Cribl Blog Articles
The Cribl blog covers Observability Pipelines, Big Data Analytics, Data Streams Processing, News about Cribl's Products, and Much More!
-
Cribl Pack Dispensary Update: Simplify Sharing with Permalinks
Exciting News! The Pack Dispensary just got an upgrade with the release of permalinks for Packs. This may sound simple, but it significantly alleviates a major pain point Cribl Dispensary users faced when sharing Pack references with colleagues. Life before Permalinks Previously, sharing Pack references with teammates was a cumbersome process. You would need to […]
-
Cribl Copilot Leverages Our Docs to Get You Answers Faster Than Ever Before!
Cribl employees are renowned for their insatiable curiosity, especially when it comes to their passions. Having been a technical writer for most of my adult life, this goat is deeply passionate about two things: writing engaging content and understanding the mindset of our users. As one of our founders always says, “Software is a people […]
-
My First 90 Days as a Product Manager at Cribl
This is my first blog post since joining Cribl, and I’m excited to share some of my experiences during the first 90 days on the job as a Product Manager. Prior to product management, my career encompassed professional services, technical marketing, and engineering—all within the realm of enterprise data tools. Naturally, I was eager to […]
-
Big Data, Zero Hassle: Cribl Edge for Centralized Agent Management
Today’s IT and security environments have gone from “big” to “massive” in just a decade or two—endpoints have practically exploded (think hundreds of thousands of servers, not just a hundred). Add in a dizzying array of data types and vendors, and what do you get? A whole lot of chaos. So why, oh why, does […]
-
Threat Hunting with Cribl Search
Imagine you’re the protector of a castle. Your walls are tall, the gates are strong, and the guards are well-trained. But what if an intruder was still able to slip past your defenses? Even with the best security tools, not every threat will be caught. Threat hunting is the proactive approach to finding attackers that […]