/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox
Security
6 Minute Read

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

Got some parsed fields that you're ready to analyze... possibly for threat hunting? We'll use Levenshtein, Shannon & URL Toolbox to show you how!
Parsing Domains with URL Toolbox (Just Like House Slytherin)
Security
3 Minute Read

Parsing Domains with URL Toolbox (Just Like House Slytherin)

One of the most popular Splunk security apps of all time, URL Toolbox’s URL parsing capabilities have been leveraged by thousands. Full story here.
Take a SIP: A Refreshing Look at Subject Interface Packages
Security
10 Minute Read

Take a SIP: A Refreshing Look at Subject Interface Packages

Splunker Michael Haag dives into Subject Interface Packages (SIPs) and their role in Windows security, exploring how SIPs can be exploited by malicious actors to bypass security measures and sign malicious code.
How can Europe’s Public Sector become more digitally resilient?
Leadership
2 Minute Read

How can Europe’s Public Sector become more digitally resilient?

Challenges of a pandemic, conflict and various economic shocks have forced us all to adapt very quickly. Updating our understanding of what digital resilience is, is a critical priority to ensure that the security, reliability and certainty of service delivery is to be preserved.
Metrics to Monitor for AWS (ELB) Elastic Load Balancing
Learn
7 Minute Read

Metrics to Monitor for AWS (ELB) Elastic Load Balancing

In this blog post, we'll take a look at metrics to monitor for AWS Elastic Load Balancing.
Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations
Security
3 Minute Read

Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations

Announcing the release of Splunk SOAR 6.2 with features like logic loops for playbooks, integrations with CyberArk, two new firewall apps, and a new conversion option for classic playbooks.
“Observability” Isn’t Enough To See and Secure Your Systems. Here’s What You Need Instead.
Cio Office
3 Minute Read

“Observability” Isn’t Enough To See and Secure Your Systems. Here’s What You Need Instead.

Exploring and securing the fragmented, federated edges and corners of your corporate network is very much an active undertaking. Here’s why it deserves executive sponsorship, taking the three steps that go beyond passive observability.
What is the Augmented Connected Workforce?
Learn
7 Minute Read

What is the Augmented Connected Workforce?

This article provides an overview of the Augmented Connected Workforce, detailing the use cases of AR and other key technologies, along with the key benefits and challenges associated with this concept.
What Is Data Logging?
Learn
8 Minute Read

What Is Data Logging?

In this blog post, we’ll cover an overview of data logging, including its key components, types, applications, and best practices for success.