Splunk Tech Talks
Deep-dives for technical practitioners.

Tech Talk | AI-Powered Data Management

LesediK
Splunk Employee
Splunk Employee

Tech Talk - AI-Powered Data Management (1).png

 

Now On-Demand

 

Join our Splunk experts for an exclusive Tech Talk as we explore the Cisco Data Fabric architecture and introduce our latest AI-powered data management capabilities designed to turn raw telemetry into real-time intelligence in minutes, not weeks.

During this session, we will demonstrate how to move beyond manual toil with automated field extraction, guided onboarding, auto-schematization, and self-healing pipelines.

You will learn how to:

  • streamline building data pipelines and reduce operational overhead.
  • ensure your data is always analytics-ready for your most critical use cases.

Replay the Tech Talk and see ee how AI-driven automation can uplevel your team’s productivity and help you build a resilient, AI-ready data foundation.

 

LesediK
Splunk Employee
Splunk Employee

 

Maximizing your data.jpg

 

Sharing a few resources below to help you start transforming your data management strategy!

Blogs:

Lantern Article: Building a Data Management Strategy

YouTube Demo Series: Data Management Made Easy

LesediK
Splunk Employee
Splunk Employee

 

Platform Tech Talk AI-Powered Data Management April232026.jpg

 

 

Top of mind questions asked during the AI-Powered Data Management Tech Talk

 

Q. When will these capabilities be Generally Available?

A. Summer 2026

LesediK_7-1676518142760.png

Q. How will this help me save time getting data in?

A. Splunk is introducing key AI-Powered Data Management capabilities that leverage Large Language Models (LLMs) and generative AI, to replace manual, fragile, and expert-dependent tasks with automated, self-learning workflows, transforming raw, chaotic telemetry into trusted, analytics-ready intelligence in minutes rather than weeks.

Customers can get excited because this is a productivity multiplier! It shifts the team’s focus from "data firefighting" to "data strategy," drastically accelerating their time-to-insight and ensuring security and observability content is always reliable.

Check out the latest launch announcement.

LesediK_7-1676518142760.png

Q. In a situation where there is a Machine-to-Machine communication where public/private keys are used for data, is there a better way to capture the heartbeat of the target system than using a “degenerate” key missing message? Seems like this would obfuscate REAL errors that might occur?

A. tstats may be worth considering as a practice for heartbeat/liveness monitoring in Splunk, given its performance characteristics (although I'm not sure if this fully answers the problem you're describing).

LesediK_7-1676518142760.png

Q. Can we create pipelines that strips / mask sensitive data before it ends up in a database?

A.With EP/IP you can strip or mask data before sending to supported destinations.

LesediK_7-1676518142760.png

Q. Does this tool only work with datasets that you wish to be added to a Splunk data model? What if I want some of the functionality to do field extractions, etc without including the events in a Splunk data model?

A. This can be done to, by selecting 'custom' schema in select data model screen.

LesediK_7-1676518142760.png

Q. Can we do nullqueue using this?

A. Yes, that's supported.

LesediK_7-1676518142760.png

Q. How does it impact SVC ?

A. Great question! We won't be able to answer that today since we are still in Alpha stage. That said, more information will be shared before the GA releases for all these features.

LesediK_7-1676518142760.png

 

 

Contributors
Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...