This document provides a summary of best practices and common pitfalls when using Splunk for data collection, management, and resiliency. It discusses best practices for collecting syslog data over UDP, direct TCP/UDP collection, using forwarders, and data onboarding processes like sourcetype recognition, timestamps, and event parsing. Common mistakes like over-engineering syslog collection, sending data directly to indexers, creating "data funnels" through intermediate forwarders, and letting Splunk automatically determine sourcetypes and timestamps are also summarized.