On This Page

Home / Edge/ Set Up Cribl Edge/Connect On-Prem Leaders to Cribl.Cloud

Learn About Connected Environments

If you have one or more on-prem Cribl Edge environments and Cribl.Cloud Organization(s), you can configure Connected Environments.

Connected Environments enables you to:

  • Take advantage of Cribl.Cloud. You can use Connected Environments to connect an on-prem Leader to Cribl.Cloud, then use Cribl.Cloud infrastructure management capabilities, the credit-based billing model, as well as Cribl Lake and Cribl Search solutions. For example, you have on-prem environments but you want to use the credit billing model, and you want to send Cribl metric data to Cribl Lake/Search. From there, you can build dashboards to monitor Cribl throughput and performance.

  • Send data from an on-prem deployment to a Cribl.Cloud deployment. If you previously had an on-prem deployment of Cribl and you are moving forward with a Cloud-first or Cloud only solution, you can use connected environments to onboard your data from on-prem Edge Nodes to Cribl.Cloud Edge Nodes and transfer data without incurring double billing costs. See Send Data from On-Prem to Cribl.Cloud for implementation details.

For full access to Connected Environments, upgrade Cribl Edge to 4.8.2 or newer.

Accomplish this by creating a connection between the on-prem Leader and the Cribl.Cloud Leader. Then, use the Connections page in your Cribl.Cloud account to manage credit consumption for all of your on-prem environments from one Cribl.Cloud interface. This feature is called Universal Subscription.

This section provides instructions for connecting on-prem Leaders to Cribl.Cloud.

Understand Environment Compatibility

Sender → ReceiverOrg/Workspace scenarioCribl HTTP/TCP SupportReceiver Billed for Ingest?Example DeploymentsNotes
Same LeaderSame WorkspaceNo
  • On-prem Worker Group A → Worker Group B under the same on-prem Leader.
  • Cribl.Cloud hybrid Worker Group A → Cribl.Cloud managed Worker Group B in the same Workspace.
  • Cribl Edge Fleet → Cribl Stream Worker Group.
This is the default Cribl to Cribl pattern.
Different LeadersSame on-prem license keyNo
  • Two on-prem Stream deployments sharing a license key.
  • Edge Fleet under Leader 1 → Stream Worker Group under Leader 2, same key.
Treated as a single paid environment via shared key.
Different LeadersTwo Workspaces in the same Cribl.Cloud OrgNo
  • Cribl.Cloud-managed hybrid Worker Group in Workspace A → Cribl.Cloud-managed Worker Group in Workspace B.
  • Edge → Stream across Workspaces in the same Org.
Requires supported versions and shared Org - uses auth tokens on 4.15+.
Different LeadersDifferent Cribl.Cloud OrgsYesEnterprise customer Org A → MSSP Org B via Cribl HTTP/TCP.Supported, but the receiving Org is billed. No single-ingest across Orgs.
On-prem → Cribl.CloudNo Connected Environments or Universal Subscription. Same paid Org/license.NoOn-prem Cribl Stream or Edge → Cribl.Cloud-managed Worker Group for central processing (same license/org).Standard Edge → Stream or Stream → Stream “hub” architectures.
On-prem → Cribl.CloudDifferent paid Orgs, no Universal Subscription.YesHybrid Worker Group for Customer A → Managed Worker Group in MSP Org B.Counts as two separate paid environments.
Hybrid Worker Group → Cribl.Cloud Hybrid or Managed Worker GroupSame OrganizationYesCribl.Cloud Hybrid Worker Group in Workspace A → Cribl.Cloud-managed Worker Group in Workspace B.Typical “hybrid WG in Workspace A → Cloud WG in Workspace B” expansion path.
Hybrid Worker Group → Cribl.Cloud Hybrid or Managed Worker GroupDifferent OrganizationYesHybrid Worker Group for Customer A → Managed Worker Group in MSP Org B.Counts as two separate paid environments.
On-prem Cribl Edge or Stream → Cribl.Cloud Hybrid Worker GroupSame Org with Universal SubscriptionYesOn-prem Edge Fleet with Universal Subscription → Cribl.Cloud Hybrid Worker GroupNot supported for single-ingest billing. Treated as separate environments.
On-prem Cribl Edge or Stream → Cribl.Cloud-managed Worker GroupSame Org with Universal SubscriptionYesOn-prem Worker Group with Universal Subscription → Cribl.Cloud-managed Worker Group in a Workspace.US governs billing of on-prem env; Cloud ingest is billed normally unless also covered by shared key/Org rules.
Cross-environment flow on free tierN/ANot supportedFree-tier Workspace ↔ paid Org.Free tier license or subscriptions don’t qualify for single-ingest benefit.

Before You Begin Connecting On-Prem Leaders

There are a few tasks you must complete before you can start connecting your on-prem Leader to Cribl.Cloud:

  1. Create a Cribl.Cloud account.

    To set up connected environments, you must have an Enterprise Cribl.Cloud account.

  2. Decide how you want to connect to the Leader.

    There are two methods you can use to connect an on-prem Leader to a Cribl.Cloud Leader:

    • From the Cribl.Cloud account in Connections > Connected Environments.
    • From the on-prem Leader in Distributed Settings > Cloud Connection.
  3. Purchase a Cribl.Cloud Enterprise Plan with credits.

    Credits serve as the virtual transaction currency in the Cribl product suite. Each Cribl product has a predefined usage rate, and as you use the products, credits are deducted from your initial pool.

Configuration Considerations

Take these considerations into account for your on-prem Leader, allowlists, security groups, and Workspaces:

  • You must be on Cribl Edge version 4.8.2 or newer.
  • Ports: Make sure that port 4200 is open on the Leader, with TCP protocol. See Leader Ports for more information.
  • Proxy: Connected Environments doesn’t support proxied connections.
  • TLS: The connection between the Cribl.Cloud Leader and the on-prem Leader must be encrypted using TLS. When you configure the CRIBL_CLOUD_WORKSPACE_URL environment variable, it will start with tls://, which enforces TLS.
  • Static IPs: For IP address allowlist or security group rules, you can find the static IPs of your Cribl.Cloud Leader in Workspace > Access > Leader NLB IPs. You can also use the nslookup command to obtain static IPs.
  • Workspaces: Workspaces are separate infrastructure. For allowlists and security groups, ensure that you add each IP address individually as each Workspace has a unique IP.