Networkology Ltd

Cribl Stream Data Observability Pipeline

Cribl Stream is a vendor-agnostic observability pipeline with the ability to collect, reduce, enrich, normalise, and route data from any source to any destination within your infrastructure. Take control of your data, realise the business value of your data, and empower your organisation with make data-driven outcomes and services.

Features

  • Collects log, metrics and traces from any source
  • Near real-time event processing (minimal latency)
  • Enrich, Transform, Filter and Route data to multiple destinations
  • Event payload reduction and event filtering
  • Intelligent pipeline configuration through User Interface
  • Intuitive User Interface
  • Rapid data source and pipeline creation through Cribl Packs
  • Archive and store event data using low-cost storage
  • Replay archived data for historical investigations
  • Optimised for existing data platforms like Splunk and Elastic

Benefits

  • Simplify data onboarding and engineering effort
  • Reduce infrastructure costs such as storage, license and compute
  • Horizontal scalable architectural model for expanding environments
  • Replay archived data for retrospective investigations
  • Reduction of event volumes and payloads
  • Focused and targeted event management, transformation and routing

Pricing

£0.18 a gigabyte a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@networkology.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

1 9 3 3 6 7 9 6 7 0 2 3 4 8 7

Contact

Networkology Ltd David Owen
Telephone: 01249700084
Email: tenders@networkology.com

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
None
System requirements
  • Linux 64-bit kernel >= 3.10
  • Single Instance deployment - https://docs.cribl.io/stream/deploy-single-instance
  • Distributed deployment - https://docs.cribl.io/stream/deploy-distributed
  • Sizing and Scaling - https://docs.cribl.io/stream/scaling

User support

Email or online ticketing support
Email or online ticketing
Support response times
Standard Support - 4 hour initial response time - Mon-Fri 9am-8pm
Enterprise Support - 2 hour initial response time - 24 x 7 x 365
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Webchat is accessible through supported internet browsers, with accessibility features.
Web chat accessibility testing
Webchat tested with accessible fonts and colours
Onsite support
Yes, at extra cost
Support levels
We support P1-P4 incidents remotely or on site at a further cost (varies depending on the time required to resolve an issue.)

A technical account manager is supplied FOC to any business or organisation acquiring Networkology's software or services.

You have access to a cloud support engineer Mon-Fri 9am-5:30pm (not dedicated)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Cribl has multiple tiers of the Stream product: Free (on-prem), Free (Cloud), Standard, Enterprise or Cribl.Cloud.

Cribl provide all training free-of-charge, with multiple hands-on sandboxes and exploratory online course available through https://sandbox.cribl.io/
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Cribl Stream provides a data-pipeline for routing event data from sources to destinations. Data held within Stream is purely for configuration purposes, and can be extracted at contract-end time. Event data can be archived using Stream, this data is saved to a location chosen by the customer and therefore can be extracted and retained by the customer outside of the contract.
End-of-contract process
If a licence is terminated we can provide Professional Services at extra cost to help the Buyer to migrate to another data-pipeline service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Stream's available API functions are clearly documented in the API refenence guide (https://docs.cribl.io/api?v=3.4).

Cribl have published a tutorial to assist users and customers interface with the API (https://docs.cribl.io/stream/api-tutorials).
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Stream ingests data from within the buyer's infrastructure. Administrators of the Cribl Stream instance(s) can customise and configure the application to consume target data-sources, filter and transform the events, enrich and enhance via knowledge lookups, and forward to one or more destinations. The pipeline is configurable with inbuilt features and functionality. Configuration can be performed through Stream's user interface, API or through the underlying configuration files. Cribl uses Git to manage and maintain the underlying configurations and customisations for Stream, which can be synchronised and pushed as required.

Scaling

Independence of resources
Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Where the buyer is hosting the solution in their on-prem or cloud infrastructure the resources are within the buyers control. We can assist with Professional Services to analyse user demands on the service and provide recommendations to ensure the platform is configured and resources to support the user demands.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Cribl

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
The buyer can chose to implement Cribl Stream on their own infrastructure, or in a cloud provider of their choosing (including Cribl's own SaaS platform). Our Professional Services can provide advice and guidance on securing data-at-rest in these scenario. Cribl's own cloud service uses logical data separation, authenticated user accounts, industry standard hardening and accredited to SOC2. Data in transit is encrypted with industry standard SSL and data at rest is encrypted, complying government standards (e.g. HIPAA).
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Cribl Stream is a data observability pipeline solution. Its core functionality is to ingest from data sources and export data to target destinations in the format and protocol accepted by the target destination/service. Users or Administrators of Cribl Stream build pipelines which connect Sources to Destinations, allow the flow of data to traverse the platform and export in the desired format.
Data export formats
Other
Other data export formats
  • Splunk, Elastic, Confluent Cloud, Kafka, New Relic
  • Amazon Kinesis, S3 and Cloudwatch, SQS
  • Azure Blob, Monitor Log, Event Hub
  • Google Cloud Chronicle, Stoage and Pub/Sub
  • Syslog, SNMP, Filesystem, NFS
  • StatsD and StatsD Extended
  • DataDog, MinIO, Wavefront, SignalFX, Sumo Logic
  • InfluxDB, Grafana, Prometheus, Loki
  • Opentelemtary, Webhook, JSON and RAW (Replay)
  • ... and many more
Data import formats
  • CSV
  • Other
Other data import formats
  • Syslog
  • TCP JSON and TCP RAW
  • Splunk TCP/HEC
  • SNMP
  • HTTPS (Bulk and Raw)
  • Metrics
  • Prometheus
  • Amazon Kinesis Firehose
  • Elasticsearch (API)
  • ...and many more

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. The Buyer would take responsibility to ensure communication between the buyer's data sources and their chosen Stream platform is secure. The buyer would also take responsibility for securing data transmitted to a destination. Cribl's inter-component communications will be secured as per Cribl best practice. Cribl provide several guides to assist buyers with securing their communications.

https://docs.cribl.io/stream/securing-and-monitoring
https://docs.cribl.io/stream/securing-communications
https://docs.cribl.io/stream/securing-data
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Data protection between data-sources and Stream, and Stream to the buyer's destinations is their responsibility. Cribl provide several guides and options for security incoming data, outgoing data, and inter-component communications.

https://docs.cribl.io/stream/securing-and-monitoring
https://docs.cribl.io/stream/securing-communications
https://docs.cribl.io/stream/securing-data

Networkology's Professional Services team can support the buyer to ensure their data is secured in accordance with their data security standards.

Availability and resilience

Guaranteed availability
Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Availability of the infrastructure within the buyer's control is the responsibility. If the buy choses to use Cribl's own SaaS environment the availabilty is 99.5%.
Approach to resilience
Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Resilience of the buyer's own infrastructure (on-prem or Cloud) is the responsibility of the buyer or their cloud provider. If the buyer choses to use Cribl's SaaS platform the resilience is provided within the solution and ensures the platform is able to meet a 99.5% SLA. Information about Crib's SaaS resilience can be obtained on request.
Outage reporting
Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Outage reporting is the responsibility of the buyer or their cloud provider when hosted on their own infrastructure. If the buyer choses to use Cribl's SaaS platform, outages are reported via email.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Cribl Stream resides within the buyer's infrastructure; their chosen cloud service provider; or Cribl's SaaS platform. In all instances the Cribl Stream user authentication system allows the assignment of roles which require custom permissions. The buyer can define roles using a list of capabilities. internal authentication is enabled by default in Cribl Stream.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
26/03/2020
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
This offering enables Cribl Stream software to be deployed on a platform of the buyer's chosing - either inside their network as a private or hybrid cloud; within the infrastructure of their cloud service provider; or on Cribl's own SaaS platform.

The information security policies and processes will remain the responsibility of the buyer or their service provider when deployed outside of Cribl's SaaS platform. Networkology understand the requirements for security policies and processes, and are able to provide buyers with advice and guidance on appropriate security policies and process to follow. The would include reporting structures, policy management and enforcement, and overall policy review.

Details of Cribl's SaaS platform security policy and reporting structure is internal to their organisation, and may be available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Cribl Stream resides within the buyer's infrastructure; their chosen cloud provider or the Cribl Cloud SaaS platform, Configuration and change management is the responsibility of the buyer or their cloud service supplier when hosted outside the Cribl SaaS platform.

Cribl's SaaS platform maintains strict change control, with email notifactions released to cloud customers when changes are being implemented. Cribl will maintain the underlying platform and Stream application version, the configuration and customisation of the application is the responsibility of the buyer.
Vulnerability management type
Undisclosed
Vulnerability management approach
Cribl Stream resides within the buyer's infrastructure; their chosen cloud service provider; or Cribl's SaaS platform. Control of the vulnerability management process sits with the buy when Stream is implemented outsite the Cribl SaaS platform. Networkology have a robust process for threat management and assessment of vulnerabilities to Stream by evaluating all potential security vulnerabilities that are discovered internally or externally within two business days of discovery. We use the industry standard CVSSv2 to rate vulnerabilities. In the case of critical risk, high impact vulnerabilities, Cribl will make all reasonable effort to supply patches to their software.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Cribl Stream resides within the buyer's infrastructure; their chosen cloud provider; or within Cribl's SaaS platform. Protective monitoring is the responsibility of the buyer or their cloud service supplier when implemented outside of the Cribl SaaS platform.

Networkology has extensive experience in protective monitoring and able to provide advice and guidance for best practices to advise on potential compromises and response processes.
Incident management type
Supplier-defined controls
Incident management approach
Cribl Stream resides within the buyer's infrastructure; their chosen cloud service provider; or Cribl's SaaS platform. Incident management and associated processes for Stream implemented outside Crib's SaaS solution are the buyer's responsibility. Networkology can support the buyer in developing incident management processes if they do not exist within the buyer's organisation.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Networkology is a Carbon Negative company. Our contributions to the environment via Carbon Neutral Britain offset more than 100% of our impact to the environment. In addition to this Networkology is a virtual first company which results in significantly less impact to the environment than a standard office based company.

Networkology is accredited to ISO 14001, which provides us with a framework to protect the environment and respond to changing environmental conditions in balance with socio-economic needs.

Our G-Cloud service provisions allow us to continue to exceed our environmental goals through the use of distributed cloud-based technologies, which are much more environmentally friendly than traditional computing alternatives that rely heavily on on-premise infrastructure. Our service provisions also provide us with continuing real-world examples to help influence our supply chains and staff with regards to responsible stewardship of the environment.
Covid-19 recovery

Covid-19 recovery

As a company that has been operating virtually since April 2018 the pandemic had little impact to our service offerings and operations. We successfully managed to keep our staff safe and met all customer obligations and took our own experience of operating remotely to many of our customers that had not yet made the step to operating virtually, ensuring their services have continued to operate fully through positive collaboration. Networkology continues to follow all government advice and supplements this with professional guidance from a partner organisation, which has ensured all of our implemented measures keep both our staff and customers safe during the pandemic.

We have supported staff that have needed to recover from COVID-19 and that have needed to shield during the pandemic by offering flexible working arrangements and adapting working practices to meet their needs at the time. During the pandemic, Networkology has been actively recruiting staff from across the UK, particularly those impacted in some way by the pandemic. Our work with the Governments Kickstart team is an example of this, where we advertised multiple roles. We also ensured we developed our own supply chains so that we could navigate the impacts and shortages being experienced in some areas, whilst ensuring supply chain security was kept at the high standards we require and inline with our ISO 9001 accreditation.
Tackling economic inequality

Tackling economic inequality

Networkology is a Disability Confident and a Real Living Wage employer.

The Real Living Wage is based on the cost of living and is voluntarily paid by employers that believe we all need a wage that meets our everyday needs. Being a Real Living Wage employer means that we will always pay more than the National Wage and is the only wage rate based upon what people need to live.

The Disability Confident scheme supports employers to make the most of the talents disabled people can bring to your workplace. Being a Disability Confident employer means that we offer inclusive and accessible recruitment, we will offer an interview to disabled people and we will support our existing employees.

Both of these schemes allow us to engage and support those who face barriers to employment or are struggling with the cost of living.

Our G-Cloud service provisions allow us to maintain and grow our supply chains, which already consists of many small organisations (SMEs), which helps support economic growth and business creation. Our ISO9001 accredited processes ensure that our supply chain is fully collaborative and that we responsibly work with our suppliers to jointly deliver products and solutions.

Networkology are both ISO27001 and Cyber Essentials Plus certified which demonstrates our dedicated to identifying and managing Cyber security risks within our supply chain.
Equal opportunity

Equal opportunity

Networkology is an equal opportunities employer. We ensure that all workers are treated appropriately and fairly and that, all things being equal, no candidate is treated unfairly because of their age, gender, race, sexuality or any other protected characteristic. Networkology also operates a veteran recruitment programme, NetVets. We recognise and value the unique combination of skills and attributes that veterans and service leavers possess. Our strong focus on defence and the public sector, combined with our core values allows us to offer a working environment perfectly suited to those looking to leave the services and continue their career as civilians.

Networkology is a Disability Confident and a Real Living Wage employer.

The Real Living Wage is based on the cost of living and is voluntarily paid by employers that believe we all need a wage that meets our everyday needs. Being a Real Living Wage employer means that we will always pay more than the National Wage and is the only wage rate based upon what people need to live.

The Disability Confident scheme supports employers to make the most of the talents disabled people can bring to your workplace. Being a Disability Confident employer means that we offer inclusive and accessible recruitment, we will offer an interview to disabled people and we will support our existing employees.
Wellbeing

Wellbeing

Networkology promotes home working and employee independence over traditional office-based inflexible practices. Whilst this is great, we do acknowledge that this approach, combined with the continuing challenging global situation can have an impact on mental health, the impact of which varies from person to person. Sometimes we all need human interaction, if only to offload about our weekend or subjects that are nothing to do with work. This is why we introduced the Oasis. Quite simply, it’s a weekly virtual session where people can gather and chat freely, with no agenda, rules or expectations.

We also offer a number of social events run throughout the year to give staff and their families an opportunity to meet up and enjoy time away from work in a relaxed, friendly environment.

To further support our staff in their day to day activities we provide a managed Knowledge Base library where the collective Networkology Knowledge is shared and regularly built upon, meaning that any of our staff working on-site with a client has near-instant access to the combined knowledge and support of the organisation.

We also operate internal mentoring programmes to help coach and train junior members of the company in their roles, thus ensuring that all staff have clear career opportunities and are adequately supported in achieving their goals.

Pricing

Price
£0.18 a gigabyte a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Cribl Stream is available for free, with full functionality but limited to 1TB/day on-prem or cloud infrastructure; or 5TB/day through a Cribl.Cloud instance. An internet connection is required to send usage telemtary from non-Cribl Cloud instances.
Link to free trial
https://www.networkology.com/criblstreamfree/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@networkology.com. Tell them what format you need. It will help if you say what assistive technology you use.