false
Splunk Blogs
Leadership
6 Min Read
Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.

Featured Articles

Security

Learn

Latest Articles

Leadership 2 Min Read

The Need for Resilience: 3 Important Reflections from the World Economic Forum in Davos 2023

Davos is usually known for its variety of sports, leisure and cultural activities. Once a year, rather than tourists, this beautiful Swiss community attracts business leaders as well as government officials and policy-makers.
Learn 5 Min Read

Using Splunk for SEO Log File Analysis

This blog post will showcase just a few of the ways we’re using Splunk to improve our own technical SEO.
Learn 7 Min Read

What is DevOps Automation?

Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
Observability 2 Min Read

Observability to Modernize Apps and Increase Business Resilience

With Splunk Observability, your business can deploy applications faster and optimize the customer experience at the speed of modern business.
Splunk Life 2 Min Read

Splunk's Black Employees and Mentors ERG at Brothers Code 2022

When Splunkers have an opportunity to do meaningful work within their communities, they always answer the call.
Industries 4 Min Read

Cyber Resilience Through the Eyes of Our Public Sector Customers

With cyber resilience high on the agenda at GovSummit 2022, Splunk's public sector customers share their cyber resilience experiences and offer feedback on why they use Splunk.
Learn 4 Min Read

CMDBs Explained: Configuration Management Databases

Meant to provide visibility into all IT assets, CMDBs are routinely underutilized. Learn how to plan, implement and maintain a CMDB to maximize business value.
Learn 6 Min Read

What is ETL?

Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
Security 7 Min Read

All the Proxy(Not)Shells

The Splunk Threat Research Team walks through exploitation of ProxyShell and ProxyNotShell using MetaSploit, and hunts through data in Splunk to showcase different avenues for defenders to identify malicious activity.