Hemant Seth's Blog Posts

Hemant Seth

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Aw, HEC! Splunking Okta's Event Hooks with the HTTP Event Collector
Tips & Tricks
6 Minute Read

Aw, HEC! Splunking Okta's Event Hooks with the HTTP Event Collector

Former Splunker and soon-to-be Okta employee James Brodsky tells you how to get Okta's Event Hook data into Splunk in 428 easy steps!
Show it Off with Splunk TV! More Ways to Display Your Best Dashboards
Platform
2 Minute Read

Show it Off with Splunk TV! More Ways to Display Your Best Dashboards

Splunk TV lets you easily display your data on the big screen to visualize and monitor what’s going on in your business.
An Interview with Sarah Sta: How Splunk Cultivates your Career
Splunk Life
4 Minute Read

An Interview with Sarah Sta: How Splunk Cultivates your Career

Meet Senior Manager of EMEA Talent Acquisition Sarah Sta. She shares details of her career journey and why now is a great time to join Splunk.
Securing DoD Systems — A Look at SOAR
Industries
2 Minute Read

Securing DoD Systems — A Look at SOAR

Congress again re-enforces the importance of interoperability and automated orchestration of cybersecurity systems.
Splunk Cloud "Automated Private App Validation" (APAV) - General Availability
Platform
4 Minute Read

Splunk Cloud "Automated Private App Validation" (APAV) - General Availability

With the release of 8.2.2112 to Splunk Cloud Platform, we are excited to announce the general availability of "Automated Private App Validation" (APAV), removing the requirement for manual review for all of your private apps.
Approaching Linux Post-Exploitation with Splunk Attack Range
Security
7 Minute Read

Approaching Linux Post-Exploitation with Splunk Attack Range

An introduction to linux post exploitation simulation and threat detection using Splunk Attack Range and linux Sysmon.