/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Visual Link Analysis with Splunk: Part 2 - The Visual Part
Security
4 Minute Read

Visual Link Analysis with Splunk: Part 2 - The Visual Part

Using Splunk for link analysis - part 2 covering visualizations of linked data.
Observability with CI/CD in a Developer World
Observability
3 Minute Read

Observability with CI/CD in a Developer World

You need to monitor your apps and deploys equally. The Splunk Observability portfolio is the perfect complement to a CI/CD approach, from a developer laptop to an integration test environment.
Detecting Credit Card Fraud Using SMLE
Platform
4 Minute Read

Detecting Credit Card Fraud Using SMLE

In this blog post, we’ll explore an ML-powered solution using the Splunk Machine Learning Environment to detect fraudulent credit card transactions in real time. Using out-of-the-box Splunk capabilities, we’ll walk you through how to ingest and transform log data, train a predictive model using open source algorithms, and predict fraud in real-time against transaction events.
Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall
Security
3 Minute Read

Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall

The scale of cyber attacks and the complexity of networks exacerbate the situation. Operators face three significant challenges: an IT security ecosystem that is fragmented and in flux, users that are both human and machine, and multiple threats with varying levels of severity and sophistication.
A New Fast Lane to Value: Introducing Splunk’s IT Essentials Learn and Work Apps
Observability
3 Minute Read

A New Fast Lane to Value: Introducing Splunk’s IT Essentials Learn and Work Apps

Read all about our two new free new apps — IT Essentials Learn and IT Essentials Work — to help guide you on your journey towards IT maturity.
Detecting the Sudo Baron Samedit Vulnerability and Attack
Security
3 Minute Read

Detecting the Sudo Baron Samedit Vulnerability and Attack

Looking for ways to detect and protect against the SUDO Baron Samedit vulnerability (CVE-2021-3156)? Look no further. In this blog we tell you how to proactively detect vulnerable servers using Splunk and also to detect malicious folks who are attempting to exploit this vulnerability for nefarious outcomes!
TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'
Security
4 Minute Read

TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'

TruSTAR’s Enclave technology is the most advanced cloud-based governance engine for enterprise cyber intelligence – read on to discover how it has evolved to meet the needs of integration, automation and intelligence sharing.
Splunker Stories: Helina Pontohsupit
Splunk Life
2 Minute Read

Splunker Stories: Helina Pontohsupit

In our latest edition of our "Splunker Stories" series, we meet with one of Splunk’s Human Resources Shared Services Specialists in our Sydney, Australia office. We sat down with Helina to learn more about the path which led her to Splunk, her experiences with the Royal Australian Air Force, and her passion for people and Splunk products!
Getting to Know Google Cloud Audit Logs
Partners
16 Minute Read

Getting to Know Google Cloud Audit Logs

So you've set up a Google Cloud Logging sink along with a Dataflow pipeline and are happily ingesting these events into your Splunk infrastructure, but now what? Learn eight useful signals hiding within Google Cloud audit logs.