Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Observability 2 Min Read

AWS Distro for OpenTelemetry — Now with Splunk Observability Support!

Today, we are excited to announce the release of the AWS Distro for OpenTelemetry with full Splunk Observability support! The AWS Distro for OpenTelemetry allows customers to capture metadata from AWS resources and managed services to correlate application performance data with underlying infrastructure data.
Security 1 Min Read

Next Level Automation: What’s New with Splunk Phantom

With the release of Splunk Phantom 4.10.1, we now allow you to configure the number of playbook runners using Python 2 and Python 3. Learn more right here.
Security 4 Min Read

Visual Link Analysis with Splunk: Part 2 - The Visual Part

Using Splunk for link analysis - part 2 covering visualizations of linked data.
Platform 3 Min Read

Making Smarter Predictions in ITSI

As we are trying to commoditize machine learning through our MLTK smart workflows, this article outlines another example of an MLTK smart workflow, designed to help improve the usability of the predictive capabilities in ITSI.
Platform 4 Min Read

Detecting Credit Card Fraud Using SMLE

In this blog post, we’ll explore an ML-powered solution using the Splunk Machine Learning Environment to detect fraudulent credit card transactions in real time. Using out-of-the-box Splunk capabilities, we’ll walk you through how to ingest and transform log data, train a predictive model using open source algorithms, and predict fraud in real-time against transaction events.
Observability 3 Min Read

Observability with CI/CD in a Developer World

You need to monitor your apps and deploys equally. The Splunk Observability portfolio is the perfect complement to a CI/CD approach, from a developer laptop to an integration test environment.
Security 3 Min Read

Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall

The scale of cyber attacks and the complexity of networks exacerbate the situation. Operators face three significant challenges: an IT security ecosystem that is fragmented and in flux, users that are both human and machine, and multiple threats with varying levels of severity and sophistication.
Observability 3 Min Read

A New Fast Lane to Value: Introducing Splunk’s IT Essentials Learn and Work Apps

Read all about our two new free new apps — IT Essentials Learn and IT Essentials Work — to help guide you on your journey towards IT maturity.
Security 3 Min Read

Detecting the Sudo Baron Samedit Vulnerability and Attack

Looking for ways to detect and protect against the SUDO Baron Samedit vulnerability (CVE-2021-3156)? Look no further. In this blog we tell you how to proactively detect vulnerable servers using Splunk and also to detect malicious folks who are attempting to exploit this vulnerability for nefarious outcomes!