Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

How to Simplify Your Out-of-the-Box Alerting with NEW! AutoDetect
Observability
3 Minute Read

How to Simplify Your Out-of-the-Box Alerting with NEW! AutoDetect

AutoDetect provides out-of-the-box alerts for quick time to value. Get started in minutes to discover anomalies across the hybrid infrastructure within seconds.
Introducing Synthetic Adversarial Log Objects (SALO)
Security
2 Minute Read

Introducing Synthetic Adversarial Log Objects (SALO)

Synthetic Adversarial Log Objects (SALO) is a framework for the generation of log events without the need for infrastructure or actions to initiate the event that causes a log event. Learn more about its purpose and how you can utilize it.
Face the Unexpected with the Stability and Resiliency of Splunk Cloud Platform
Platform
5 Minute Read

Face the Unexpected with the Stability and Resiliency of Splunk Cloud Platform

Splunk's SVP and Chief Product Officer, Garth Fort, dives into why the Splunk Cloud Platform is critical for helping customers drive stability across their ecosystems from a security, infrastructure and application perspective.
Staff Picks for Splunk Security Reading January 2022
Security
2 Minute Read

Staff Picks for Splunk Security Reading January 2022

Welcome to the Splunk staff picks blog. Each month, Splunk security experts select presentations, white papers, and customer case studies that we feel are worth a read. We hope you enjoy.
Threat Advisory: STRT-TA02 - Destructive Software
Security
11 Minute Read

Threat Advisory: STRT-TA02 - Destructive Software

The focus of this threat advisory is on a recently reported destructive payload by Microsoft MSTIC under the name of WhisperGate. We break down the different components and functions of how this payload works and provide a series of detections to mitigate and defend against this threat.
A Splunk Approach to Baselines, Statistics and Likelihoods on Big Data
Tips & Tricks
7 Minute Read

A Splunk Approach to Baselines, Statistics and Likelihoods on Big Data

This machine is sending lots of logs. Is this normal? This user has logged in at 1 am. Is this normal? We've seen a network communication with this particular signature. Is this normal? Splunker Josh Cowling explores the answers to these and other questions.