/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Service Assurance for IT, Telecom, & Cloud
Learn
8 Minute Read

Service Assurance for IT, Telecom, & Cloud

This blog post covers the basics surrounding service assurance as it relates to IT service delivery, cloud, Telecom, & more.
Machine Learning in Security: Detect DNS Data Exfiltration Using Deep Learning
Security
8 Minute Read

Machine Learning in Security: Detect DNS Data Exfiltration Using Deep Learning

This blog discusses in detail about detecting DNS data exfiltration attacks using deep learning
Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting
Security
12 Minute Read

Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting

Windows and endpoints go together like threat hunting and Splunk. Let's look at the most valuable Sysmon event codes for threat hunting in Splunk.
Can't-Miss Observability Sessions for Platform and Security Customers at .conf23
.conf & .conf Go
5 Minute Read

Can't-Miss Observability Sessions for Platform and Security Customers at .conf23

Save these must-see sessions at .conf23 to your personal agenda now.
CloudOps: An Introduction to Cloud Operations
Learn
9 Minute Read

CloudOps: An Introduction to Cloud Operations

Learn the basics of Cloud Operations (CloudOps) in this in-depth blog post.
What’s EDA? Event-Driven Architecture Today
Learn
6 Minute Read

What’s EDA? Event-Driven Architecture Today

Want to trigger IT-based events asynchronously? EDA might be the answer! This is the complete intro to event-driven architecture you've been looking for.
Text Mining: Complete Beginner's Guide
Learn
4 Minute Read

Text Mining: Complete Beginner's Guide

Data is only useful if you can extract meaning from it. How do you understand texts in a macro way that might uncover new patterns? Text mining.
What Is TPRM? Third Party Risk Management Explained
Learn
4 Minute Read

What Is TPRM? Third Party Risk Management Explained

Onboarding third-party services or apps? You’re introducing risk. That’s unavoidable, but you can minimize it with a simple, modern approach to minimize risk.
UK TSA Regulations: SOC Teams, Get Ready!
Security
7 Minute Read

UK TSA Regulations: SOC Teams, Get Ready!

The UK Telecommunications Security Act (TSA) compliance is coming and will be a new challenge for SOC teams. Splunk security evangelist Matthias Maier takes a closer look at requirements and shares an end-to-end use case as an example.