/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Maintaining Thresholds: Advanced Splunk Observability Detectors
Observability
3 Minute Read

Maintaining Thresholds: Advanced Splunk Observability Detectors

Set up complex multi-signal alerts, consolidate multiple alerts into a single detector, and maintain sanity in a complex world with Splunk Observability Cloud.
Customer Experience (CX) Metrics
Learn
6 Minute Read

Customer Experience (CX) Metrics

Learn everything you need to know about network architecture and follow the best practices to maintain your architecture’s security.
The Dollars and Sense of Data Strategy: Managing Data, Agility and Value
Leadership
2 Minute Read

The Dollars and Sense of Data Strategy: Managing Data, Agility and Value

Tom Casey explains the way Splunk is revolutionizing how organizations get unified visibility and insights from their data.
What Are Foundation Models in AI?
Learn
3 Minute Read

What Are Foundation Models in AI?

A Foundation Model is a general class of AI models trained on large data assets at scale. See how these models work & how essential they are to achieving AGI.
What Is Network Architecture?
Learn
4 Minute Read

What Is Network Architecture?

Learn everything you need to know about network architecture and follow the best practices to maintain your architecture’s security.
What’s Splunk Doing With AI?
Artificial Intelligence
4 Minute Read

What’s Splunk Doing With AI?

Splunker Jeff Wiedemann answers the question 'What is Splunk doing with AI?'
Splunk SOAR Playbook of the Month: Splunk Attack Analyzer Dynamic Analysis
Security
2 Minute Read

Splunk SOAR Playbook of the Month: Splunk Attack Analyzer Dynamic Analysis

For this Splunk SOAR Playbook of the Month, Splunker Coty Sugg shows how to use one of our out-of-the-box playbooks for faster, simpler, and more effective dynamic analysis.
Threat Hunting in 2025: Must-Have Resources & Tasks for Every Hunter
Security
7 Minute Read

Threat Hunting in 2025: Must-Have Resources & Tasks for Every Hunter

What are the most important things threat hunters do every day? We surveyed professionals and here are the must-have tasks and resources.
Calling CISOs Everywhere: Minimize Breaches by Thinking Like a Hacker and Testing Your Controls
Ciso Circle
1 Minute Read

Calling CISOs Everywhere: Minimize Breaches by Thinking Like a Hacker and Testing Your Controls

Compliance requirements and maturity frameworks are helpful, but pay attention to the real threats in your environment to actually prevent breaches.