/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Data Aggregation: How It Works
Learn
4 Minute Read

Data Aggregation: How It Works

Without aggregation, insights from a given data set will lack value and accuracy. Aggregation is the first step toward unlocking the story behind the numbers.
Elevate Your Security Program with Splunk and Tenable
Partners
4 Minute Read

Elevate Your Security Program with Splunk and Tenable

Tenable and Splunk built an integration that combines security logs, behavioral data and threat intelligence from Splunk with cyber exposure insights—data on assets, vulnerabilities, misconfigurations and unpatched components—from Tenable.
Meet the Splunktern: Joline Cheng
Splunk Life
4 Minute Read

Meet the Splunktern: Joline Cheng

In this next installment of our "Meet the Splunktern" series, we're featuring Joline Cheng, Software Engineer In Test (QA) Intern in Santana Row. Joline is a third year student at the University of Waterloo majoring in data science. Read on to learn more about Joline’s experience at Splunk!
Administer Your Splunk Cloud Stacks Easily and Efficiently with ACS Helper for Splunk
Tips & Tricks
2 Minute Read

Administer Your Splunk Cloud Stacks Easily and Efficiently with ACS Helper for Splunk

Administer your Splunk Cloud instances more easily with ACS Helper for Splunk. This free app is now available on Splunkbase.
SQL vs. NoSQL Today: Databases, Differences & When To Use Which
Learn
7 Minute Read

SQL vs. NoSQL Today: Databases, Differences & When To Use Which

Trying to decide on the right database type? SQL and NoSQL each have their own pros and cons, from relational to schema-less, to vertical and horizontal scaling.
SOC Metrics: Security Metrics & KPIs for Measuring SOC Success
Learn
8 Minute Read

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

Maintaining a keen eye on SOC success is critical in any security operation. Join us as we discuss common KPIs, and how to leverage metrics for improvement.
Outputs vs. Outcomes: Understanding the Differences
Learn
4 Minute Read

Outputs vs. Outcomes: Understanding the Differences

Measuring success is no small equation: correctly assessing outputs versus outcomes can help us get it right. Join us to explore the key differences between the two.
Red Teams vs. Blue Teams: What’s The Difference?
Learn
10 Minute Read

Red Teams vs. Blue Teams: What’s The Difference?

Effective cybersecurity is a group effort - better yet, a multi-group effort. Learn how the Red Team Blue Team approach tackles security from both angles.
Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework
Security
9 Minute Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).