Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Event Logs Explained: Your Guide to System Health

Event logs contain critical information and the analysis of these logs will support organizations in the detection of many security incidents, from auditing user access to observing malicious traffic and even isolating monitor rule changes on a firewall. By collecting event logs systematically and analyzing them, organizations can obtain insights into their IT environment for maintaining operational efficiency and security.

Cribl Lake Wins CRN 2024 Tech Innovators Award for Data and Information Management

The greatest innovations are often the simplest. They address fundamental needs and make life easier in the most direct way. Cribl Lake was just announced as the winner of CRN’s 2024 Tech Innovators Award for Data Information Management. We are so happy and honored by this recognition, which solidifies our belief that the best innovations are indeed the simplest.

Shh, It's a Secret: Keeping Them Safe in Cribl's Software

Remember when you used to jot down passwords on sticky notes? Well, those days are long gone. In today’s world of data pipelines, secrets, similar to API keys, are like digital VIP passes. They open doors to critical systems and keep sensitive info on lockdown. At Cribl, we’re all about top-notch data security, and that means guarding your secrets like treasure. Let’s dive into our game plan for keeping secrets safe throughout the entire software development lifecycle (SDLC).

Cribl Search Provides an Audit Capability to Assess Your Snowflake Account

Only last month, Cribl added Snowflake to its growing list of accessible data stores it can search. Using Cribl Search, admins can now leverage Cribl’s search-in-place capability to query data located in Snowflake’s data warehouse. Boy, did we have the timing right? Today, Snowflake customers and other incident response teams are still determining the nexus of the incident.

How to integrate Okta logs with Grafana Loki for enhanced SIEM capabilities

Identity providers (IdPs) such as Okta play a crucial role in enterprise environments by providing seamless authentication and authorization experiences for users accessing organizational resources. These interactions generate a massive volume of event logs, containing valuable information like user details, geographical locations, IP addresses, and more. These logs are essential for security teams, especially in operations, because they’re used to detect and respond to incidents effectively.

Managing Observability Pipeline Chaos

The cloud environment has generated an unprecedented volume of data, making it increasingly difficult for enterprises to manage. With multiple SaaS and cloud-based applications in play, differentiating which data needs processing for analysis versus storage for regulatory compliance is a significant challenge. The growing number of data sources only complicates this further. So, getting clarity and control over this chaos is the goal, without having to overhaul your entire system.

How to Monitor JVM with OpenTelemetry

The Java Virtual Machine (JVM) is an important part of the Java programming language, allowing applications to run on any device with the JVM, regardless of the hardware and operating system. It interprets Java bytecode and manages memory, garbage collection, and performance optimization to ensure smooth execution and scalability. Effective JVM monitoring is critical for performance and stability. This is where OpenTelemetry comes into play.

Introducing Squadcast's Audit Logs: Enhanced Visibility and Control

Maintaining comprehensive records of user and entity-related changes within your Incident Management platform is crucial. Organizations have long relied on external analytics tools for these insights. However, the demand for an integrated solution within Squadcast has been growing. We are excited to introduce Squadcast's Audit Logs feature, designed to address this need directly within our platform.

Data Is a Blizzard: Just Because Each Snowflake Is Unique Doesn't Mean Your Search Tools Have to Be Too

Cribl Search is agnostic, allowing administrators to now query Snowflake datasets as they can dozens of other Lakes, Stores, Systems & Platforms. The data that IT and security teams rely on to monitor network operations continues to grow at a 28% CAGR, and it’s stressing many organizations’ ability to analyze all this data effectively. In fact, in some cases, less than 2% of it ever gets looked at.