/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

How to win* at Fantasy Football with Splunk and Machine Learning [Part 1]
Tips & Tricks
4 Minute Read

How to win* at Fantasy Football with Splunk and Machine Learning [Part 1]

Want to find out how to beat the odds in Fantasy Football and get on top of the scoreboard? Splunker Rupert Truman shares how you can use a data-driven approach with Splunk and machine learning to increase your chances of winning.
Monitor Containerized Deployments on AWS Bottlerocket with Splunk
Observability
4 Minute Read

Monitor Containerized Deployments on AWS Bottlerocket with Splunk

Learn how you can monitor the performance of containerized deployments on AWS Bottlerocket with Splunk.
MLOps - Logs, Metrics and Traces to improve your Machine Learning Systems
Observability
3 Minute Read

MLOps - Logs, Metrics and Traces to improve your Machine Learning Systems

Deployment of machine learning models to production needs monitoring of operations and performance. This is where Machine Learning Operations (MLOps) comes into play. Find out what it is and how it works in this article.
Introducing a New Splunk Add-On for OT Security
Security
2 Minute Read

Introducing a New Splunk Add-On for OT Security

The Splunk Add-on for OT Security expands existing Splunk Enterprise Security frameworks to improve security visibility in OT environments for our customers, partners and community members.
Full Java Observability in 5 Simple Steps
Observability
7 Minute Read

Full Java Observability in 5 Simple Steps

Learn how DevOps and IT teams are creating observable applications and infrastructure in Java environments with just five easy steps.
Splunking Cisco Webex Meetings Data
Observability
4 Minute Read

Splunking Cisco Webex Meetings Data

Check out this detailed walkthrough of Cisco Webex Meetings Add-on for Splunk.
Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials
Security
7 Minute Read

Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials

In this blog, the Splunk threat research team shows how to detect suspicious activity and possible abuse of AWS Permanent and Temporary credentials.
Social Good with Data: Splunk for Splunkterns
Splunk Life
3 Minute Read

Social Good with Data: Splunk for Splunkterns

This summer, University Recruiting teamed up with Splunk for Good and the Splunk Education Team to host the annual Splunk for Splunkterns competition, using Splunk and data for social good.
CI/CD Detection Engineering: Splunk's Attack Range, Part 2
Security
7 Minute Read

CI/CD Detection Engineering: Splunk's Attack Range, Part 2

In part 2 of our 3-part series, we walk you through how to use Splunk Security-Content, Attack Range and CircleCI to do detection development, continuous testing and deployment as a workflow in your SOC.