Cribl LogStream unlocks the value of machine data by giving you freedom to make choices that best serve your business without the negative trade-offs. As your goals evolve, you have the freedom to change your mind and choose your new adventure, whether it’s a new tool, a new destination, or a brand new start. Watch this video for a brief introduction to LogStream functionality.
Route data to the best tool for the job – or all the tools for the job – by translating and formatting data into any tooling schema you require. Let different departments choose different analytics environments without having to deploy new agents or forwarders.
As much as 50% of log and metric data goes unused – null fields, duplicate data, and fields that offer zero analytical value. With LogStream, you can trim wasted data streams and analyze only what you need.
LogStream is the best way to get multiple data formats into the tools you trust for your Security and IT efforts. Use the LogStream universal receiver to collect from any machine data source – and even to schedule batch collection from REST APIs, Kinesis Firehose, Raw HTTP, and Microsoft Office 365 APIs. In addition, recall data from low-cost storage to replay logs to analytics tools for later investigations with ad-hoc data collection.
Process your machine data before you pay to analyze it. Translate and transform, enrich, parse, and structure log data to focus on signal and not noise. Enrich logs with third-party data such as geo-IP or known threat databases. Secure log data with encryption, masking, and role-based access controls