/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Synthetic Testing Examples: User Flow Testing, APIs Validation, Custom Metrics, Log Ingestion, and More
Observability
4 Minute Read

Synthetic Testing Examples: User Flow Testing, APIs Validation, Custom Metrics, Log Ingestion, and More

Introducing a library of Splunk Synthetics examples now available in GitHub, showcasing common flows and concepts for effective Synthetic testing.
Monitoring Telecommunications Network with Splunk
Industries
10 Minute Read

Monitoring Telecommunications Network with Splunk

Learn how Splunk enables telecom providers to unify monitoring across complex, multi-vendor networks by collecting, analyzing, and securing real-time telemetry data for improved performance and visibility.
Server Monitoring Today: Why Monitoring Your Servers Matters & How to Approach It
Learn
6 Minute Read

Server Monitoring Today: Why Monitoring Your Servers Matters & How to Approach It

Today, we’ll cover server monitoring tools and services including the value they bring to an enterprise, and how to select the right system.
The Software Development Lifecycle: The Most Common SDLC Models
Learn
8 Minute Read

The Software Development Lifecycle: The Most Common SDLC Models

Explore the Software Development Lifecycle (SDLC), its stages, importance, and popular models like Agile, Waterfall, and Iterative, for efficient software creation.
Splunk Delivers Unified Security and Observability to Protect Applications
Observability
4 Minute Read

Splunk Delivers Unified Security and Observability to Protect Applications

Unify app security & observability with Splunk to detect real-time attacks, prioritize vulnerabilities, & accelerate threat response.
Key Findings From a Recent Study on Data Management in the Modern Security Operations Center
Security
4 Minute Read

Key Findings From a Recent Study on Data Management in the Modern Security Operations Center

Learn about cloud storage preferences, data cost challenges, and best practices for optimizing your SOC's security posture and cost efficiency.
Breaking Down Termite Ransomware: Infection Methods and Detections
Security
8 Minute Read

Breaking Down Termite Ransomware: Infection Methods and Detections

Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.
Learn Splunk Like You Work Here
Tips & Tricks
1 Minute Read

Learn Splunk Like You Work Here

Discover a new content type now available on Splunk Lantern that brings more valuable insider knowledge to our customers.
T-Shirt Analytics at RSAC 2025: How We Used iOS Shortcuts & Splunk to Track T-Shirt Giveaways!
Tips & Tricks
2 Minute Read

T-Shirt Analytics at RSAC 2025: How We Used iOS Shortcuts & Splunk to Track T-Shirt Giveaways!

Learn how to make data collection fun. Splunkers Robert Castley and Kyle Prins are sharing how they used iOS Shortcuts at RSAC to track every t-shirt they handed out, then piping that data straight into Splunk Cloud for real-time analytics.