/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Swimming in Sensors and Drowning in Data: The Role of Splunk Partners in Delivering Splunk Edge Hub
Platform
3 Minute Read

Swimming in Sensors and Drowning in Data: The Role of Splunk Partners in Delivering Splunk Edge Hub

With the proliferation of edge computing and the release of Splunk Edge Hub, partners have additional functionality to accelerate the detection, investigation and response of threats and issues that will inevitably occur in physical and industrial environments.
Amadey Threat Analysis and Detections
Security
8 Minute Read

Amadey Threat Analysis and Detections

The Splunk Threat Research Team shares a deep-dive analysis of the Amadey Trojan Stealer, an active and prominent malware that first emerged on the cybersecurity landscape in 2018 and has maintained a persistent botnet infrastructure ever since.
Building an 'AI Assistant' for Splunk
Artificial Intelligence
8 Minute Read

Building an 'AI Assistant' for Splunk

Thanks to early adoption and continuous product improvement, we were able to improve the SPL Copilot for Splunk to provide a much richer and guided experience to Splunk and SPL and renamed it 'Splunk AI Assistant.'
Inclusive Language In the Workplace: Why It Matters & How To Achieve It
Learn
5 Minute Read

Inclusive Language In the Workplace: Why It Matters & How To Achieve It

Effective communication forms the foundation for an effective workplace. Creating an inclusive work environment has become a necessity for organizations that are striving for success, growth, and innovation.
Splunk Expands Its Data Management Capabilities to Physical, OT Environments With the Launch of Splunk Edge Hub
.conf & .conf Go
2 Minute Read

Splunk Expands Its Data Management Capabilities to Physical, OT Environments With the Launch of Splunk Edge Hub

Splunk is pleased to announce its latest innovation in data access and processing – Splunk Edge Hub, in partnership with Edge Hub Central.
Control Plane vs. Data Plane: What Are The Differences?
Learn
7 Minute Read

Control Plane vs. Data Plane: What Are The Differences?

Discover the distinctions between network control and data planes. Optimize performance, security, and scalability in your network design.
Data Lifecycle Management: A Complete Guide
Learn
8 Minute Read

Data Lifecycle Management: A Complete Guide

Learn data lifecycle management (DLM) to effectively manage data throughout its lifecycle, from creation to deletion, ensuring security and compliance.
Technical Support Engineer Role Explored: Responsibilities, Skills and Salary
Learn
6 Minute Read

Technical Support Engineer Role Explored: Responsibilities, Skills and Salary

Discover the world of technical support engineering! Learn about responsibilities, required skills, certifications, and salary insights for this in-demand career path
Eliminate Manual Threat Analysis of Credential Phishing & Malware Threats with Splunk Attack Analyzer
.conf & .conf Go
2 Minute Read

Eliminate Manual Threat Analysis of Credential Phishing & Malware Threats with Splunk Attack Analyzer

Introducing a new addition to the Splunk unified security operations experience: Splunk Attack Analyzer (formerly Twinwave), which automates threat analysis of suspected malware or credential phishing threats.