surveyed customers in our most recent quarter, our CSAT (Customer SATisfaction) score was above 90%.

Tips and Tricks for the Small SOC: Part II

It’s Cybersecurity Awareness Month, and in that spirit, we’re offering a number of tips and tricks small security operations center (SOC) teams can use. I started my career working as part of a small SOC team, and working with other security experts here at Logz.io, we’re happy to offer these to small SOC teams who can often use all the help they can get! In the last post, we talked about managing security talent and building processes.

Effective Log Management and Analysis as an Enabler for Observability

Traditionally, when monitoring or troubleshooting active incidents, engineers access logs directly on the source system. However, modern IT environments are now too complex, and engineers can no longer manage and analyze logs effectively this way. With the adoption of microservices and the use of cloud-native infrastructure, it’s no longer feasible.

How to add a store locator to your ecommerce storefront with Elastic

One thing that adds value to a business’s ecommerce presence is the ability for customers to easily find physical stores with an interactive map. Store locators can be built quite rapidly — all you need to place them on a map is geographic location in latitude and longitude. In this post, I’ll outline the pieces needed to put together a proof-of-concept store locator that could later be added to an ecommerce website.

A Guide To Opentelemetry Collector

This article will give you a quick overview of some of the key attributes you should know in order to get started with leveraging the OpenTelemetry collector for your next telemetry project. As an integral component of any project that involves distributed tracking, the OpenTelemetry Collector plays an important role. Simply put, it is helpful to know that the collector itself is a data pipeline service that collects telemetry data.