The value Splunk has always delivered for IT operations customers is the ability to correlate information from any type of infrastructure and/or application, and their associated monitoring solutions (e.g., BMC Footprint, Nagios, SolarWinds, CISCO X, Y, or Z) all in one location.
The key to differentiating this value isn’t in the alert itself but in the resulting workflow. Once an alert or workflow management ticket is received, system, infrastructure, and application administrators would typically require credentials to log into their production environment one piece at a time, attempting to conduct forensic analysis “room by room.” What’s worse, is if the investigation doesn’t begin in a timely manner, often the logs have “rolled off” the point monitoring solution. With Splunk, they can now build a comprehensive picture with all the pieces of relevant infrastructure in one workspace, without having to compromise the safety and security of their network by logging into production devices or attempting to do analysis with incomplete data.
Participants joined us for a webinar where they learned:
- How to kick start IT operations visibility use cases by utilizing Splunk
- How to maximize data re-use within current Splunk instance/infrastructure
- Ease of adoption and out-of-the-box value with copy and paste "best practices"