/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Splunk Edge Hub: Physical Data, Sensing and Monitoring on the Edge
Partners
5 Minute Read

Splunk Edge Hub: Physical Data, Sensing and Monitoring on the Edge

Splunk Edge Hub expands the boundaries of metrics and logs from the datacenter to the physical edge of the network and beyond.
Using RegEx for Threat Hunting (It’s Not Gibberish, We Promise!)
Security
4 Minute Read

Using RegEx for Threat Hunting (It’s Not Gibberish, We Promise!)

Another excellent tool for your threat hunting: RegEx! SPL offers two commands for utilizing regular expressions in Splunk searches. See how to do it here.
The CISO Guide to Cloud Security Transformation
Ciso Circle
3 Minute Read

The CISO Guide to Cloud Security Transformation

Industry advisor LaLisha Hurt shares best practices for successful cloud security transformation.
Announcing the Splunk Add-on for OpenTelemetry Collector
Observability
2 Minute Read

Announcing the Splunk Add-on for OpenTelemetry Collector

Now you can use the Deployment Server to deploy the Splunk Distribution of the OpenTelemetry Collector.
Deployment Frequency (DF) Explained
Learn
5 Minute Read

Deployment Frequency (DF) Explained

Deploying changes to production is the only way end-users will see improved software. Learn about the deployment frequency (DF) metric from DORA here.
What Is Human Centric Software?
Learn
4 Minute Read

What Is Human Centric Software?

Human centric software is a way of designing software for both tangible metrics and harder to measure concepts like user preference & satisfaction.
Compliance Essentials for Splunk 2.1.0
Security
8 Minute Read

Compliance Essentials for Splunk 2.1.0

Announcing the latest on Compliance Essentials for Splunk, an essential part of your toolkit to help your organization maintain and monitor your compliance status and cyber resiliency with various frameworks.
Stat! 3 Must-Have Data Filtering Techniques
Security
6 Minute Read

Stat! 3 Must-Have Data Filtering Techniques

To hunt for threats, there's a lot of data you do NOT need. Here are the 3 must-have data filtering techniques so you can hunt those threats STAT!
What's Dogfooding? AKA Drinking Your Own Champagne, or Eating Your Own Ice Cream
Learn
3 Minute Read

What's Dogfooding? AKA Drinking Your Own Champagne, or Eating Your Own Ice Cream

This article takes a deep look at the history, benefits, challenges, and language of dogfooding, the practice of using your own software/products.