Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Eliminate Data Transfer Fees from Your AWS Log Costs

As businesses generate, capture, and seek to analyze more data than ever before, they often find themselves limited by high data storage costs, expensive data processing fees, and high management overhead. For organizations who wish to expand their log analytics programs and become more data-driven, maximizing cost efficiency has become a critical operational objective.

The State of Security Data Management in 2022

Today, Cribl is releasing The State of Security Data Management 2022 in collaboration with CITE Research. The report examines the challenges that enterprises are facing as they work to balance evolving business priorities with cyber threats. The report was conducted in September 2022 and surveyed 1,000 senior-level IT and security decision-makers. The survey found that, although most organizations are confident in their data management strategy, few believe it’s actually sustainable.

Open source documentation will improve collaboration

There’s always a thrill to see something that you’ve dreamed of coming to life. And for us, open source docs is the realization of that dream. In simple terms, open source docs mean that the documentation is freely available for anyone to modify. This is a part of the modern documentation movement, being able to make changes to keep pace with modern development cycles.

7 log management challenges and solutions

Arthur Conan Doyle's Sherlock Holmes famously said, "You see, but you do not observe." Collecting application logs exhaustively and interpreting them to support business objectives are two different things. Application logs, also called app logs, event logs, and audit trails, are automatically generated records of computational events in IT environments.

Forward logs from the OpenTelemetry Collector with the Datadog Exporter

OpenTelemetry is an open source set of tools and standards that provide visibility into cloud-native applications. OpenTelemetry allows you to collect metrics, traces, and logs from applications written in many languages and export them to a backend of your choice.

Datadog alternatives for cloud security and application monitoring

If you work in IT or DevOps, unless you’ve been living on a remote island without Internet access, you’ve likely heard of Datadog, a popular platform for monitoring cloud applications. Datadog collects and interprets data from various IT resources. The resulting insights assist in managing performance and reliability challenges to deliver a better end-user experience.

Observability Pipelines: Helping Your Data Do More

With an exploding volume of data and systems comes the need for observability, or the ability to understand the internal states of a system from knowledge of its external outputs. As a result, observability data's importance is at an all-time high. Businesses spanning every industry use it in various ways to respond to issues, increase agility, mitigate risk, and ultimately provide better experiences for their users. It’s an incredibly valuable commodity.

Logging From Mobile Devices Using Cribl.Cloud

Mobile devices have changed our world. They come with us everywhere and provide invaluable services. One nagging problem is how to get data out of your mobile device. Specifically, logging metrics and events can be a trial. Opening up a public-facing port, managing the log receivers, coding… Wouldn’t it be nice if this was simplified? This article will demonstrate how easy delivering logs can be using Cribl.Cloud and simple HTTP POSTs – for free.

How to Keep Your System Visible in the Age of Remote Working

Monitoring IT infrastructure and services has always been an essential IT prerequisite. However, your IT monitoring system and security measures need to upgrade with an exponential increase in the number of remote users post-pandemic. For instance, consider this: At the end of a work day, you are notified that one of your critical services has gone down. But the problem is that five teams support different processes of that service.

Introducing Software Delivery Shield for end-to-end software supply chain security

Organizations and their software delivery pipelines are continually exposed to growing cyberattack vectors. Coupled with the massive adoption of open source software, which now helps power nearly all of our public infrastructure and is highly prevalent in most proprietary software, businesses around the world are more vulnerable than ever. Today’s organizations need to be more vigilant in protecting their software development infrastructure and processes.