Operations | Monitoring | ITSM | DevOps | Cloud

Splunk

Set up browser tests in Splunk Synthetic Monitoring using the Chrome DevTools Recorder

In this video I’ll introduce you to the Chrome DevTools Recorder and how you can use it with Splunk Observability Cloud’s Synthetic Monitoring feature. I’ll explain what the Recorder is and then demonstrate how you can create a recording. We’ll then export the recording and upload it as a new browser test in Splunk’s Synthetic Monitoring feature. After uploading, I’ll walk through the test results and explain when it makes sense to use the Recorder for your Synthetic Monitoring tests.

Redundancy vs. Resiliency in IT: What's The Difference?

Redundancy and resiliency are both important factors for keeping things running smoothly in many industries. For example: Even small businesses, like home-based operations or mom-and-pop shops, should think about redundancy and resiliency to avoid disruptions in their day-to-day work. While researching for this article in my home office, my internet service went out and stayed out for a couple of hours.

Fusion Teams: What Are They?

With more organizations becoming tech-enabled to tackle the AI boom, a new term has emerged: the fusion team. At least 84% of companies and 59% of government entities have set up “fusion teams," according to Gartner data. A new concept coined by Gartner, the fusion team aims to encourage collaborative development among technology and business teams. But what exactly is a fusion team, and why is it becoming increasingly important in today's business landscape?

Resilience as the Foundation for Growth and Compliance in Financial Services

Discover how financial services leaders build digital resilience amid security threats and compliance challenges. Learn strategies to enhance your security posture, drive growth, and meet customer expectations in uncertain times. Featuring insights from IDC and Splunk experts.

New GenAI Search Revamps Customer Experience

Splunk has launched a GenAI summary feature in splunk.com and docs.splunk.com search platforms designed to give users a quick and accurate glance of the most pertinent information they are looking for. This GenAI feature serves up a contextual high-level summary pulled from various relevant search results on topics ranging from Splunk product and feature usage to general Splunk terminology.

Introduction to Splunk Synthetic Monitoring in Splunk Observability Cloud

In this video I’m going to introduce you to Splunk Synthetic Monitoring in Splunk Observability Cloud. I’ll explain what synthetic monitoring is and then demonstrate a simple example by creating a browser test for a sample e-commerce site. I’ll also demonstrate how you can link issues found through synthetic monitoring with backend code due to its integration with Splunk APM.

Introduction to Log Observer Connect in Splunk Observability Cloud

Log Observer Connect will allow you to connect to and view/query logs from your Splunk Enterprise or Splunk Cloud instance from within Splunk Observability Cloud. In this video, I will introduce you to Log Observer Connect in Splunk Observability Cloud and walk you through a demonstration of how it works. You’ll learn how to view and query logs, as well as save queries for later use. I’ll also walk you through a practical example of when you might use Log Observer Connect through the use of Related Logs.

Setup Log Observer Connect in Splunk Observability Cloud

Log Observer Connect will allow you to connect to and view/query logs from your Splunk Enterprise or Splunk Cloud instance from within Splunk Observability Cloud. In this video, I will briefly explain what Log Observer Connect is and then show you how to connect your Splunk Observability Cloud organization to a Splunk Enterprise instance through Log Observer Connect. TOC.

Observability Meets Security: Build a Baseline To Climb the PEAK

When we hunt in new environments and datasets, it is critical to build an understanding of what they contain, and how we can leverage them for future hunts. For this purpose, we recommend the PEAK Threat Hunting Framework's baseline hunting process.