www.splunk.com Open in urlscan Pro
23.213.161.197  Public Scan

Submitted URL: https://splunk.cn.com/
Effective URL: https://www.splunk.com/en_us/blog?301=/blog/
Submission: On August 03 via api from US — Scanned from NL

Form analysis 3 forms found in the DOM

<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-0-label" __bizdiag="0" __biza="WJ__">
  <div class="sui-search-box">
    <div id="sui-search-box__input-wrapper" class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-0-label" autocomplete="off" id="downshift-0-input" data-transaction-name="search input"
        placeholder="What do you want to find?" class="sui-search-box__text-input " value=""></div>
    <div class="sui-search-button__container"><button data-transaction-name="search submit" type="submit" value="Search" class="button sui-search-box__submit" disabled=""><svg width="12" height="13" viewBox="0 0 12 13" fill="none"
          xmlns="http://www.w3.org/2000/svg" style="fill: rgb(255, 255, 255); height: 17px; width: 17px;">
          <path fill-rule="evenodd" clip-rule="evenodd"
            d="M8.0339 9.47565C7.19251 10.1189 6.14088 10.501 5 10.501C2.23858 10.501 0 8.2624 0 5.50098C0 2.73955 2.23858 0.500977 5 0.500977C7.76142 0.500977 10 2.73955 10 5.50098C10 6.64081 9.61859 7.69156 8.97644 8.53257L11.8052 11.3613C12.0655 11.6217 12.0655 12.0438 11.8052 12.3041C11.5448 12.5645 11.1227 12.5645 10.8624 12.3041L8.0339 9.47565ZM8.66667 5.50098C8.66667 7.52602 7.02504 9.16764 5 9.16764C2.97496 9.16764 1.33333 7.52602 1.33333 5.50098C1.33333 3.47593 2.97496 1.83431 5 1.83431C7.02504 1.83431 8.66667 3.47593 8.66667 5.50098Z">
          </path>
        </svg>
        <p class="sui-search-button__label">Search</p>
      </button></div>
  </div>
</form>

<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-1-label" __bizdiag="0" __biza="WJ__">
  <div class="sui-search-box">
    <div id="sui-search-box__input-wrapper" class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-1-label" autocomplete="off" id="downshift-1-input" data-transaction-name="search input"
        placeholder="What do you want to find?" class="sui-search-box__text-input " value=""></div>
    <div class="sui-search-button__container"><button data-transaction-name="search submit" type="submit" value="Search" class="button sui-search-box__submit" disabled=""><svg width="12" height="13" viewBox="0 0 12 13" fill="none"
          xmlns="http://www.w3.org/2000/svg" style="fill: rgb(255, 255, 255); height: 17px; width: 17px;">
          <path fill-rule="evenodd" clip-rule="evenodd"
            d="M8.0339 9.47565C7.19251 10.1189 6.14088 10.501 5 10.501C2.23858 10.501 0 8.2624 0 5.50098C0 2.73955 2.23858 0.500977 5 0.500977C7.76142 0.500977 10 2.73955 10 5.50098C10 6.64081 9.61859 7.69156 8.97644 8.53257L11.8052 11.3613C12.0655 11.6217 12.0655 12.0438 11.8052 12.3041C11.5448 12.5645 11.1227 12.5645 10.8624 12.3041L8.0339 9.47565ZM8.66667 5.50098C8.66667 7.52602 7.02504 9.16764 5 9.16764C2.97496 9.16764 1.33333 7.52602 1.33333 5.50098C1.33333 3.47593 2.97496 1.83431 5 1.83431C7.02504 1.83431 8.66667 3.47593 8.66667 5.50098Z">
          </path>
        </svg>
        <p class="sui-search-button__label">Search</p>
      </button></div>
  </div>
</form>

<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-2-label" __bizdiag="0" __biza="WJ__">
  <div class="sui-search-box">
    <div id="sui-search-box__input-wrapper" class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-2-label" autocomplete="off" id="downshift-2-input" data-transaction-name="search input"
        placeholder="What do you want to find?" class="sui-search-box__text-input " value=""></div>
    <div class="sui-search-button__container"><button data-transaction-name="search submit" type="submit" value="Search" class="button sui-search-box__submit" disabled=""><svg width="12" height="13" viewBox="0 0 12 13" fill="none"
          xmlns="http://www.w3.org/2000/svg" style="fill: rgb(255, 255, 255); height: 17px; width: 17px;">
          <path fill-rule="evenodd" clip-rule="evenodd"
            d="M8.0339 9.47565C7.19251 10.1189 6.14088 10.501 5 10.501C2.23858 10.501 0 8.2624 0 5.50098C0 2.73955 2.23858 0.500977 5 0.500977C7.76142 0.500977 10 2.73955 10 5.50098C10 6.64081 9.61859 7.69156 8.97644 8.53257L11.8052 11.3613C12.0655 11.6217 12.0655 12.0438 11.8052 12.3041C11.5448 12.5645 11.1227 12.5645 10.8624 12.3041L8.0339 9.47565ZM8.66667 5.50098C8.66667 7.52602 7.02504 9.16764 5 9.16764C2.97496 9.16764 1.33333 7.52602 1.33333 5.50098C1.33333 3.47593 2.97496 1.83431 5 1.83431C7.02504 1.83431 8.66667 3.47593 8.66667 5.50098Z">
          </path>
        </svg>
        <p class="sui-search-button__label">Search</p>
      </button></div>
  </div>
</form>

Text Content

Skip to main content
false
logo
   
 * Support
    * Support Portal
    * Splunk Answers
    * Support Programs
    * System Status
    * Contact Us
    * Product Security Updates
    * Cisco Support

 * Languages
   * Deutsch
   * Francais
   * 日本語
   * 한국어
   * 中文
   * 繁體中文
 * 
   Click User Account
   * Log In
   * Sign Up
   
 * 

logo
   
 * Products
   Product Overview
   Get visibility and insights across your whole organization, powering actions
   that improve security, reliability and innovation velocity.
   More from Splunk
   
    * Pricing
    * Free Trials & Downloads
    * Product Tours
   
   Security
    * Splunk Enterprise Security
    * Splunk Asset & Risk Intelligence
    * Splunk SOAR
    * Splunk Attack Analyzer
    * Splunk User Behavior Analytics
   
   Observability
    * Splunk Observability Cloud
    * Splunk IT Service Intelligence
   
   Platform
    * Splunk Cloud Platform
    * Splunk Enterprise
    * Splunk AI Assistant for SPL
   
   View All Products
   
   
   
 * Solutions
   SOC of the Future
   Strengthen your cyber defense with integrations and an open ecosystem.
   Build a Leading Observability Practice
   Maintain performance and reliability with unified visibility and
   lightning-fast troubleshooting.
   Build on a Solid Foundation
   Power unified security, full-stack observability and custom apps on the same
   platform.
   by Use Case
   
    * Advanced Threat Detection
    * Artificial Intelligence
    * Automation & Orchestration
    * Extend Visibility to the Cloud
    * Isolate Cloud Native Problems
    * IT Modernization
   
   BY TECHNOLOGY
   
    * AWS
    * Azure
    * GCP
    * Kubernetes
    * OpenTelemetry
    * SAP
   
   BY INDUSTRY
   
    * Communications & Media
    * Financial Services
    * Manufacturing
    * Public Sector
    * Retail
    * Technology
   
   View All Solutions
   
   
   
 * Why Splunk?
   What Makes Splunk Different
   The world’s leading organizations trust Splunk to help keep their digital
   systems secure and reliable.
   How Splunk Compares
   Discover how Splunk’s Unified Security and Observability Platform improves
   your digital resilience.
   Business Initiatives
   
    * Digital Resilience
    * Artificial Intelligence
    * Tool Consolidation
    * Cloud Transformation
    * Digital Customer Experience
   
   Better Together
   
    * Customer Stories
    * Partners
    * Customer Success
    * Cisco + Splunk

   
 * Resources
   Resources
   Explore e-books, white papers and more.
   Events
   Join us at an event near you.
   Blogs
   See what Splunk is doing.
   GET STARTED
   
    * Splunk Lantern
      Splunk experts provide clear and actionable guidance.
    * Customer Success
      Customer success starts with data success.
    * Splunk Cloud Platform Migration
      Plan your migration with helpful Splunk resources.
    * Get Started With Splunk
      Learn how to use Splunk.
   
   become an expert
   
    * Splunk Training & Certification
      Become a certified Splunk Expert.
    * Documentation
      Find answers about how to use Splunk.
    * User Groups
      Meet Splunk enthusiasts in your area.
    * Community
      Share knowledge and inspiration.
    * SURGe
      Access timely security research and guidance.
   
   Expand & optimize
   
    * Customer Support
      It’s easy to get the help you need.
    * Splunkbase
      See Splunk’s 1,000+ Apps and Add-ons.
    * Splunk Dev
      Create your own Splunk Apps.
    * Splunk Services
      Maximize your Splunk investment.
    * .conf24
      Attend Splunk's largest learning event of the year.

   
 * Company
   About Splunk
   Our purpose is to build a safer and more resilient digital world. Every day,
   we live this purpose by helping security, IT and DevOps teams keep their
   organizations securely up and running. 
   Overview
   
    * About Splunk
    * .conf24
    * Global Impact
    * Diversity, Equity, Inclusion & Belonging
    * Perspectives by Splunk
    * Contact us
   
   Work With us
   
    * Careers
    * Become a Partner
    * Splunk Ventures
   
   Press
   
    * Newsroom
    * Awards & Recognition

   
 * Support
    * Support Portal
    * Splunk Answers
    * Support Programs
    * System Status
    * Contact Us
    * Product Security Updates
    * Cisco Support

 * Click Search
   
   Search

 * Languages
   * Deutsch
   * Francais
   * 日本語
   * 한국어
   * 中文
   * 繁體中文
 * 
   Click User Account
   * Log In
   * Sign Up
 * Free Splunk

 * Click Search
   
   Search

 * Free Splunk

logo
Free Splunk

Products
Solutions
Why Splunk?
Resources
Company
Support
Account
Log In
|
Sign Up
 * Deutsch
 * Francais
 * 日本語
 * 한국어
 * 中文
 * 繁體中文

Search

Products
Solutions
Why Splunk?
Resources
Company
Support
Product Overview
Get visibility and insights across your whole organization, powering actions
that improve security, reliability and innovation velocity.
Security
Splunk Enterprise Security
Splunk Asset & Risk Intelligence
Splunk SOAR
Splunk Attack Analyzer
Splunk User Behavior Analytics
Observability
Splunk Observability Cloud
Splunk IT Service Intelligence
Platform
Splunk Cloud Platform
Splunk Enterprise
Splunk AI Assistant for SPL
View All Products


More from Splunk

Pricing
Free Trials & Downloads
Product Tours
SOC of the Future
Strengthen your cyber defense with integrations and an open ecosystem.
Build a Leading Observability Practice
Maintain performance and reliability with unified visibility and lightning-fast
troubleshooting.
Build on a Solid Foundation
Power unified security, full-stack observability and custom apps on the same
platform.
by Use Case

Advanced Threat Detection
Artificial Intelligence
Automation & Orchestration
Extend Visibility to the Cloud
Isolate Cloud Native Problems
IT Modernization
BY TECHNOLOGY

AWS
Azure
GCP
Kubernetes
OpenTelemetry
SAP
BY INDUSTRY

Communications & Media
Financial Services
Manufacturing
Public Sector
Retail
Technology
View All Solutions


What Makes Splunk Different
The world’s leading organizations trust Splunk to help keep their digital
systems secure and reliable.
How Splunk Compares
Discover how Splunk’s Unified Security and Observability Platform improves your
digital resilience.
Business Initiatives

Digital Resilience
Artificial Intelligence
Tool Consolidation
Cloud Transformation
Digital Customer Experience
Better Together

Customer Stories
Partners
Customer Success
Cisco + Splunk
Resources
Explore e-books, white papers and more.
Events
Join us at an event near you.
Blogs
See what Splunk is doing.
GET STARTED

Splunk Lantern
Splunk experts provide clear and actionable guidance.
Customer Success
Customer success starts with data success.
Splunk Cloud Platform Migration
Plan your migration with helpful Splunk resources.
Get Started With Splunk
Learn how to use Splunk.
become an expert

Splunk Training & Certification
Become a certified Splunk Expert.
Documentation
Find answers about how to use Splunk.
User Groups
Meet Splunk enthusiasts in your area.
Community
Share knowledge and inspiration.
SURGe
Access timely security research and guidance.
Expand & optimize

Customer Support
It’s easy to get the help you need.
Splunkbase
See Splunk’s 1,000+ Apps and Add-ons.
Splunk Dev
Create your own Splunk Apps.
Splunk Services
Maximize your Splunk investment.
.conf24
Attend Splunk's largest learning event of the year.
About Splunk
Our purpose is to build a safer and more resilient digital world. Every day, we
live this purpose by helping security, IT and DevOps teams keep their
organizations securely up and running. 
Overview

About Splunk
.conf24
Global Impact
Diversity, Equity, Inclusion & Belonging
Perspectives by Splunk
Contact us
Work With us

Careers
Become a Partner
Splunk Ventures
Press

Newsroom
Awards & Recognition
Support Portal
Splunk Answers
Support Programs
System Status
Contact Us
Product Security Updates
Cisco Support
Log In
Sign Up







--------------------------------------------------------------------------------

Splunk Blogs
Splunk Blogs
Splunk Blogs
 * Security
 * DevOps
 * Artificial Intelligence
 * Platform
 * Leadership
 * Partners
 * .conf
 * Splunk Life
 * More More
    * Customers
    * Industries
    * IT
    * Global Impact
    * Learn
    * Tips & Tricks
    * Subscribe to Splunk Blogs
    * Blog Authors
    * Blogs Sitemap

 * More
   

Leadership
6 min read


A NEW DAY FOR DATA: CISCO AND SPLUNK

Splunk is now officially part of Cisco, bringing the full power of the network
together with market-leading security and observability solutions.



FEATURED ARTICLES

Artificial Intelligence 12 Min Read


BUILDING AN AI ASSISTANT IN SPLUNK OBSERVABILITY CLOUD

Interact with observability data and compose workflows using natural language in
Splunk Observability Cloud with AI Assistant.
Splunk Life 2 Min Read


JUNE 2024 LIVING OUR VALUES AWARD WINNERS

Congratulations to the Splunkers who embody our core values of innovative,
passionate, disruptive, open, and fun!
DevOps 7 Min Read


HARNESSING THE POWER OF SPLUNK APM BUSINESS WORKFLOWS IN IT SERVICE INTELLIGENCE

The latest release of the Splunk ITSI Content Pack for Splunk Observability
Cloud now enables the automatic creation of ITSI services using service
topologies from Splunk APM Business Workflows.
Security 3 Min Read


SPLUNK AT BLACK HAT 2024: STRATEGIC TRANSFORMATIONS TO POWER THE SOC OF THE
FUTURE

At Black Hat 2024, Splunk will demonstrate how we’re empowering security teams
to embrace strategic transformations and navigate the complex threat landscape.
Security 4 Min Read


SPLUNK SECURITY CONTENT FOR IMPACT ASSESSMENT OF CROWDSTRIKE WINDOWS OUTAGE

This blog is intended to help existing Splunk customers who are also customers
of CrowdStrike gain visibility into how the CrowdStrike outage may be impacting
their organizations.
Industries 5 Min Read


IT WORKFORCE CHALLENGES ARE HINDERING FEDERAL PROGRESS – AI CAN HELP

Federal agencies are adopting a more modern, digital-centered approach in
everything they do and exposing critical problems in the modernization journey.
Artificial Intelligence 12 Min Read


BUILDING AN AI ASSISTANT IN SPLUNK OBSERVABILITY CLOUD

Interact with observability data and compose workflows using natural language in
Splunk Observability Cloud with AI Assistant.
Splunk Life 2 Min Read


JUNE 2024 LIVING OUR VALUES AWARD WINNERS

Congratulations to the Splunkers who embody our core values of innovative,
passionate, disruptive, open, and fun!
DevOps 7 Min Read


HARNESSING THE POWER OF SPLUNK APM BUSINESS WORKFLOWS IN IT SERVICE INTELLIGENCE

The latest release of the Splunk ITSI Content Pack for Splunk Observability
Cloud now enables the automatic creation of ITSI services using service
topologies from Splunk APM Business Workflows.
Security 3 Min Read


SPLUNK AT BLACK HAT 2024: STRATEGIC TRANSFORMATIONS TO POWER THE SOC OF THE
FUTURE

At Black Hat 2024, Splunk will demonstrate how we’re empowering security teams
to embrace strategic transformations and navigate the complex threat landscape.
Security 4 Min Read


SPLUNK SECURITY CONTENT FOR IMPACT ASSESSMENT OF CROWDSTRIKE WINDOWS OUTAGE

This blog is intended to help existing Splunk customers who are also customers
of CrowdStrike gain visibility into how the CrowdStrike outage may be impacting
their organizations.
Industries 5 Min Read


IT WORKFORCE CHALLENGES ARE HINDERING FEDERAL PROGRESS – AI CAN HELP

Federal agencies are adopting a more modern, digital-centered approach in
everything they do and exposing critical problems in the modernization journey.
Artificial Intelligence 12 Min Read


BUILDING AN AI ASSISTANT IN SPLUNK OBSERVABILITY CLOUD

Interact with observability data and compose workflows using natural language in
Splunk Observability Cloud with AI Assistant.
Splunk Life 2 Min Read


JUNE 2024 LIVING OUR VALUES AWARD WINNERS

Congratulations to the Splunkers who embody our core values of innovative,
passionate, disruptive, open, and fun!
DevOps 7 Min Read


HARNESSING THE POWER OF SPLUNK APM BUSINESS WORKFLOWS IN IT SERVICE INTELLIGENCE

The latest release of the Splunk ITSI Content Pack for Splunk Observability
Cloud now enables the automatic creation of ITSI services using service
topologies from Splunk APM Business Workflows.

The latest articles from Splunk, straight to your inbox

Subscribe to Splunk Blogs


.CONF24

.conf & .conf Go
3 min read


CISCO AND SPLUNK BRING FULL-STACK OBSERVABILITY TO THE ENTIRE ENTERPRISE

Splunk has teamed up with Cisco to deliver engineers and ITOps teams with an
improved leading observability experience.

Artificial Intelligence 1 Min Read


ACCELERATE DIGITAL RESILIENCE WITH SPLUNK AI ASSISTANT FOR SPL

Splunk is proud to launch and make generally available globally, our generative
AI powered Splunk AI Assistant for SPL.
.conf & .conf Go 4 Min Read


FAST TRACK TO DIGITAL RESILIENCE: SPLUNK PLATFORM INNOVATION

Announcing Splunk Enterprise 9.3 and the latest Splunk Cloud Platform release,
giving you all the tools you need to drive digital resilience.
.conf & .conf Go 3 Min Read


NEW SPLUNK INNOVATIONS HELP BUILD A LEADING OBSERVABILITY PRACTICE FOR THE WHOLE
ENTERPRISE

The latest and greatest from Splunk Observability to help keep your entire stack
up and running, no matter where it’s deployed or who’s troubleshooting.
.conf & .conf Go 4 Min Read


INTRODUCING THE SIEM OF THE FUTURE: SPLUNK® ENTERPRISE SECURITY 8.0

Introducing the SIEM of the future, Splunk® Enterprise Security 8.0 – available
now in a private preview to revolutionize the SOC workflow experience.


LEARN

Learn 2 Min Read


INCIDENT SEVERITY LEVELS 1-5 EXPLAINED

Incident severity levels indicate how an incident impacts your customers, so you
can prioritize and respond appropriately. Learn how to define and use them.
Learn 4 Min Read


DENIAL-OF-SERVICE ATTACKS: HISTORY, TECHNIQUES & PREVENTION

DoS attacks have a long history, but they’re also predicted to get worse in
2023. Find out the many ways they work and learn to prevent them in the first
place.
Learn 6 Min Read


SHADOW IT & HOW TO MANAGE IT TODAY

Shadow IT exists for a few reasons: is one side more right? Is there a middle
ground? Get the full story from IT expert Joseph Nduhiu in this article.
Learn 5 Min Read


SITE RELIABILITY ENGINEER: RESPONSIBILITIES, ROLES AND SALARIES

Discover the importance of the site reliability engineer role. Learn about the
responsibilities, skills, and salaries of site reliability engineers.
Learn 4 Min Read


WHAT ARE SAAS, PAAS, & IAAS?

Yes, the cloud makes work better. But which cloud model is right for you?
Understand how SaaS, PaaS, and IaaS works in this ultimate guide.
Learn 6 Min Read


VULNERABILITIES, THREATS & RISK EXPLAINED

Vulnerability, threat, risk: These terms are frequently used together, but they
do explain three separate components of cybersecurity?
Learn 9 Min Read


CYBER KILL CHAINS EXPLAINED: PHASES, PROS/CONS & SECURITY TACTICS

A cyber kill chain framework can help organizations to better understand and
combat attacks. Learn about the evolution and applications of the cyber kill
chain.
Learn 5 Min Read


WHAT IS THREAT HUNTING? A CYBERSECURITY STRATEGY

Threat hunting is a proactive approach that harnesses human intuition and
creativity to identify and counter security incidents that may otherwise go
undetected.
Learn 8 Min Read


SRE METRICS: FOUR GOLDEN SIGNALS OF MONITORING

Learn about the critical SRE metrics and how the four golden signals define what
it means for a system to be “healthy” in this blog post.
Learn 2 Min Read


INCIDENT SEVERITY LEVELS 1-5 EXPLAINED

Incident severity levels indicate how an incident impacts your customers, so you
can prioritize and respond appropriately. Learn how to define and use them.
Learn 4 Min Read


DENIAL-OF-SERVICE ATTACKS: HISTORY, TECHNIQUES & PREVENTION

DoS attacks have a long history, but they’re also predicted to get worse in
2023. Find out the many ways they work and learn to prevent them in the first
place.
Learn 6 Min Read


SHADOW IT & HOW TO MANAGE IT TODAY

Shadow IT exists for a few reasons: is one side more right? Is there a middle
ground? Get the full story from IT expert Joseph Nduhiu in this article.
Learn 5 Min Read


SITE RELIABILITY ENGINEER: RESPONSIBILITIES, ROLES AND SALARIES

Discover the importance of the site reliability engineer role. Learn about the
responsibilities, skills, and salaries of site reliability engineers.
Learn 4 Min Read


WHAT ARE SAAS, PAAS, & IAAS?

Yes, the cloud makes work better. But which cloud model is right for you?
Understand how SaaS, PaaS, and IaaS works in this ultimate guide.
Learn 6 Min Read


VULNERABILITIES, THREATS & RISK EXPLAINED

Vulnerability, threat, risk: These terms are frequently used together, but they
do explain three separate components of cybersecurity?
Learn 9 Min Read


CYBER KILL CHAINS EXPLAINED: PHASES, PROS/CONS & SECURITY TACTICS

A cyber kill chain framework can help organizations to better understand and
combat attacks. Learn about the evolution and applications of the cyber kill
chain.
Learn 5 Min Read


WHAT IS THREAT HUNTING? A CYBERSECURITY STRATEGY

Threat hunting is a proactive approach that harnesses human intuition and
creativity to identify and counter security incidents that may otherwise go
undetected.
Learn 8 Min Read


SRE METRICS: FOUR GOLDEN SIGNALS OF MONITORING

Learn about the critical SRE metrics and how the four golden signals define what
it means for a system to be “healthy” in this blog post.
Learn 2 Min Read


INCIDENT SEVERITY LEVELS 1-5 EXPLAINED

Incident severity levels indicate how an incident impacts your customers, so you
can prioritize and respond appropriately. Learn how to define and use them.
Learn 4 Min Read


DENIAL-OF-SERVICE ATTACKS: HISTORY, TECHNIQUES & PREVENTION

DoS attacks have a long history, but they’re also predicted to get worse in
2023. Find out the many ways they work and learn to prevent them in the first
place.
Learn 6 Min Read


SHADOW IT & HOW TO MANAGE IT TODAY

Shadow IT exists for a few reasons: is one side more right? Is there a middle
ground? Get the full story from IT expert Joseph Nduhiu in this article.


LATEST ARTICLES

Security 6 Min Read


EMBRACING OBSERVABILITY TOOLS TO EMPOWER SECURITY INCIDENT RESPONSE

Bridge the gap between development and security with OpenTelemetry and
observability tools.
Security 3 Min Read


DRIVING VSOC DETECTION WITH MACHINE LEARNING

In this blog, Splunker Jim Goodrich takes a deep dive into an API security use
case, using machine learning to detect API anomalies, and more.
Learn 5 Min Read


REMOTE CODE EXECUTION (RCE) EXPLAINED IN DETAIL

Remote code execution (RCE) attacks are a significant threat to organizations.
Let's discuss more about RCE in this post.
Platform 3 Min Read


INTRODUCING SPLUNK CLOUD APP EXPORT

Splunker Spencer Baker introduces Splunk Cloud App Export, a game-changer for
cloud admins and app developers.
Learn 2 Min Read


ITOM VS. ITSM: IT OPERATIONS MANAGEMENT & IT SERVICE MANAGEMENT

ITOM and ITSM both help your IT teams to better manage and deliver IT services
to the business. What’s the difference? Get the full story here.
Security 4 Min Read


STAFF PICKS FOR SPLUNK SECURITY READING JULY 2024

Welcome to the Splunk staff picks blog, featuring a curated list of
presentations, whitepapers, and customer case studies that our Splunk security
experts feel are worth a read.
Learn 6 Min Read


STRUCTURED, UNSTRUCTURED & SEMI-STRUCTURED DATA

An effective data management strategy is focused on the security, and
transparency of structured, unstructured, and semi-structured data.
Learn 6 Min Read


VULNERABILITIES, THREATS & RISK EXPLAINED

Vulnerability, threat, risk: These terms are frequently used together, but they
do explain three separate components of cybersecurity?
Tips & Tricks 4 Min Read


CONVERT SCHEDULED DASHBOARDS TO DASHBOARD STUDIO IN SPLUNK ENTERPRISE 9.3

Quickly and easily convert your scheduled Classic dashboards to Dashboard Studio
for a superior export experience.
 * 1
 * 2
 * 3
 * ...
 * 374
 * Next

 * 1
 * ...
 * 374
 * Next


SUBSCRIBE TO OUR BLOG

Get the latest articles from Splunk straight to your inbox.

Sign Up Now


CONNECT WITH SPLUNK ON X

Follow @Splunk
x
Model content data


CONNECT WITH SPLUNK ON INSTAGRAM

Follow @Splunk
x
Model content data
COMPANY
COMPANY
 * About Splunk
 * Careers
 * Global Impact
 * How Splunk Compares
 * Leadership
 * Newsroom
 * Partners
 * Perspectives by Splunk
 * Splunk Policy Positions
 * Splunk Protects
 * Splunk Ventures
 * Supplier Central
 * Why Splunk?

PRODUCTS
PRODUCTS
 * Free Trials & Downloads
 * Pricing
 * View All Products

SPLUNK SITES
SPLUNK SITES
 * .conf
 * Documentation
 * Investor Relations
 * Training & Certification
 * T-Shirt Store
 * Videos
 * View All Resources

LEARN
LEARN
 * What is SIEM?
 * An Introduction to Observability
 * Cyber Threat Intelligence (CTI): An Introduction
 * The OSI Model in 7 Layers
 * Telemetry 101: An Introduction
 * What is Site Reliability Engineering?
 * DORA Metrics: The Complete Guide
 * Network Monitoring: How It Works
 * InfoSec: An Introduction to Information Security
 * Network Security: A Complete Introduction
 * Root Cause Analysis: A Beginner's Guide to RCA

CONTACT SPLUNK
CONTACT SPLUNK
 * Contact Sales
 * Contact Support

USER REVIEWS
USER REVIEWS
 * Gartner Peer Insights™
 * PeerSpot
 * TrustRadius

SPLUNK MOBILE




Splunk Global Footer Logo
 * Twitter
 * Facebook
 * Linked In
 * Youtube
 * Instagram

Legal
Patents
Privacy
Sitemap
Website Terms of Use

© 2005 - 2024 Splunk Inc. All rights reserved.

×




THIS WEBSITE USES COOKIES

We use our own and third-party cookies to provide you with a great online
experience. We also use these cookies to improve our products and services,
support our marketing campaigns, and advertise to you on our website and other
websites. Some cookies may continue to collect information after you have left
our website. Learn more here ›
Cookies Settings › Accept Cookies