/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Qualitative vs Quantitative: Which Research Method is Right for You?
Learn
8 Minute Read

Qualitative vs Quantitative: Which Research Method is Right for You?

Learn the differences, uses, and benefits of qualitative vs. quantitative research. Discover how to choose the right method for your data and projects.
CitrixBleed 2: When Memory Leaks Become Session Hijacks
Security
10 Minute Read

CitrixBleed 2: When Memory Leaks Become Session Hijacks

Discover how to detect, mitigate, and respond to CitrixBleed 2 (CVE-2025-5777), a critical Citrix NetScaler ADC and Gateway vulnerability exploited in the wild.
Data Federation Brings SOC Teams Up to Attack Speed
Ciso Circle
4 Minute Read

Data Federation Brings SOC Teams Up to Attack Speed

Discover how data federation helps SOC teams overcome data complexity, silos, and staffing challenges to boost security and efficiency.
Four Database Types You Need to Know
Learn
7 Minute Read

Four Database Types You Need to Know

Discover the four main database types, their features, strengths, and best use cases — plus tips on choosing the right one for your application or business.
8 Kubernetes Certifications to Boost Your Cloud Career in 2026: Costs, Levels & Resources Compared
Learn
8 Minute Read

8 Kubernetes Certifications to Boost Your Cloud Career in 2026: Costs, Levels & Resources Compared

Explore 8 top Kubernetes certifications by level with details on costs, prerequisites, providers, and exam formats — ideal for cloud and DevOps careers.
Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk
Security
20 Minute Read

Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk

Unlock deep endpoint network security insights by integrating Cisco NVM with Splunk.
Using Splunk to Develop Local LLM MCP Mitre Atlas Detections
Artificial Intelligence
9 Minute Read

Using Splunk to Develop Local LLM MCP Mitre Atlas Detections

This comprehensive guide covers setting up a dockerized lab, log management, and detection strategies to secure AI-enabled systems against real-world threats.
What Is Detection as Code (DaC)? Benefits, Tools, and Real-World Use Cases
Learn
9 Minute Read

What Is Detection as Code (DaC)? Benefits, Tools, and Real-World Use Cases

Learn how Detection as Code transforms security rule management with Git, CI/CD, and automation. See real examples and tools to get started.
IT Service Performance Monitoring: Key Metrics, Best Practices, and Future Trends
Learn
6 Minute Read

IT Service Performance Monitoring: Key Metrics, Best Practices, and Future Trends

Monitor IT service performance to ensure reliability and efficiency. Learn key metrics, best practices, and how modern tools help optimize cloud-based IT systems.