/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Syncing Lookups Using Pure SPL
Tips & Tricks
1 Minute Read

Syncing Lookups Using Pure SPL

Sync lookup files without relying on third party tools
Enhancing Splunk Visualizations with Mapbox
Tips & Tricks
3 Minute Read

Enhancing Splunk Visualizations with Mapbox

bluecue – The German secret to success in the channel
Partners
3 Minute Read

bluecue – The German secret to success in the channel

Splunk enables bluecue to embed and distribute their knowledge to customers at scale and with a short time to value
Upgrading Linux Forwarders Using the Deployment Server
Tips & Tricks
3 Minute Read

Upgrading Linux Forwarders Using the Deployment Server

Learn how to upgrade Linux Forwarders using the Deployment Server
Animate SimpleXML Dashboard Elements with a Carousel
Tips & Tricks
1 Minute Read

Animate SimpleXML Dashboard Elements with a Carousel

Jason Conger shares how he animated SimpleXML dashboard elements with a carousel in this blog post. Learn how to take static icons and make them spin like a carousel.
Mapping with Splunk
Tips & Tricks
3 Minute Read

Mapping with Splunk

This blog will cover a few tricks to spice up your reports and dashboards to see patterns, summarize data and drill down into interesting events.
Three lessons learnt from the most mature Computer Security Incident Response Team (CSIRT)
Customers & Community
2 Minute Read

Three lessons learnt from the most mature Computer Security Incident Response Team (CSIRT)

Cisco’s CSIRT shared how they are bridging the gaps among business context, cost justification and cyber security by relying on Splunk as their Investigation and Response Platform.
Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics
Security
8 Minute Read

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics

Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities
Punycode phishers - All you need to know
Security
2 Minute Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.