/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Cisco AppDynamics reimagines agent lifecycle management with Smart Agent
Observability
7 Minute Read

Cisco AppDynamics reimagines agent lifecycle management with Smart Agent

Cisco Full-Stack Observability and Cisco AppDynamics are simplifying agent lifecycle management by centralizing control through UI and leveraging the Smart Agent to save you time and effort.
How to Customise Detectors for Even Better Alerting
Observability
7 Minute Read

How to Customise Detectors for Even Better Alerting

Discover how to create a Custom Detector and explore first-hand how the right customizations can turn an alert storm into meaningful insights with Splunk Observability Cloud.
Building the NextGen Factory with Splunk and Bosch Rexroth
Industries
4 Minute Read

Building the NextGen Factory with Splunk and Bosch Rexroth

For centuries there have been many wise sayings on how to deal with disruptions and prevail amidst uncertain circumstances. Read on to learn how Splunk and Bosch Rexroth are building the next-generation factory to help manufacturers elevate their resilience and take advantage of new market trends and operating models.
Scale Your Splunk Cloud Operations With The Splunk Content Manager App
Tips & Tricks
5 Minute Read

Scale Your Splunk Cloud Operations With The Splunk Content Manager App

To address the absence of a solution that simplifies the administration of Splunk instances and aligns with Splunk's ultimate goal of focusing on generating value from data, we created the App Content Manager for Splunk.
How to Create Great Alerts
Observability
5 Minute Read

How to Create Great Alerts

Splunker Koray Harman highlights alerting scenarios to avoid and explores some of the ways to create and customize alerts in Splunk Observability Cloud to go from noise to action and improve your MTTx.
Hypothesis-Driven Cryptominer Hunting with PEAK
Security
11 Minute Read

Hypothesis-Driven Cryptominer Hunting with PEAK

A sample hypothesis-driven hunt, using SURGe's PEAK threat hunting framework, looking for unauthorized cryptominers.
How Zero-Touch Operations Went From Pipe Dream to Real Possibility (and What’s Next)
Industry Insights
3 Minute Read

How Zero-Touch Operations Went From Pipe Dream to Real Possibility (and What’s Next)

For communications and media organizations, zero-touch operations may be the key to amplifying speed while also lowering costs. Here’s how it could look.
AI at Splunk: Trustworthy Principles for Digital Resilience
Artificial Intelligence
4 Minute Read

AI at Splunk: Trustworthy Principles for Digital Resilience

Building AI responsibly is one thing, but embedding trust into every aspect of our AI strategy is another entirely – and that’s what Splunk sets out to do. Kriss Deiglmeier and Hao Yang explain more in this blog.
Defining & Improving Your Security Posture
Learn
7 Minute Read

Defining & Improving Your Security Posture

What is your security posture? The result of all your security strategies, processes and practices. Get the total low-down on evaluating & improving yours.