/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Azure Services: The Complete Guide
Learn
6 Minute Read

Azure Services: The Complete Guide

From PaaS to IaaS to SaaS, see how Microsoft Azure services all your application, infrastructure and cloud needs in this overview of Azure services.
The Serverless Functions Beginner's Guide
Learn
10 Minute Read

The Serverless Functions Beginner's Guide

In this article, we’ll look at how serverless functions work, how they can be used and how they can help your organization.
Source Code Management: An Introduction
Learn
8 Minute Read

Source Code Management: An Introduction

In this blog post, we'll look at how source code management works, what benefits it brings to software development, and which best practices to follow to get the most out of the process.
Web Analytics 101: A Comprehensive Guide
Learn
7 Minute Read

Web Analytics 101: A Comprehensive Guide

Discover how understanding website data and user behavior drives business success, optimizing experiences and unlocking customer insights.
Infrastructure Analytics: A Beginner's Guide
Learn
8 Minute Read

Infrastructure Analytics: A Beginner's Guide

This blog post covers all the basics around Infrastructure Analytics for IT, IoT, and more.
IT Operations Analytics: An Introduction
Learn
9 Minute Read

IT Operations Analytics: An Introduction

This blog covers the history and current state of IT Operations Analytics (ITOA), a practice used to improve and manage IT systems.
Service Assurance for IT, Telecom, & Cloud
Learn
8 Minute Read

Service Assurance for IT, Telecom, & Cloud

This blog post covers the basics surrounding service assurance as it relates to IT service delivery, cloud, Telecom, & more.
Machine Learning in Security: Detect DNS Data Exfiltration Using Deep Learning
Security
8 Minute Read

Machine Learning in Security: Detect DNS Data Exfiltration Using Deep Learning

This blog discusses in detail about detecting DNS data exfiltration attacks using deep learning
Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting
Security
12 Minute Read

Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting

Windows and endpoints go together like threat hunting and Splunk. Let's look at the most valuable Sysmon event codes for threat hunting in Splunk.