Hemant Seth's Blog Posts
Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.
Display Mode
Paginated
Filter
Author
Author URL
Limit
6

Deep Learning Toolkit 3.5 - Part 1: Git, MLflow and Image Updates
Part 1 of this blog series, talks about the latest improvements for model management, code version control and recent image updates of Deep Learning Toolkit for Splunk (DLTK).

Splunker Stories: Rob Schluensen
In the latest edition of our 'Splunker Stories' series, we meet Senior Recruiter Rob Schluensen to learn more about his journey to Splunk, his unique perspectives, and how being a Veteran has made him such a valued member of our Splunk recruitment team.

Monitoring AWS EC2 with Splunk Observability
What should you monitor in AWS EC2 to make sure you are getting the right data perspective and insights from your clouds? Discover how to start monitoring EC2 instances with Splunk Infrastructure Monitoring today.

How 5G Can Elevate the Customer Experience in Retail
As 5G becomes more commonplace, it will have a significant impact on the retail industry, with possibilities for enhanced data-generated customer insights, VR services, smart screens, and mobile-cloud services to create personalized experiences.

Streamlining Vulnerability Management with Splunk Phantom
Manage the entire lifecycle of vulnerability management with automation and orchestration using Splunk’s SOAR technology, Splunk Phantom, to automate actions and reduce the time spent on patch management by 40%.

SUPERNOVA Redux, with a Generous Portion of Masquerading
A review of the Pulse Secure attack where the threat actor connected to the network via a the Pulse Secure virtual private network (VPN), moved laterally to its SolarWinds Orion server, installed the SUPERNOVA malware, and collected credentials, all while masquerading the procdump.exe file and renamed it as splunklogger.exe.