false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 8 Min Read

Source Code Management: An Introduction

In this blog post, we'll look at how source code management works, what benefits it brings to software development, and which best practices to follow to get the most out of the process.
Learn 9 Min Read

KPI Management: A Complete Introduction

This blog post covers the ins and outs of KPI Management to help you understand good vs bad KPIs and common pitfalls to avoid.
Learn 10 Min Read

The Serverless Functions Beginner's Guide

In this article, we’ll look at how serverless functions work, how they can be used and how they can help your organization.
Learn 8 Min Read

Service Assurance for IT, Telecom, & Cloud

This blog post covers the basics surrounding service assurance as it relates to IT service delivery, cloud, Telecom, & more.
Learn 9 Min Read

IT Operations Analytics: An Introduction

This blog covers the history and current state of IT Operations Analytics (ITOA), a practice used to improve and manage IT systems.
Security 8 Min Read

Machine Learning in Security: Detect DNS Data Exfiltration Using Deep Learning

This blog discusses in detail about detecting DNS data exfiltration attacks using deep learning
Security 12 Min Read

Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting

Windows and endpoints go together like threat hunting and Splunk. Let's look at the most valuable Sysmon event codes for threat hunting in Splunk.
Learn 8 Min Read

Infrastructure Analytics: A Beginner's Guide

This blog post covers all the basics around Infrastructure Analytics for IT, IoT, and more.
Security 7 Min Read

UK TSA Regulations: SOC Teams, Get Ready!

The UK Telecommunications Security Act (TSA) compliance is coming and will be a new challenge for SOC teams. Splunk security evangelist Matthias Maier takes a closer look at requirements and shares an end-to-end use case as an example.