Operations | Monitoring | ITSM | DevOps | Cloud

Self-Service Analytics for the Shop Floor [Part I] - Splunk Core Concepts

Despite the hype around predictive maintenance, basic data collection and analysis are still high priorities for manufacturing companies and key criteria for the success of Industrial Internet of Things (IIoT) projects. It is crucial that people who are most familiar with industrial assets, like process or control engineers, have direct access to industrial data. That way inadequate situations such as breakdowns can be resolved quickly.

Splunk and the WEF - Working together to unlock UK public sector AI

As I have mentioned in previous blogs use of AI can be challenging, but it can also deliver a lot of positive outcomes. Many of our customers believe that they have a skills and understanding gap when it comes to AI, which is why we are delighted to have been working with the World Economic Forum (WEF) to draft guidance on how these types of techniques can be used and assessed.

Log Formats - a Complete Guide

Log management software operates on the basis of receiving, storing, and analyzing different types of log format files. There are several of these standardized log formats that are most commonly generated by a wide assortment of different devices and systems. As such, it is important to understand how they operate and differ from one another so that you can use them the right way, as well as avoid some common mistakes.

2019 was great, but we're just getting started

It’s the start of a new year and the time is right to assess what we’ve accomplished and where we’re going. First, I think we should celebrate the incredible year LogDNA just completed. I’m so proud of what our LogDNA team accomplished. Not only because it’s quite impressive, which it is, but also because it lays the groundwork for what’s to come in 2020.

Google Cloud Platform Serverless Ingestion into Splunk

If you have or plan to collect data from Google Cloud Platform (GCP), you will have noticed that your option of ingesting data has been by using Splunk’s Google Cloud Platform Add-On. However, many customers are adopting “serverless” cloud services to deliver their cloud solutions. There are many reasons for this, but mainly it provides solutions that do not require any overheads of server or container management, that scale and is delivered as a part of their cloud platform.

Dizzy with Data? Stay Focused on Business Outcomes

Being a CIO is not easy these days. The industry is buzzing about data-driven business transformation, and every executive and manager wants to make data-driven decisions. For the CIO, finding the right solution – and getting the maximum benefit from it – can be overwhelming. Most customers have a minimum expectation, but beyond that it can be difficult to envision what’s possible. It’s hard to see what else data can make possible.

How Snyk Gains End-to-end Observability using Logz.io

Snyk is a developer-centric organization focused on open source and container security for modern engineering teams. In our latest customer perspective, Anton Drukh, VP of Engineering, sat down with our team to discuss how the organization gains full production visibility and end-to-end observability with the help of Logz.io.

InfluxDB Community Office Hours - January 2020

InfluxDB Community Office Hours are one-hour, monthly online sessions, held on the 3rd Wednesday of the month at 10:00 am Pacific Time, by our Influxers to answer your questions about any topic related to InfluxDB or time series. We host this monthly live webinar so that users can directly ask a panel of Influxers questions and talk in real time. We record these sessions and post them on YouTube. InfluxDB Community Office Hours are part of our commitment to open source, developer happiness, and time to awesome.

Mac system extensions for threat detection: Part 2

In the previous post, we covered some of the frameworks accessible by kernel extensions that provide information about file system, process, and network events. These frameworks included the Mandatory Access Control Framework, the KAuth framework, and the IP/socket filter frameworks. In this post, we will go into the various tips and tricks that can be used in order to obtain even more information regarding system events.

How Businesses are Using Machine Learning Anomaly Detection to Scale Partner and Affiliate Tracking

Today’s business needs make it virtually impossible to function without relying on an extensive network of partners and third-party providers. An IBM study found that 70 percent of businesses were looking to increase their external partnerships.