Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

APM Metrics: The Ultimate Guide
Learn
7 Minute Read

APM Metrics: The Ultimate Guide

Go beyond traditional APM and extend your monitoring strategy to include metrics that are important in cloud-native, DevOps-oriented environments.
Scalability in IT: The Complete Guide To Scaling
Learn
5 Minute Read

Scalability in IT: The Complete Guide To Scaling

Scalability is one of the main selling points of migrating to the cloud. What exactly does it mean & how do you do it? Get the full story here.
Splunk Observability Cloud soon available in AWS London and Frankfurt Regions
Observability
3 Minute Read

Splunk Observability Cloud soon available in AWS London and Frankfurt Regions

We’re excited to announce that we are committing to extend the availability of Splunk Observability Cloud to AWS London (eu-west-2) and AWS Frankfurt (eu-central-1) regions starting August 2024.
What is Network Security?
Learn
8 Minute Read

What is Network Security?

Learn the basics of network security and how to secure your organization’s networks.
Detecting New Domains in Splunk (Finding New Evil)
Security
7 Minute Read

Detecting New Domains in Splunk (Finding New Evil)

Ready to find "new" domains that may be naughty? We'll walk you through how to use Splunk & Splunk Enterprise Security to do that: get the full story here!
Under the Hood of SnakeKeylogger: Analyzing its Loader and its Tactics, Techniques, and Procedures
Security
10 Minute Read

Under the Hood of SnakeKeylogger: Analyzing its Loader and its Tactics, Techniques, and Procedures

In this blog, the Splunk Threat Research Team provides valuable insights to enable security analysts and blue teamers to defend and be aware of these scam tactics.