Picture this. It’s 2 a.m., production is down, and someone needs root access. You open Teleport, join a session, and start poking around logs. But halfway through, you realize you can’t tell which exact command caused the outage or who touched sensitive data. This is where Splunk