/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Monitoring Telecommunications Network with Splunk
Industries
10 Minute Read

Monitoring Telecommunications Network with Splunk

Learn how Splunk enables telecom providers to unify monitoring across complex, multi-vendor networks by collecting, analyzing, and securing real-time telemetry data for improved performance and visibility.
Server Monitoring Today: Why Monitoring Your Servers Matters & How to Approach It
Learn
6 Minute Read

Server Monitoring Today: Why Monitoring Your Servers Matters & How to Approach It

Today, we’ll cover server monitoring tools and services including the value they bring to an enterprise, and how to select the right system.
The Software Development Lifecycle: The Most Common SDLC Models
Learn
8 Minute Read

The Software Development Lifecycle: The Most Common SDLC Models

Explore the Software Development Lifecycle (SDLC), its stages, importance, and popular models like Agile, Waterfall, and Iterative, for efficient software creation.
Splunk Delivers Unified Security and Observability to Protect Applications
Observability
4 Minute Read

Splunk Delivers Unified Security and Observability to Protect Applications

Unify app security & observability with Splunk to detect real-time attacks, prioritize vulnerabilities, & accelerate threat response.
Key Findings From a Recent Study on Data Management in the Modern Security Operations Center
Security
4 Minute Read

Key Findings From a Recent Study on Data Management in the Modern Security Operations Center

Learn about cloud storage preferences, data cost challenges, and best practices for optimizing your SOC's security posture and cost efficiency.
Breaking Down Termite Ransomware: Infection Methods and Detections
Security
8 Minute Read

Breaking Down Termite Ransomware: Infection Methods and Detections

Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.
Learn Splunk Like You Work Here
Tips & Tricks
1 Minute Read

Learn Splunk Like You Work Here

Discover a new content type now available on Splunk Lantern that brings more valuable insider knowledge to our customers.
T-Shirt Analytics at RSAC 2025: How We Used iOS Shortcuts & Splunk to Track T-Shirt Giveaways!
Tips & Tricks
2 Minute Read

T-Shirt Analytics at RSAC 2025: How We Used iOS Shortcuts & Splunk to Track T-Shirt Giveaways!

Learn how to make data collection fun. Splunkers Robert Castley and Kyle Prins are sharing how they used iOS Shortcuts at RSAC to track every t-shirt they handed out, then piping that data straight into Splunk Cloud for real-time analytics.
Leveraging Graph Neural Networks for Enhanced Security and Observability with Splunk
Artificial Intelligence
6 Minute Read

Leveraging Graph Neural Networks for Enhanced Security and Observability with Splunk

Discover how Graph Neural Networks (GNNs) enhance security and observability within Splunk. Learn to detect anomalies, predict threats, and optimize system performance using GNNs. Explore the power of graph analytics in your Splunk environment.