Splunk offered Cisco Live attendees a chance to experience the adrenaline rush of racing at the renowned Zandvoort circuit with a thrilling demonstration of our McLaren partnership.
When performing searches, Splunk uses its own language, SPL (Search Processing Language). In this article, we will explain each type of SPL and show you the efficient order in which to run searches and how to use the Search Job Inspector, an investigative tool.
The latest articles from Splunk, straight to your inbox
The Splunk Threat Research Team observed actors performing minimal intrusive operations to avoid detection, with the exception of artifacts created by accounts already compromised.
Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Are you ready to revolutionize your observability game? Mark your calendars for KubeCon + CloudNativeCon Europe 2025, taking place from April 1-4 in Excel Center London. Splunk invites you to visit our booths at N290 & S400 to discover how we're making troubleshooting cool again while helping you shift from reactive to predictive strategies for digital resilience.
Get the full story on SRE metrics, including latency, errors, saturation, and traffic, so you can better assess your system's reliability, performance, and efficiency.
Discover how Splunk’s AI Assistant transforms observability with AI-driven insights. Learn 7 powerful use cases to enhance performance and incident response.
Learn how to enhance PowerShell threat detection in UBA by effectively onboarding Windows events. Our step-by-step guide covers XML event log formats and Splunk integration, ensuring robust security against cyber threats.