false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 7 Min Read

What is Fraud Detection and Prevention?

In this comprehensive guide, we will explore fraud detection and prevention strategies that can help mitigate the risks associated with fraudulent activities.
Security 3 Min Read

Staff Picks for Splunk Security Reading November 2023

Splunk security experts share their list of presentations, whitepapers, and customer case studies from November 2023 that they feel are worth a read.
Learn 8 Min Read

What Is Data Logging?

In this blog post, we’ll cover an overview of data logging, including its key components, types, applications, and best practices for success.
Learn 16 Min Read

Splunk Cheat Sheet: Query, SPL, RegEx, & Commands

In this blog post we'll cover the basics Queries, Commands, RegEx, SPL, and more for using Splunk Cloud and Splunk Enterprise
CIO Office 3 Min Read

“Observability” Isn’t Enough To See and Secure Your Systems. Here’s What You Need Instead.

Exploring and securing the fragmented, federated edges and corners of your corporate network is very much an active undertaking. Here’s why it deserves executive sponsorship, taking the three steps that go beyond passive observability.
Security 5 Min Read

Using eval to Calculate, Appraise, Classify, Estimate & Threat Hunt

This article discusses a foundational capability within Splunk — the eval command. Need to pick a couple commands for your desert island collection? eval should be one!
Leadership 3 Min Read

Career Resilience and Splunk: Insights from the 2023 Splunk Career Impact Survey

Splunker Eric Fusilero shares the findings and insights from the 2023 Splunk Career Impact Survey.
Learn 5 Min Read

SysAdmins: System Administrator Role, Responsibilities & Salary

System administrators (aka sysadmins) maintain the networks, servers and technology that support your entire business. Read on to understand this vital role.
Learn 4 Min Read

Multi-Stage Attacks & How To Detect Them

Today's cyberattacks are sophisticated: there are multiple steps to take in order to have a huge impact. Get ahead of each step with this primer on detecting multistage attacks.