/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Individual Contributors vs Managers: Differences in Roles
Learn
6 Minute Read

Individual Contributors vs Managers: Differences in Roles

Explore the differences between individual contributors and managers, their roles, transitions, and synergies in organizations.
A Case Study in Vulnerability Prioritization: Lessons Learned from Large-Scale Incidents
Security
11 Minute Read

A Case Study in Vulnerability Prioritization: Lessons Learned from Large-Scale Incidents

Splunker Audra Streetman provides an overview of the lessons learned from previous large-scale security incidents to help inform vulnerability prioritization.
Automatic Deprovisioning of users for Okta IdP
Platform
2 Minute Read

Automatic Deprovisioning of users for Okta IdP

With the release of the feature, Splunk customers can automatically deprovision users within Splunk when a user(s) are removed from the customer’s Okta Identity Provider (IdP).
Meet the Splunktern: Rayyan Lababidi
Splunk Life
4 Minute Read

Meet the Splunktern: Rayyan Lababidi

Rayyan Lababidi, a Digital Sales Intern in Melbourne, AU, reflects on her time as a Splunktern, shares career aspirations, and provides insights for those interested interning at Splunk.
Splunk is Elevating Customer Success To Help Drive a Brighter Future
Customers & Community
1 Minute Read

Splunk is Elevating Customer Success To Help Drive a Brighter Future

Efficient and elevated customer service is integral to success for any business., and that's our mission at Splunk for every customer every day.
Splunk Technical Experts Help Drive Business Outcomes
Customers & Community
1 Minute Read

Splunk Technical Experts Help Drive Business Outcomes

Splunk technical experts help drive value for customers by enhancing applications, integrations, and business outcomes.
What Is Authorization?
Learn
6 Minute Read

What Is Authorization?

Authorization is the process of deciding what actions, parts of a website, or application a given user can access after they have been authenticated.
Maximum Acceptable Outage (MAO) Explained
Learn
7 Minute Read

Maximum Acceptable Outage (MAO) Explained

Learn how Maximum Acceptable Outage (MAO) helps organizations minimize downtime and ensure business continuity.
Splunk SOAR Evolved: A Unified TDIR Approach to Automation
Security
5 Minute Read

Splunk SOAR Evolved: A Unified TDIR Approach to Automation

Splunk SOAR 6.3.0 and 6.3.1 constitute a significant evolution in how security practitioners can implement, use, and leverage security automation in the SOC more efficiently.