/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

LLM Observability Explained: Prevent Hallucinations, Manage Drift, Control Costs
Learn
7 Minute Read

LLM Observability Explained: Prevent Hallucinations, Manage Drift, Control Costs

LLM observability is critical for scaling AI systems. Learn how proper tracking helps to cut costs, prevent hallucinations, and build trustworthy LLM apps.
What Is Network Monitoring? Ensuring Uptime, Security & Operational Excellence
Learn
8 Minute Read

What Is Network Monitoring? Ensuring Uptime, Security & Operational Excellence

Network monitoring means overseeing a network's performance, availability, and overall functionality — allowing you to identify and resolve issues before they impact end-users.
Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console
Artificial Intelligence
2 Minute Read

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Discover the AI assistant usage dashboard in Cloud Monitoring Console and how Splunk Admins can use it to optimize their AI usage within Splunk.
The Real Cost of Disjointed Security Tools in the SOC
Ciso Circle
3 Minute Read

The Real Cost of Disjointed Security Tools in the SOC

Overcome data gravity by activating the right data, not just accumulating it. Learn how to boost digital resilience, optimize hybrid cloud, and leverage AI effectively.
Community at .conf25: SplunkTrust Stories Series (Part 4)
.conf & .conf Go
2 Minute Read

Community at .conf25: SplunkTrust Stories Series (Part 4)

For SplunkTrust members like Michael Bentley, .conf isn't just another technology conference – it's become something far more personal.
Modern C2 Attacks: Detect & Defend Command-and-Control
Learn
7 Minute Read

Modern C2 Attacks: Detect & Defend Command-and-Control

Learn how command-and-control (C2) attacks work, including emerging stealth techniques, real-world examples, and modern detection using AI and behavioral analysis.
SOC Automation: How To Automate Security Operations without Breaking Things
Learn
9 Minute Read

SOC Automation: How To Automate Security Operations without Breaking Things

Automating SOC activities is a must. Learn what SOC automation means, how much you can automate (and how), and where humans must stay in the loop.
Splunk Security Content for Threat Detection & Response: September Recap
Security
2 Minute Read

Splunk Security Content for Threat Detection & Response: September Recap

Splunk's September ESCU update: New security content & analytics for robust threat detection. Covers Cisco ASA, ArcaneDoor, diverse malware, and Office365 Copilot activity.
From Insight to Action: Transforming Customer Experience with Splunk
Customers & Community
1 Minute Read

From Insight to Action: Transforming Customer Experience with Splunk

With Splunk, teams can innovate, adapt faster, and grow their skills more rapidly to challenge the norm and enable them to quickly find solutions to customer problems through valuable data insights.