On (Cribl) Guard!
Next stop, Cribl Stream!
Cribl Guard part Deux: Background Detection
Part Deux, Part deux. Background Detection in Cribl Guard is an AI-driven capability that scans data flowing through Pipelines and analyzes it in the background to uncover previously unknown sensitive data patterns. Instead of relying solely on predefined rules, Background Detection uses a family of purpose-built transformer models to proactively surface new findings (such as PII, secrets, or regulated data) so customers can review, ignore, or immediately mitigate them with additional Guard rules before they reach downstream Destinations. Let's go check it out!
Is what I would say if this was a cooking show and we had a fully prepped meal already in the oven. But since this is a software demo and we don't have a pre-cooked meal to show you, let's go through the steps to enable Background Detection in Cribl Guard so you can see how it works in action. Like any good story, we'll start at the beginning: making a Destination.
- Click
Productsat the top left - Under
StreamclickWorker Groups - Click into the
defaultWorker Group - Click
Data > Destinationsup top - Find and click on
Webhook(you can just start typingwebhookin the search bar to live filter the list) - Click
Add Destinationat the top right - Fill out
sbx_webhookfor the ID - Turn off
Load balancing(we don't do that here) - Fill out the URL with
http://webhook.cribl.io/genericsiem - Click
Save - Take a breather
- Click
Commit(orCommit and Deployif you don't have a separateCommitbutton) - On the resulting modal, click
Commit & Deploy
Now let's check out Guard and how to enable its new Background Detection feature.
- On the left menu, click
Guard - If you're not familiar with Guard, read the tabs here before continuing (if you want, I'm not your parent)
- Click
Get Started
So... Since Guard Background Detection is AI-driven, we do need to accept some supplemental terms in order to enable Copilot, which will allow us to enable Background Detection.
- Click the link to
Global Settings > AI Settingsat the top middle - Check the box to indicate you have read the terms and agree to them (you definitely read them by clicking the link in the text, right?)
- Click
Turn On Cribl Copilot - Click to enable
Background Detectionso we can get back to our regularly scheduled programming - Click
Guardin the left-hand menu - Click to enable Guard on the left-most column coincidentally labeled
Guard - Click
Enablein theBackground Detectiontile at the top of the list - Read the resulting pop-up and click
Enable
Et Voila! On Guard! Oui Oui! Et une quatrième chose française! You get the idea. Now, if we had real data flowing in a real environment, Cribl Guard would be analyzing it in the background and surfacing any new sensitive data patterns it finds for you to review, ignore, or mitigate with additional rules. But since this is a demo environment and we don't have real data flowing, you'll have to use your ✨🌈imagination🌈✨
Pack-to-Pack champions!
Ok, enough imagining. Let's get Pack to it (ehh?). You can now route data between Packs and globally defined objects instead of forcing everything to stay trapped inside a single Pack. Teams can send data from a Pack into global routes or point global sources and routes into specific Packs, enabling Pack‑to‑Pack, Pack‑to‑global, and global‑to‑Pack paths. Let's add two packs and try it ourselves.
- Click
Worker Groupson the left-hand menu - Click into the
defaultWorker Group - Up top, click
Processing > Packs - At the top right, click
Add Pack > Add from Dispensary - Find the
cribl-palo-alto-networksPack, click into it, and clickAdd Packat the top right - Repeat the previous step for the
cribl-cisco-merakiPack
Quick tip: All this global routing magic happens when Packs have internal Sources and Destinations configured. So let's set that up real quick to enable all this fancy routing logic introduced in 4.17.
- Click into the
cribl-cisco-merakiPack - Click
Sourcesup top - Click into the
Syslogtile and clickAdd Sourceat the top right - Fill out
blue_triceratopsfor the ID - Fill out
33239for the UDP Port - Click
Save - Click
Destinationsin the subnav up top - Select
Webhookfor the Destination Type - Click
Add Destinationat the top right - Fill out
black_mammothfor the ID - Turn off
Load balancing(we still don't do that here 👀) - Fill out the URL with
http://webhook.cribl.io/genericsiem - Click
Save - Up in the top breadcrumbs, click
Packsto get back to the list of Packs
I hope you played with a lot of Power Rangers toys as a kid, cause we're gonna be morphin routing data between these two Packs like they're part of the (Dino) Megazord!
- Click
Routing > Data Routesup top - Click
Add Routeat the top right - Fill out the Route information as follows:
- ID:
megazord - Filter:
sourcetype=="ranger" - Pipeline:
Pack cribl-palo-alto-networks - Destination:
Pack cribl-cisco-meraki
- ID:
- Click
Save
And that's how you route data Pack-to-Pack! You can also do Pack-to-global though... I guess we can be like Daft Punk (RIP) and configure stuff One More Time!
- Click back into
Processing > Packsup top - Click into the
cribl-cisco-merakiPack - Click
Add Routeat the top right - Fill out
morphin_timefor the ID - Fill out
sourcetype=="blue_ranger"for the Filter - Select
passthrufor the Pipeline - Select
Send to Worker Group Routesfor the Destination - Click
Save
Now let's make like Daft Punk again and be done forever, leaving our fans devastated and heartbroken but also with an amazing legacy of music data routing capabilities to remember us by.