Kushagra Sharma's Blog Posts
Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.
Display Mode
Paginated
Filter
Author
Author URL
Limit
6

Up Close Monitoring with AWS Fargate
AWS Fargate makes using containers easier, but it also means more to monitor and track, to make sure we get the results we are targeting – read on to discover how Splunk can help.

Spring Has Sprung! And So Has Our New SAP Offering!
Splunk is excited to announce that our Splunk Service Intelligence for SAP® solutions (SI for SAP) content pack just released for general availability! Learn more about the significant value organizations around the world have seen by combining the power of SAP with Splunk.

Introducing Splunk Attack Range v1.0
The Splunk Attack Range project has officially reached the v1.0 release – read on to learn how we got here, what features we’ve built for v1.0 and what the future looks like for Splunk Attack Range.

New Splunk Synthetic Monitoring Features Help Integrate Uptime and Performance Across the Entire Splunk Platform
New Splunk Synthetic Monitoring integrations and best practices help IT Ops and engineering teams monitor and troubleshoot uptime and improve web performance.

Start Your Engines, Data Drivers
We kicked off the first round of our Data Drivers series here at Splunk where we invite you to come racing with us on iRacing.com, then use the data we create there to get hands-on with Splunk to extract actionable insights.

How Splunk Is Parsing Machine Logs With Machine Learning On NVIDIA’s Triton and Morpheus
A global workforce, combined with the growing need for data, is driving an increasingly distributed and complex attack surface that needs to be protected. Sophisticated cyberattacks can easily hide inside this data-centric world, making traditional perimeter-only security models obsolete. The complexity of this interconnected ecosystem now requires one to assume that the adversary is already within the network and consequently must be detected there, not just at the perimeter.