Operations | Monitoring | ITSM | DevOps | Cloud

Data Architecture for Business Data & AI Projects

Like physical architecture, the architecture running your business data — any and compute-intensive AI projects — is important. This data architecture governs a very important part of your business: how well users can translate raw information into real knowledge and actionable insights. Today, your data architecture is getting perhaps more attention than ever before. And that’s all thanks to usable AIs that now exist.

How To Set Up Monitoring for Your Hybrid Environment

The modern IT landscape consists of many distributed systems, which can pose a challenge if you are responsible for the end-to-end performance of these systems. As a platform engineer today, that is exactly what the job requires. You must juggle between dozens of tools to meet SLAs. This is why a modern solution is needed to bridge the gap between disjointed infrastructure and application stacks…and this is why the Splunk Observability platform was born.

How to Monitor Your Hybrid Applications Without Toil

About seventy-two percent of businesses operate in a hybrid IT environment, mixing their cloud-based services with traditional on-premises infrastructure. These hybrid environments offer many benefits, from scale, speed, and flexibility to security, cost savings, and control, blending the best of both worlds.

The Importance of Traces for Modern APM [Part 2]

In part 1, we looked at how the design plan of traditional monitoring technologies depended heavily on properties of the systems that were intended to monitor and then showed how those properties began to be undermined by an increase in complexity, an increase which can ultimately be captured by the concept of entropy. In this part, we will explore how increased entropy forces us to rethink what is required for monitoring.

Shadow IT & How To Manage It Today

In the business world, shadow IT is a controversial topic. Gartner defines Shadow IT as any IT devices, software and services that are used outside or beyond the ownership or control of IT departments/ organizations. This includes: In a standard work environment, the IT department would be responsible for providing whatever IT solutions and work tools were needed across all business functions.

Monitoring Pi-hole using Pi-hole Exporter and OpenTelemetry: A Comprehensive Guide

Pi-hole is a fantastic open-source DNS-based ad blocker that enhances your online experience by blocking unwanted ads and trackers network-wide. Monitoring the performance and status of your Pi-hole setup is essential to ensure its effectiveness. Next, we'll explore how to use a Prometheus exporter to expose metrics from Pi-hole and have the OpenTelemetry collector scrape the metrics and send them to Splunk Observability Cloud.

How AI Can Catalyze Digital Resilience: An Introduction to Splunk's Philosophy

ChatGPT and other LLMs have become so accessible that even our grandmas know about AI. But what’s really happening beyond the hype? Recently, I sat down with IT and security leaders Cory Minton and Kirsty Paine to share the inside scoop on how we’re thinking about AI here at Splunk. Watch the replay of our conversation here.

Network Latency & How To Improve Latency

Cloud-based services have changed how individuals and businesses get things done. That doesn’t mean it’s all positive — there are some tradeoffs and compromises that come with cloud services and the internet. One major tradeoff is speed. For instance, if your website fails to load within three seconds, 40% of your visitors will abandon your site. That’s a serious dent for anyone doing business online. The culprit here is latency.