AdobeStock_1043922483

Scaling Observability on a Budget with Cribl for State, Local, and Education

December 12, 2024
Written by
Derek Gleich's Image

Derek is an accomplished technology leader with over a decade of expertise in the Public ... Read MoreSector technology domain. His career began with Federal service at the U.S. House of Representatives, setting a solid foundation for his subsequent venture into the private sector. Derek's notable roles at leading companies such as Cisco, AppDynamics (a Cisco company), and Cribl, underscore his extensive experience and success both within both public sector and commercial markets. Presently at Cribl, Derek leads the Public Sector Solutions Engineering team, dedicated to serving state, local, and educational institutions, as well as the U.S. Federal government, across the United States. His leadership and experience in both government and private industry has been critical to navigating and understanding the unique technological needs and challenges of IT and Security professionals in the public sector space. Read Less

Categories: Learn

Over the past year, I’ve noticed some interesting trends in my work with state and local governments. Across my conversations with organizations in this space, there’s a common thread: teams are getting creative about maximizing their limited resources. With budgets either flat or shrinking and operational demands increasing, these teams face tough choices. They’re being asked to maintain or improve services while working with the same, or in some cases, fewer resources than before.

The Hard Reality

This budget trend forces teams to get creative and make tough decisions. Some organizations must choose between maintaining basic operational visibility and funding critical security tooling. Others are trying to make one tool serve multiple teams – not because it’s the best approach, but because it’s the only financially viable option. I’ve seen this play out in several ways in the field. One example is some teams using their firewall logs to do double duty for SOC detections and IT network troubleshooting. It makes sense, given both teams tend to need this data. But more and more, I’m seeing IT teams who can’t afford their own platform and wind up carving out space in the SOC’s SIEM for their priority use cases.

The Problems This Creates

These resource constraints and compromises are creating real challenges:

  • IT teams spend too much time hunting through security data just to solve basic problems
  • SIEM costs keep climbing as everyone adds more data and users
  • Security resources get stretched thin trying to support multiple teams
  • More users accessing security platforms increases the potential risk
  • IT teams often have to leave valuable troubleshooting use cases on the table because they simply don’t have the resources to implement them all
  • Critical visibility gaps emerge as teams are forced to choose which systems to monitor

How Cribl Can Help

There’s a smarter way to handle this – one that doesn’t involve compromising security or breaking the bank. Cribl’s platform helps solve these challenges by:

  • Making it easy to route and summarize firewall data where it needs to go
  • Storing IT’s data in cost-effective Cribl Lake instead of expensive SIEM storage
  • Using Cribl Search for pay-as-you-go analytics – only pay for what you actually search
  • Keeping your SIEM focused on security while giving IT the access they need

Here’s How It Works

Let’s start with our log source, which, in this case, is a Fortigate Firewall log. As you can see, there is a wealth of information here that IT simply doesn’t care about or need.

The first thing we’re going to do is make this log easier to work with by parsing out all those lovely key value pairs nested in our Syslog message. Parser makes easy work of this. Change  the Type to K=V Pairs and hit save.

We now have discrete fields we can easily reference in our functions to come (parser created the fields highlights in green):

Instead of tracking destination port separately from IP, let’s concatenate them based on our available fields. We’ll use an Eval Function along with a simple javascript template literal to get it done:

Next up, we will discuss the MVP of our pipeline, Aggregations! In my opinion, this Stream function is underused; it’s so amazing for many different use cases. Creating insightful metrics, rolling up metrics, and summarizing are great ways to reduce volume and increase performance. In this case, we’ll do a couple of aggregations over a 10-second tumbling window: count() and list().

This will give us a quick understanding of how many logs we’ve aggregated per new event, and the list will keep track of the new combined dst_ip_and_port field we created above. The other important setting here is our Group by fields. This tells our function what constitutes a unique aggregation across our source logs. We will aggregate based on action and the source IP in this case. This will allow us, for example, to chart and query based on denies from a particular user’s workstation or laptop.

And our resulting log!

One of the best parts of this approach was that we dropped 60% of our logs and shrunk the overall volume by 93%. Given Stream’s shared nothing architecture, the actual effective reduction is more likely somewhere around %65. Sprinkle in some compression when writing to Cribl Lake, and you gave IT a heap of visibility incredibly cheaply.

For reference, if this had been a 1TB a-day source, you’d be writing roughly 350GB uncompressed. And if we use a conservative 8:1 compression ratio (this can be much higher depending on the log source), that comes out to roughly $800 annually for storing this data source! How much would you guess that full fidelity logs at 1TB per day cost sitting in your SIEMs?

What This Means For You

While the walkthrough highlighted a dual-purpose use case (similar to Windows event logs), this, of course, can be used to cost-effectively onboard new sources required to monitor IT systems and apps. Now, putting everything we ran through all together, with this approach, you get:

  1. Complete visibility without the total price tag
  2. Security tools that can focus on security
  3. IT teams that can find what they need without getting lost in security data
  4.  A solution within a budget that makes sense for today’s reality

Want to see how this works in real life? We’d love to show you – no sales pitch, just practical solutions for the real world of public sector IT.

 


 

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Customers use Cribl’s suite of products to collect, process, route, and analyze all IT and security data, delivering the flexibility, choice, and control required to adapt to their ever-changing needs.

We offer free training, certifications, and a free tier across our products. Our community Slack features Cribl engineers, partners, and customers who can answer your questions as you get started and continue to build and evolve. We also offer a variety of hands-on Sandboxes for those interested in how companies globally leverage our products for their data challenges.

.
Blog
Feature Image

Cribl Stream: Up To 47x More Efficient vs OpenTelemetry Collector

Read More
.
Blog
Feature Image

12 Ways We Sleighed Innovation This Year

Read More
.
Blog
Feature Image

Make NetFlow Flow Without Breaking The Network

Read More
pattern

Try Your Own Cribl Sandbox

Experience a full version of Cribl Stream and Cribl Edge in the cloud with pre-made sources and destinations.

box

So you're rockin' Internet Explorer!

Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari

Got one of those handy?