/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

What is OMB M-21-31?
Learn
6 Minute Read

What is OMB M-21-31?

OMB M-21-31 mandates that federal agencies increase their IT visibility and response capabilities before, during & after cybersecurity incidents. Get all the details here.
Revolutionize Data Ingestion: Introducing Terraform Support for Splunk Cloud Platform
Platform
2 Minute Read

Revolutionize Data Ingestion: Introducing Terraform Support for Splunk Cloud Platform

Splunk Cloud introduces Terraform support for Index, IP list, & HEC token management for efficient data ingestion.
Getting Support Leads to Giving Support
Splunk Life
3 Minute Read

Getting Support Leads to Giving Support

Marvin Green shares how his personal growth has allowed him to grow and help others grow at Splunk
People, Process and Technology Drives Resilience
Customers & Community
1 Minute Read

People, Process and Technology Drives Resilience

Splunk’s Cory Minton and Ryan Kovar discuss how to create a resilient and dynamic organization with Techstrong's Mitch Ashley.
Modeling and Unifying DevOps Data Part 2: Code
Observability
5 Minute Read

Modeling and Unifying DevOps Data Part 2: Code

Embrace data models for code and bring order to the chaos.
OMB M-21-31 Compliance Made Easy With Splunk CES
Industries
2 Minute Read

OMB M-21-31 Compliance Made Easy With Splunk CES

With the Compliance Essentials for Splunk app, agencies of any size have a flexible, customizable and scalable solution to meet the specific requirements of the OMB M-21-31 memorandum at different levels.
The Security Detail Download: Cyber Threats to the Healthcare Sector
Industry Insights
2 Minute Read

The Security Detail Download: Cyber Threats to the Healthcare Sector

Healthcare organizations face the challenge of an expanding attack surface — all while balancing the most important priority: patient lives. Listen to the Security Detail podcast for more.
Data Mesh Architecture Explained
Learn
7 Minute Read

Data Mesh Architecture Explained

Data mesh might be the solution you need. Want to enable teams to innovate, to own and drive their data? Learn all about data mesh right here.
Using metadata & tstats for Threat Hunting
Security
4 Minute Read

Using metadata & tstats for Threat Hunting

Behold the power of metadata and tstats commands! These commands will quickly provide situational awareness of your hosts and sourcetypes as you begin hunting.