Cribl puts your IT and Security data at the center of your data management strategy and provides a one-stop shop for analyzing, collecting, processing, and routing it all at any scale. Try the Cribl suite of products and start building your data engine today!
Learn more ›Evolving demands placed on IT and Security teams are driving a new architecture for how observability data is captured, curated, and queried. This new architecture provides flexibility and control while managing the costs of increasing data volumes.
Read white paper ›Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Learn more ›Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Learn more ›Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
Learn more ›Cribl Lake is a turnkey data lake solution that takes just minutes to get up and running — no data expertise needed. Leverage open formats, unified security with rich access controls, and central access to all IT and security data.
Learn more ›The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Learn more ›Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
Read Solution Brief ›Cribl Copilot gets your deployments up and running in minutes, not weeks or months.
Learn more ›AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Learn more ›Explore Cribl’s Solutions by Use Cases:
Explore Cribl’s Solutions by Integrations:
Explore Cribl’s Solutions by Industry:
September 25 | 10am PT / 1pm ET
Hold my beer: lessons from one team’s data pipeline journey
Register ›Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Get inspired by how our customers are innovating IT, security and observability. They inspire us daily!
Read Customer Stories ›Sally Beauty Holdings
Sally Beauty Swaps LogStash and Syslog-ng with Cribl.Cloud for a Resilient Security and Observability Pipeline
Read Case Study ›Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Transform data management with Cribl, the Data Engine for IT and Security
Learn More ›Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Get the Guide ›Stay up to date on all things Cribl and observability.
Visit the Newsroom ›Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Meet our Leaders ›Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Learn More ›Whether you’re just getting started or scaling up, the Cribl for Startups program gives you the tools and resources your company needs to be successful at every stage.
Learn More ›Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
Talk to an Expert ›In a past life, at our regularly scheduled IT team meeting, one of my engineers mentioned he had detected some cleartext Social Security Numbers (SSNs) in one of our logs. You’d have thought I brought a bowl of Gaegogi soup to a PETA conference. All I wanted to do was obscure some Social Security numbers in my logs!
The security guys started screaming about HIPPA, GDPR, PCI, and the Privacy act of 1974. 1974! We didn’t even have computers then. I know; I was there. Then our security consultant started talking about the need to be compliant with the NIST publication. Blah, blah, blah. Finally, a member of the NOC team mentioned they needed most of the data but couldn’t care less about the SSNs. I was just about to say delete it all, but before I got the words out, the legal team rep – you know he just came for the free lunch – stated we needed to retain the complete data set for compliance purposes. Urgh, we were quickly going off the rails, but thank God, at that very moment, the food arrived, and everyone became more focused on getting the right dipping sauce.
This gave me time to do a quick Google search and easily found lots of information on Personally identifiable information (PII) and what was required to protect it. Another stroke of luck, after lunch, we were getting a briefing on the value of 5G, Wi-Fi 6, or Wi-Fi 7. So, while they were learning about the latest wireless technology of tomorrow, I could dig into the issue and figure out how to address everyone’s needs and concerns about protecting PII.
I figured a search on the topic of log security would be a good starting point. Bad idea! It resulted in ~3,060,000,000 results (0.64 seconds). A quick scan down the page, and I saw the word observability several times by different vendors. There were so many results to choose from, and I started to think there should be an “unobservability.” That might provide some actual direction. So it wasn’t a clean fit, but it did finally get me to pages that appeared to try and help me, but only if I had an advanced EE degree from MIT. The pages started with headings like data masking, obfuscation, and anonymization.
So far, so good, but midway through the second paragraph, I thought I was reading a foreign language. They called it Regex (i.e. {\.(?\w+-\w+\d+)-`)
, but I knew it was really Klingon ( `tlhIngan Hol Dajatlhʼaʼ?`). I didn’t understand it and knew no one on my team was fluent with it either. But I kept reading anyway. Soon I started to understand a little and eventually came across something called Match Regex and Replace Expression as it applied to masking data. This made sense, but I still needed to implement this without calling HR about a new headcount to configure all of this.
Luckily (again), I came across a Cribl blog showing how to learn SSN masking in less than 10 minutes and for FREE. It sounded too good to be true, but I grabbed a new cup of coffee and settled in to watch anyway.
Wow, the video not only actually made sense, but it appeared to be something we could do internally, with the existing team, and at no additional cost. There was even a link to a deeper dive training for those implementing it. With Stream, you can mask data using various techniques by applying the Masking Function on any event that matches any arbitrary condition.
Well, I think I have the SSN crisis of 2021 resolved. Next, I need to find a way to reduce the volume of logs I am storing. Maybe Stream can help here too? That’s a story for another day, though.
The fastest way to get started with Cribl Stream is to sign-up at Cribl.Cloud. You can process up to 1 TB of throughput per day at no cost. Sign-up and start using Stream within a few minutes.
Experience a full version of Cribl Stream and Cribl Edge in the cloud with pre-made sources and destinations.
Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari
Got one of those handy?