Operations | Monitoring | ITSM | DevOps | Cloud

December 2023

AI Governance in 2024: An Overview

In a world where artificial intelligence (AI) seems is leaping forward and is growing at a CAGR of almost 40%, questions about governance and ethics with the use of AI are surfacing. As humans continue to develop AI systems, it is crucial to establish proper guidelines to ensure powerful technologies like generative AI and adaptive AI are used in a responsible manner.

Monitoring Pi-hole using Pi-hole Exporter and OpenTelemetry: A Comprehensive Guide

Pi-hole is a fantastic open-source DNS-based ad blocker that enhances your online experience by blocking unwanted ads and trackers network-wide. Monitoring the performance and status of your Pi-hole setup is essential to ensure its effectiveness. Next, we'll explore how to use a Prometheus exporter to expose metrics from Pi-hole and have the OpenTelemetry collector scrape the metrics and send them to Splunk Observability Cloud.

How AI Can Catalyze Digital Resilience: An Introduction to Splunk's Philosophy

ChatGPT and other LLMs have become so accessible that even our grandmas know about AI. But what’s really happening beyond the hype? Recently, I sat down with IT and security leaders Cory Minton and Kirsty Paine to share the inside scoop on how we’re thinking about AI here at Splunk. Watch the replay of our conversation here.

Network Latency & How To Improve Latency

Cloud-based services have changed how individuals and businesses get things done. That doesn’t mean it’s all positive — there are some tradeoffs and compromises that come with cloud services and the internet. One major tradeoff is speed. For instance, if your website fails to load within three seconds, 40% of your visitors will abandon your site. That’s a serious dent for anyone doing business online. The culprit here is latency.

Coffee Talk with SURGe: 12-DEC-2023 Kyivstar Cyberattack, Water Utilities Hacked, Log4j Exploited

Grab a cup of coffee and join Mick Baccio, Katie Brown and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Audra and Katie also competed in a charity challenge to share what they consider to be the largest cyber incident of 2023.

Cyber-Physical Systems (CPS) Explained

Cyber-Physical Systems refer to a system that models, automates and controls the mechanism of a physical system in a digital environment. This is an area of significant growth: the global market for Cyber-Physical Systems (CPS) is expected to grow from around $87 billion in 2022 to over $137 billion by the year 2028 at a CAGR of 7.9%. So, what exactly are cyber-physical systems? Let’s take a look.

Observability Engineering: A Beginner's Guide

Traditional monitoring methods become inefficient as organizations shift from legacy software systems to complex cloud-native architectures. This transition renders these methods less effective, as they no longer provide the critical insights needed. In response, observability engineering has emerged as an important discipline, offering a more comprehensive understanding of modern software systems. This article will take you through the definition, importance, and processes of observability engineering.

Fault Tolerance: What It Is & How To Build It

Fault incidents are inevitable. They occur in any large-scale enterprise IT environment, especially when: In fact, research indicates, more than half (50%) the leaders in tech and business organizations consider the complexity of their data architecture a significant pain point. From an end-user perspective, businesses must overcome complex architecture in order to ensure service delivery and continuity.

Take Back Control of Your Workflows, Data, and Costs with Splunk Observability

Engineering and ITOps teams have an important mission: keeping their software and digital systems performing and reliable. But as we’re about to embrace a new year full of changes, industry shifts, and AI developments, this mission is challenged by increasingly complex environments, technology alternatives, and an overwhelming number of tools available. The result? Overages, tool sprawl, and toil, which all lead to longer times to detect and resolve issues.

Future-Proofing Resilience: How Manufacturers Are Navigating Growing Pains of IT/OT Convergence

The manufacturing industry is at a crossroads. With automation and emerging technologies like AI, organizations are eager to make operational and production processes more efficient. However, for many manufacturers, the rapid pace of digitizing legacy infrastructure and systems has also exposed many unanticipated hurdles, with one of the biggest being the convergence between IT and operational technology (OT).

Why Is Log Data So Important In Observability?

Imagine this scenario: your platform appears to have an issue. Maybe it has gone down or maybe it has affected a large volume of users or perhaps just a few of those important ones; either way there is a significant problem with it. Users are complaining and are happy to shout about the platform not working on X (formally Twitter).

User Behavior Monitoring with M-21-31

With M-21-31’s Advanced EL3 requirements now past due, many US Federal Civilian agencies are still looking to close gaps in their Enterprise Logging capabilities. As part of the EL3 requirements, agencies must be finished implementing user behavioral analytics (UBA) that enables: For many organizations that leverage machine learning (ML) to detect anomalous behavior across the network, UBA solutions have become a critical piece of the enterprise security and insider threat puzzle.

2024 Predictions: AI Innovation Meets Digital Resilience

Welcome to the era of AI. It’s the technology advancement that motivates and excites me every day as a CTO. Generative AI is already transforming many areas of our lives, from helping us write emails to assisting us with customer service. What waits for us on the immediate horizon? Today, we released our annual predictions series. Splunk’s 2024 Predictions features three editions: Executive, Security and Observability.

Data Lake vs. Data Warehouse: Comparing Benefits, Use Cases & Differences

There is more data available to us than ever. Storing this data is important — but deciding on the right type of data storage solution is not so clear. This article explores two primary types of big data storage: data lakes and data warehouses. We’ll examine the benefits of each, then discuss the key differences between a data lake and a data warehouse, so you can decide on the best approach for your business.

Conway's Law Explained

Have you ever wondered why some once-prominent companies now find themselves less popular, even overshadowed by smaller competitors? A prime example of this shift is Facebook. Although Facebook was the heartthrob of the 2000s, major issues like internet privacy and possible leaking of user records have made users more suspicious. Only 18% of American Facebook users think the platform protects their data and privacy.

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

In Parsing Domains with URL Toolbox, we detailed how you can pass a fully qualified domain name or URL to URL Toolbox and receive a nicely parsed set of fields that includes the query string, top level domain, subdomains, and more. In this article, we are going to do some nerdy analytic arithmetic on those fields.