Explore Cribl Edge on Linux
The Cribl Edge UI offers a centralized view to manage, configure, and version–control your Edge Nodes. It also endows you with teleport–to–the–edge superpowers for locally previewing and validating your configurations. Here’s a quick tour of the Cribl Edge UI in distributed mode.
Access Cribl Edge
When you first log into Cribl Edge (single-instance or distributed), you’ll see tiles that prompt you to choose between the Cribl Stream or Cribl Edge UI. The Edge tile displays basic configuration details, including the number of Fleets, Subfleets, Edge Nodes, and events and bytes over time.
Select Manage to jump into Cribl Edge.

Edge Home
Once you open Cribl Edge, you’ll be on the Edge Home landing page. This page gives you an overview of configured Fleets, Monitoring information for Fleets, Subfleets, Edge Nodes, and Events and Bytes in and out. At the bottom, you’ll see Recent Actions that users have taken in the environment as well as any configured Fleet Mappings.

From the sidebar, you can quickly access more Cribl Edge goodies:
Fleets
Select Fleets from the sidebar to access your configured Fleets.

From here, you can select a Fleet Name to isolate individual Fleets, or use the Search bar to locate your Fleet.
- See Exploring Fleets for more information about the Fleets interface.
- For more information about creating Fleets, see Creating and Managing Fleets and Subfleets.
Edge Nodes
Select Edge Nodes to view all of your Edge Nodes in one list.

The list provides status information for each Edge Node in the selected Fleet, gives you the opportunity to filter Edge Nodes based on selected criteria, as well as a UI for adding and updating Nodes. For more information, see Manage Edge Nodes.
Mappings
You can use Mappings Rulesets to map Edge Nodes to Fleets by defining rules. For more information, see Mapping Edge Nodes to Fleets.
Notifications
Notifications alert Cribl Edge admins about issues that require their immediate attention. For information on types of Notifications, Notification targets, and managing Notifications, see our Managing Notifications docs.
Logs
Cribl Edge generates internal application logs that monitor its own operations and health. They provide valuable insights into the system’s behavior, performance, and potential issues. For more information, see Internal Logs.
Explore Tab
Select Explore to view more details on a particular Edge Node. On the Node to explore drop-down, select one of your hosts to display the following tabs:

The Node to explore drop-down lists up to 50 Edge Nodes, ordered by hostname. To view the details for a specific Edge Node, enter the hostname or GUID into the Node to explore field.
Let’s explore each tab.
Processes
The Processes tab lists all the processes running on the Edge Node.

Select on any of the rows to open the Process: <process_name> drawer. In the drawer’s default Overview tab, you’ll find basic information on the process, including CPU, Memory, and IO graphs, along with tables for active Listening, Inbound, and Outbound connections.

In this tab, select All details to see the selected process’ information out of /proc
, expressed as key-value pairs. This information would normally require SSH’ing to the machine; this view makes troubleshooting across multiple systems much easier.

Open the AppScope tab if you want to “scope” the process (i.e., use AppScope to monitor it). Once in the tab, you’ll choose an an AppScope configuration that says what events and metrics to obtain, and an AppScope Source to receive them. See Scoping by PID in the AppScope docs. Note that your Cribl Edge instance must be running as root to do process monitoring with AppScope.

The AppScope column indicates when a process is being scoped, which you can view from the Processes tab.
Containers
The Containers tab lists all the running containers and container metrics including information about images, volumes, status, ports, and so on.
Cribl Edge supports both Docker and
containerd
runtimes.
containerd
containers have less info than Docker containers, so Ports
, IPs
, and Logs
won’t populate.

Select any container to view more details:

Select the Logs tab to view container logs. Optionally, use the search bar to filter displayed logs by arbitrary strings.

The screenshot below shows containerd
details, which don’t include charts or logs.

If you run Edge as an unprivileged user, see Making Docker Containers Visible to Edge.
Files
The Files tab lists all the log files being actively written to by running applications that Cribl Edge has auto-discovered. You can also specify a list of directories and files to actively monitor.

The Actions column allows you to:
View: Displays a representation of the lines this column contains. You can also select any file row. To restrict how much data is displayed, use the search field or time picker on the Search tab.
Inspect: Opens the Inspect File tab to show file metadata including details like permissions, file size, user, and modified date.
When inspected, compressed files (such as foo.bar.gz
) include a File preview that shows the beginning of the file contents.
Archived files (such as .zip
, .tgz
, and .tar.gz
) include a File listing that shows the files within it.
If a file appears suspicious, select VirusTotal or OpSwat at the bottom of the modal to see if the file is flagged as compromised.

Monitor: Displays the File Monitor’s configuration modal.
Ingest: Opens the Ingest file modal to send the file content to Routes/Pipelines for further processing or downstream to any destination you have configured. This is useful for testing and troubleshooting your configurations.
The Files tab provides the following options.
File Discovery Modes
Select a button at the top to select a discovery mode:
- Auto: Tells Cribl Edge to automatically discover files that are open for writing on currently running processes.
- Manual: Tells Cribl Edge to discover the files within the Path (directory) and Allowlist that you specify, down to the Max depth.
- Browse: Displays a tree view of all of your directories and files.

Path
The Path field tells Cribl Edge to discover the files within the path (a directory) that you specify, down to the Max depth.
Allowlist
The Allowlist field, available with Auto and Manual discovery, supports wildcard syntax, and supports the exclamation mark (!
) for negation. For example, you can use !*cribl*access.log
to prevent Cribl Edge from discovering its own access log. The default filters are */log/*
and *log
.
Select any file to see a representation of the lines it contains. To restrict how much data is displayed, you can use the search field or time picker on the Search tab.

If the representation of events shown on the Search tab isn’t ideally suited to the file’s content, you can use the Event Breakers tab to change it.

Monitor Files
The Monitor Files button, available with Auto and Manual discovery, opens a new File Monitor Source prefilled with the discovery mode and anything else you specified on the Files tab, such as allowlist entries, path, or max depth.
Max Depth
The Max depth field, available with Manual discovery, is empty by default. Cribl Edge will search subdirectories, and their subdirectories, downward without limit.
If you enter 0
, Cribl Edge will discover only the top-level files within the specified path. If you specify 1
, Cribl Edge will discover files one level down from the top. Follow this pattern to specify the depth you want.
Monitor a File
Select a file’s Monitor or Actions option to configure your File Monitor Source to generate events from the file’s lines or records.

The Monitor feature automatically populates the modal with the following settings configured on the Files tab:
- Discovery mode
- Search path
- Max depth
- Filename allowlist
In addition, the Connected Destinations section defaults to QuickConnect. In the Connected Destinations section, you can select a Pipeline or Pack and a Destination. Otherwise, when you save, you’ll be routed to the Collect page to set up your connections via QuickConnect.

For further details, see File Monitor and QuickConnect.
Ingest a File
To configure options for how and where to send file contents, use the Ingest file modal.
You have two options:
- Send directly to a configured Destination via QuickConnect (the default).

- Send to Routes through (an optional) Pre-Processing Pipeline.

You can configure Event Breakers and rulesets for both options.
Explore Files with Event Breakers
When you select a file in the Files tab, and Cribl Edge shows a representation of the lines that the file contains, how does that work? What’s happening is that Cribl Edge is applying a default Event Breaker to the file.
You are not limited to the default Event Breaker, though. Select the Event Breakers tab, then:
To apply a different (existing) Event Breaker, select Add ruleset, then select the desired ruleset from the Event Breaker rulesets drop-down.
To create a new ruleset, select Create New to open the New Ruleset modal. Proceed as described here. Later, you can persist the new Event Breaker as part of a Source or a Collector. While you create the new ruleset, Cribl Edge pulls the contents of the open file into the Sample File area. Toggle between the In and Out tabs to compare, respectively, the original content, and the content as modified by the Event Breaker you’re creating.
Now return to the Search tab – the contents of your chosen file will appear with the new Event Breaker applied.
System State
The System State upper tab provides access to these left tabs:
- Host Info
- Disks
- DNS
- File Systems
- Firewall
- Groups
- Hosts File
- Interfaces
- Listening Ports
- Logged-In Users
- Routes
- Services
- Users
To display any of the tabs above, you need to configure and enable the System State Source. Also, make sure that the Source’s Collector Settings fields are enabled.
Host Info
Cribl Edge can add a __metadata
property to every event emitted from every enabled Source. The System State tab displays the metadata collected for each Edge Node under Host Info.

The metadata surfaced by an Edge Node can be used to:
- Enrich events (with an internal
__metadata
field). - Display to users as a part of instance exploration.
You can customize the type of metadata collected at Fleet Settings > Limits > Metadata. Use the Event metadata sources drop-down (and/or the Add source button) to add and select metadata sources.
In Edge mode, all the Event metadata sources are enabled by default.

The metadata sources that you can select here include:
os
: Reports details for the host OS and host machine, like OS version, kernel version, CPU and memory resources, hostname, network addresses, etc.cribl
: Reports the Cribl Edge version, mode, Fleet for managed instances, and config version.aws
: Reports details for an EC2 instance, including the instance type, hostname, network addresses, tags, and IAM roles. For security reasons, we report only IAM role names.env
: Reports environment variables.kube
: Reports details on a Kubernetes environment, including the node, Pod, and container. For details, see __metadata.kube Property.
When these metadata sources are enabled (and can get data), Cribl Edge will add the corresponding property to events, with a nested property for each enabled source.
Some metadata sources work only in configured environments. For example, the
aws
source is available only when running on an AWS EC2 instance.If your security tools report denied outbound traffic to IP addresses like
169.254.169.168
or169.254.169.254
, you can suppress these by removingaws
from the metadata sources described above. If you have a proxy setup, Cribl recommends adding these IP addresses to yourno_proxy
environment variable.
__metadata.kube
Property
For the __metadata.kube
property (kube
in the UI) to report details on a Kubernetes environment, Cribl Edge needs to figure out where it is running. Set the KUBE_K8S_POD
environment variable to the name of the Pod in which Cribl Edge is running. At this point, the __metadata.kube
property will have information to report on the node
and pod
properties.
If the /proc/self/cgroup
is working, then the container
property information will be available, too.
If you leave the
KUBE_K8S_POD
environment variable unset, and/proc/self/cgroup
is not working, then Cribl Edge will not know what Pod it is running in. This state has multiple implications:
- The Kubernetes Metrics Source will be unable to identify whether or not it is in a DaemonSet. The result will be redundant metrics from each node in the cluster.
- The Kubernetes Metadata collector will not add the
__metadata.kube property
.- The Kubernetes Logs Source will also duplicate data. Every node in the cluster will collect logs for every container in the cluster.
Disks
The Disks tab displays the inventory of physical disks and their partitions on the host system.

DNS
The DNS tab lists the host system’s DNS resolvers and search entries.

File Systems
The File Systems tab displays an inventory of the mounted file systems on the host system.

Firewall
The Firewall tab displays a list of the host’s defined firewall rules.

Groups
The Groups tab displays a list of the local groups including their names, descriptions, and members on the host system.

Hosts File
The Hosts File tab displays the host system’s current state.

Interfaces
The Interfaces tab displays a list of each of the network interfaces on the host system.

Listening Ports
The Listening Ports tab displays a list of listening ports and their associated process identifier (pid).

Logged-In Users
The Logged-In Users tab displays a list of currently logged-in users on the host.

Routes
The Routes tab displays entries from the network routes on the host system.

Services
The Services tab displays a list of each configured service (such as systemd
and initd
) along with their running status.

Users
The Users tab displays a list of local users on the host system.

Kubernetes
The Kubernetes tab lists all the Kubernetes clusters, including nodes, pods, and containers.

Select any row to open a summary table for the pod. The default Overview tab displays basic node information, including creation time, labels, taints, lease, and annotations.

The Host tab displays detailed information about the node, including its IP address, capacity, system information, and the number of pods it’s currently hosting.

The Pods tab lists the pods running on the node, along with their resource usage and age.

Select Filter Rules to view/add more filters. A default filter is applied to ignore the kube-*
namespace, which is typically used by Kubernetes system components and may contain a large volume of irrelevant events.
Filter Rules can be applied to the Kubernetes Logs Source to refine the data ingested into Cribl Edge.
To preview the effects of a new or modified Event Breaker Ruleset, you must commit and deploy the configuration changes.

In the sidebar, select Namespaces to view the list of active namespaces in the Kubernetes cluster, along with their status and age.

Select any namespace to view detailed information, including creation time, labels, annotations, resource quotas, and resource limits.

In the sidebar under Workloads, select Pods to view a list of pods running in the cluster, showing their associated name, namespace, readiness, status, restart count, age, IP address, and the node they’re running on.

Select any row to open a summary table. The default Overview tab displays general information about the pod, including its name, namespace, status, IP address, labels, annotations, current health conditions, and tolerations.

The Containers tab shows details about the containers within the selected pod, including their name, image, ports used, and their container ID.

The Logs tab displays real-time logs from the container(s), providing insights into its activity and any potential issues.

To add timestamps to container logs that lack them, toggle Enable timestamps on. This prefixes each line with a timestamp. After the timestamps are extracted, you can remove them from the events using the Kubernetes Logs Source Event Breaker and the Pre-processing Pipeline.
Select Events to apply and preview Event Breaker Rulesets to your logs and preview them.
