/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Data Integrity: What It Is & Why It Matters
Learn
7 Minute Read

Data Integrity: What It Is & Why It Matters

In this post, we'll cover what data integrity is, how to identify and prevent data integrity issues, and why data integrity matters.
What is Infrastructure Monitoring?
Learn
7 Minute Read

What is Infrastructure Monitoring?

Monitoring your infrastructure starts long before systems go live. Let’s look at approaches, tools, challenges & future trends of infrastructure monitoring.
Becoming Santa Claus
Splunk Life
2 Minute Read

Becoming Santa Claus

Bonnie Rosensteel, Director of Professional Services Contract Operations at Splunk, shares how she's giving back and helping Splunkers grow.
What Is CX? Customer Experience, Defined
Learn
8 Minute Read

What Is CX? Customer Experience, Defined

Customer experience (CX) is integral to every business today. Learn what CX means, why it matters, and how to improve CX for your customers here.
What Is Network Configuration?
Learn
15 Minute Read

What Is Network Configuration?

In this post, we'll do a deep dive into network configuration and include best practices for keeping networks up and running
User Acceptance Testing (UAT): Definition, Types & Best Practices
Learn
6 Minute Read

User Acceptance Testing (UAT): Definition, Types & Best Practices

User acceptance testing, or UAT, is an important part of finalizing any new feature or product. Learn why to do it, and then learn how, all in this article.
Macro ATT&CK for a TTP Snack
Security
3 Minute Read

Macro ATT&CK for a TTP Snack

Splunk's Mick Baccio and Ryan Fetterman explore 2024's macro-level cyber incident trends through the lens of the MITRE ATT&CK framework.
CI/CD Automation for Splunk Apps using Github Actions
Tips & Tricks
8 Minute Read

CI/CD Automation for Splunk Apps using Github Actions

Splunker Patrick King explains how to replace local, by-hand app development with a fully source-controlled, CI/CD-automated workflow.
From Lone Wolves to Cyber Packs: How Collaboration Crushes Threats
Ciso Circle
3 Minute Read

From Lone Wolves to Cyber Packs: How Collaboration Crushes Threats

AI and machine learning are supercharging collaborative security efforts by building smart defense systems with cyber memory.