Community Blog
Get the latest updates on the Splunk Community, including member experiences, product education, events, and more!

Make LLMs observable, do more with Kubernetes, and discover Splunk Asset & Risk Intelligence on Splunk Lantern

KayeChapman
Splunk Employee
Splunk Employee

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data insights, key use cases, and tips on managing Splunk more efficiently.

We also host Getting Started Guides for a range of Splunk products, a library of Product Tips, and Data Descriptor articles that help you see everything that’s possible with data sources and data types in Splunk.

This month, we’re sharing all the details on an interesting new article on how to instrument LLMs with Splunk, a bunch of new Kubernetes articles, and a new Getting Started Guide for Splunk Asset and Risk Intelligence. We’ve also published lots of brand new use case, product tip, and data articles that we’ll share at the end of this blog. Read on to find out more.

 

Boost LLM observability with Splunk

Many organizations have started to integrate LLM platforms like ChatGPT into their workflows, leveraging generative AI capabilities to improve productivity for their employees and customers.  

But how can LLM applications be made observable? In our new article Instrumenting LLM applications with OpenLLMetry and Splunk you’ll find a step-by-step guide that demonstrates how OpenTelemetry can be used to view LLM data in Splunk Observability Cloud.

unnamed - 2024-09-03T140702.391.png

If you like this article, you might also be interested to see another ChatGPT article we published recently, Monitoring applications using OpenAI API and GPT models with OpenTelemetry and Splunk APM.

 

Mastering Kubernetes and Splunk

Some of the most popular articles on Splunk Lantern cover how best to integrate Kubernetes with the Splunk platform, so we’re happy to share a number of new articles on this topic that we’ve published throughout August. 

Detecting and resolving issues in a Kubernetes environment shows you how to ​​implement a scalable observability solution that provides an overview of Kubernetes architecture, highlighting real-time issues and allowing you to act fast and mitigate impact.

Enabling access between Kubernetes indexer clusters and external search heads teaches you how to use the Splunk Operator for Kubernetes to ensure continued communication between Splunk indexer clusters running on Kubernetes and search heads that are external to the Kubernetes environment.

Improving hardware utilization by moving indexers into Kubernetes explains how Kubernetes and the Splunk Operator for Kubernetes can improve utilization of hardware by running multiple indexers (or K8s pods) on each bare metal server.

Using Kubernetes Horizontal Pod Autoscaling demonstrates how you can use autoscaling to increase the capacity of your Kubernetes environment to match application resource demands with minimal manual intervention.

Finally, Understanding how to use the Splunk Operator for Kubernetes introduces you to how you can use the Splunk Operator for Kubernetes to simplify getting Splunk indexer clusters, search head clusters, and standalone instances running within Kubernetes.

unnamed - 2024-09-03T140613.545.png

What other Kubernetes-related articles would you like to see us tackle next? Let us know in the comments below!

 

Getting Started with Splunk Asset and Risk Intelligence

If you struggle with asset discovery, risk management, or maintaining compliance, our new Getting Started Guide on Splunk Asset and Risk Intelligence (ARI) can help you learn how to use this powerful new product to streamline these processes with ease. 

unnamed - 2024-09-03T140537.846.png

Splunk ARI provides a comprehensive, continuously updated asset inventory by leveraging rich data from the Splunk platform to accurately discover and monitor all assets and identities - including endpoints, servers, users, cloud resources, and OT/IoT devices. It enhances your investigative processes by reducing the time spent pivoting between systems, offering accurate asset and identity context that speeds up investigations and identifies compliance gaps to reduce risk exposure.

Like all of our Security Getting Started Guides, this new guide is split into easy-to-navigate steps that walk you through how to prepare for, install, and use ARI. Check out the guide today, and please let us know your feedback in the comments!

unnamed - 2024-09-03T140426.530.png

This Month’s New Articles

Here’s everything else we’ve published over the month:

We hope you’ve found this update helpful. Thanks for reading!

Kaye Chapman, Senior Lantern Content Specialist for Splunk Lantern

Get Updates on the Splunk Community!

Cloud Platform | Customer Change Announcement: Email Notification Will Be Available ...

The Notification Team is migrating our email service provider since currently there’s no support ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...