Total Years of Experience
5 Years
Detailed JD (Roles and Responsibilities)
Design, implement, and maintain monitoring dashboards using Grafana and Splunk.
Develop and manage alerts, dashboards, and visualizations for infrastructure, applications, and services.
Integrate data sources (e.g., Prometheus, Elasticsearch, InfluxDB) with Grafana.
Create and optimize Splunk queries (SPL) for log analysis and incident investigation.
Automate monitoring setup using IaC tools (Terraform, Ansible) and CI / CD pipelines.
Collaborate with DevOps, SRE, and development teams to define SLIs / SLOs and improve observability.
Troubleshoot performance issues using logs, metrics, and traces.
Required Skills
Splunk
Strong knowledge of Splunk architecture (indexers, forwarders, search heads).
Proficiency in SPL (Search Processing Language).
Experience with log ingestion, parsing, and field extraction.
Creating and managing alerts, dashboards, and reports.
Knowledge of Splunk Enterprise Security (ES) or ITSI is a plus.
Grafana
Experience building custom dashboards using Grafana.
Familiarity with Grafana plugins, templating, and alerting.
Integration with Prometheus, Loki, Elasticsearch, or InfluxDB.
Understanding of Grafana Loki for log aggregation is a bonus.
General Monitoring & Observability
Understanding of metrics, logs, and traces.
Familiarity with OpenTelemetry, Prometheus, Jaeger, or Zipkin.
Experience with incident response and root cause analysis
Mandatory skills
Splunk, Grafana
Splunk • Bengaluru City, KA, India