Patents Assigned to Splunk Inc.
-
Patent number: 11880399Abstract: Systems and methods are disclosed involving user interface (UI) search tools for locating data, including tools for summarizing indexed raw machine data that organize and present results to enable expansion and exploration of initial summarizations. The initial summarizations may be explored and refined to help users determine how to identify and best focus a search on data subsets of greater interest.Type: GrantFiled: July 8, 2022Date of Patent: January 23, 2024Assignee: Splunk Inc.Inventors: Jesse Miller, Jason Szeto, Jose Solis, Jindrich Dinga, David Marquardt
-
Patent number: 11882099Abstract: Various embodiments of the present application set forth a computer-implemented method that includes receiving, by a trusted tunnel bridge and from a first application executing in a first network, a first encrypted data packet, where the first encrypted data packet includes an encrypted portion of data, and a destination device identifier (DDI). The method further includes determining, by the trusted tunnel bridge, a particular device in a second network and associated with the DDI included in the first encrypted data packet. The method further includes sending, by the trusted tunnel bridge directly to the particular device, the first encrypted data packet.Type: GrantFiled: January 29, 2021Date of Patent: January 23, 2024Assignee: SPLUNK INC.Inventors: Jesse Chor, Michael Emery
-
Patent number: 11875032Abstract: Techniques are disclosed for anomaly detection based on a predicted value. A search query can be executed over a period of time to produce values for a key performance indicator (KPI), the search query defining the KPI and deriving a value indicative of the performance of a service at a point in time or during a period of time, the value derived from machine data pertaining to one or more entities that provide the service. A graphical user interface (GUI) enabling a user to indicate a sensitivity setting can be displayed. A user input indicating the sensitivity setting can be received via the GUI. Zero or more of the values as anomalies can be identified in consideration of the sensitivity setting indicated by the user input.Type: GrantFiled: April 28, 2022Date of Patent: January 16, 2024Assignee: Splunk Inc.Inventors: Manish Sainani, Adam Jamison Oliner, Jacob Barton Leverich, Leonid Alekseyev, Sonal Maheshwari
-
Patent number: 11875275Abstract: A custom use case framework in a computer analytics system is shown and described. The custom use case framework includes a custom model creation wizard interface that guides a user through submitting custom model parameters of a custom model definition. The computing system transforms custom model parameters of the custom model definition into a custom model. The custom model is executed in an analytics system. Thus, one or more embodiments provide a simplified method for a user to generate a custom model that is executable by a computer system.Type: GrantFiled: February 21, 2023Date of Patent: January 16, 2024Assignee: Splunk Inc.Inventors: Koulick Ghosh, George Tsironis
-
Patent number: 11876809Abstract: In a method, a plurality of events is accessed, wherein an event of the plurality of events includes a portion of raw-machine data from a data source of a plurality of data sources. For at least one event of the plurality of events, a transaction phase of a computer security transaction is correlated with the at least one event based at least in part on a data source associated with the at least one event. The transaction phase of the at least one event is correlated with a particular asset of a plurality of assets.Type: GrantFiled: September 30, 2020Date of Patent: January 16, 2024Assignee: Splunk Inc.Inventor: Munawar Monzy Merza
-
Patent number: 11876821Abstract: First event data, indicative of a first activity on a computer network and second event data indicative of a second activity on the computer network, is received. A first machine learning anomaly detection model is applied to the first event data, by a real-time analysis engine operated by the threat indicator detection system in real time, to detect first anomaly data. A second machine learning anomaly detection model is applied to the first anomaly data and the second event data, by a batch analysis engine operated by the threat indicator detection system in a batch mode, to detect second anomaly data. A third anomaly is detected using an anomaly detection rule. The threat indictor system processes the first anomaly data, the second anomaly data, and the third anomaly data using a threat indicator model to identify a threat indicator associated with a potential security threat to the computer network.Type: GrantFiled: February 9, 2023Date of Patent: January 16, 2024Assignee: SPLUNK INC.Inventors: Robert Winslow Pratt, Ravi Prasad Bulusu
-
Patent number: 11874691Abstract: Systems and methods are disclosed for processing and executing queries in a data intake and query system. The data intake and query system receives a query identifying a set of data to be processed and a manner of processing the set of data. The data intake and query system identifies buckets that are to be searched and search nodes to execute the query. The data intake and query system maps the identified buckets to the search nodes and executes the query using the identified bucket and search nodes.Type: GrantFiled: June 5, 2018Date of Patent: January 16, 2024Assignee: Splunk Inc.Inventors: Alexandros Batsakis, Ashish Mathew, Christopher Pride, Bharath Kishore Reddy Aleti, Sourav Pal, Arindam Bhattacharjee, James Monschke
-
Patent number: 11868411Abstract: Improved crawling and curation of data and metadata from diverse data sources is described. In some embodiments, improvements are achieved by interpreting the context, vocabulary and relationships of data element, to enable relational data search capability for users. The user querying process is improved by systematic identification of the data objects, context, and relationships across data objects and elements, aggregation methods and operators on the data objects and data elements as identified in the curation process. User query suggestions and recommendations can be adjusted based on the context, relationships between the data elements, user profile, and the data sources. When the user query is executed, the query text is translated into an equivalent of one or more query statements, such as SQL or PostGre statements, and the query is performed on the identified data sources. Results are assembled to present the answer in a meaningful visualization for the user query.Type: GrantFiled: September 7, 2021Date of Patent: January 9, 2024Assignee: SPLUNK INC.Inventor: Ramesh Panuganty
-
Patent number: 11868234Abstract: Monitoring and troubleshooting tools provide the capability to visualize different levels of a client's application that is deployed as a suite of independent but cooperating services (e.g., an application that includes a monolithic application and a microservices-based application), collect values of monitored or tracked metrics at those different levels, and visualize values of the metrics at those levels. For example, metrics values can be generated for components of the monolithic application and/or for components of a microservice of the microservice-based application.Type: GrantFiled: March 18, 2022Date of Patent: January 9, 2024Assignee: SPLUNK Inc.Inventors: Mayank Agarwal, Steven Karis, Justin Smith
-
Patent number: 11868158Abstract: In embodiments of field value search drill down, a search system exposes a search interface that displays one or more events returned as a search result set. A field-value pair can be emphasized in the field-value pairs of an event displayed in the search interface, and a menu is displayed with search options that are selectable to operate on the emphasized field-value pair of the event. The menu includes the search options to add search criteria of the emphasized field-value pair to a search command in a search bar of the search interface, exclude the search criteria of the emphasized field-value pair from a search, or create a new data search based on the emphasized field-value pair. A selection of one of the search options in the menu can be received, and the search command in the search bar is updated based on the search option that is selected.Type: GrantFiled: September 26, 2022Date of Patent: January 9, 2024Assignee: Splunk Inc.Inventors: Cory Eugene Burke, Katherine Kyle Feeney, Divanny I. Lamas, Marc Vincent Robichaud, Matthew G. Ness, Clara E. Lee
-
Patent number: 11870795Abstract: Techniques for identifying attack behavior based on scripting language activity are disclosed. A security monitoring system generates a behavior profile for a first client device based on scripting language commands included in a first set of raw machine data received from the first client device, where the first client device is coupled to a network, and the first set of raw machine data is associated with network traffic received by or transmitted from the first client device. The security monitoring system analyzes a second set of raw machine data received from the first client device, where the second set of raw machine data is associated with subsequent network traffic received by or transmitted from the first client device. The security monitoring system detects an anomaly in the second set of raw machine data based on the behavior profile, and initiates a mitigation action in response to detecting the anomaly.Type: GrantFiled: June 14, 2021Date of Patent: January 9, 2024Assignee: SPLUNK INC.Inventors: Joseph Auguste Zadeh, Rodolfo Soto, Madhupreetha Chandrasekaran, Yijiang Li
-
Patent number: 11868364Abstract: First one or more values are extracted from a plurality of events using a first extraction rule. The extracted first one or more values are assigned to a first field of the plurality of events as a first set of field-data item pairs. Second one or more values are extracted from the plurality of the events using a second extraction rule. The second extraction rule identifies the second one or more values and a field label corresponding to the second one or more values in the extracted first one or more values of the first set of field-data item pairs. The extracted second one or more values are assigned to a second field of the plurality of events as a second set of field-data item pairs. The field label extracted using the second extraction rule or a modified version thereof may be assigned to the second field.Type: GrantFiled: June 29, 2022Date of Patent: January 9, 2024Assignee: Splunk Inc.Inventor: Marc Vincent Robichaud
-
Patent number: 11868404Abstract: One or more processing devices cause display of a user interface that identifies a service definition representing a service, receive input identifying an entity, where the service is performed at least in part by the entity, and store the service definition representing the service in association with an entity definition representing the entity. The entity definition comprises information identifying data pertaining to the entity in a datastore of machine data that reflects activity in an information technology environment produced by a plurality of components of the information technology environment. The one or more processing devices receive input pertaining to a search definition representing a search producing a measure of the service, and store the search definition representing the search, where the search produces the measure of the service using at least a portion of the data pertaining to the entity.Type: GrantFiled: December 14, 2020Date of Patent: January 9, 2024Assignee: Splunk Inc.Inventors: Brent Boe, Brian Bingham, John Robert Coates, Tristan Antonio Fletcher
-
Patent number: 11870558Abstract: An example method of identification of related event groups for a service monitoring system includes: receiving a sample set of events from a service monitoring system; choosing, based the sample set of events, a set of fieldnames for defining factors; generating a plurality of event group definitions, wherein each event group definition of the plurality of event group definitions comprises a plurality of factors, wherein each factor of the plurality of factors is represented by a respective fieldname-value pair of an event of the sample set of events, wherein a fieldname of the respective fieldname-value pair is selected from the set of fieldnames; and determining, based on the plurality of event group definitions, one or more event groups for a plurality of events.Type: GrantFiled: March 24, 2023Date of Patent: January 9, 2024Assignee: Splunk Inc.Inventors: Vineetha Bettaiah, Tristan Antonio Fletcher, Ross Andrew Lazerowitz, Hemendra Singh Choudhary
-
Patent number: 11870802Abstract: Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.Type: GrantFiled: March 31, 2022Date of Patent: January 9, 2024Assignee: Splunk Inc.Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
-
Patent number: 11870673Abstract: Various methods and systems for facilitating network traffic monitoring in association with an application running on a client device are provided. In this regard, aspects of the invention facilitate monitoring network traffic being transmitted to and/or from a client device, such as a mobile device, so that network performance can be analyzed. In various implementations, one or more default classes associated with an application on a device are replaced with one or more custom monitoring classes designed to facilitate monitoring data packets being communicated to or from the application. The custom monitoring classes can then be utilized to facilitate monitoring a plurality of data packets communicated to or from the application.Type: GrantFiled: October 20, 2021Date of Patent: January 9, 2024Assignee: Splunk Inc.Inventor: Konstantinos Polychronis
-
Patent number: 11860760Abstract: A method of aggregating metrics associated with a user interaction during a real user session comprises identifying a span comprising a tag associated with a workflow from ingested spans associated with the real user session, where the workflow comprises spans generated in response to the user interaction. The method also comprises identifying other spans associated with the workflow from the ingested spans. The method further comprises grouping the other spans associated with the workflow with the tagged span and aggregating metrics for the workflow over a duration of time.Type: GrantFiled: July 30, 2021Date of Patent: January 2, 2024Assignee: SPLUNK Inc.Inventors: Mayank Agarwal, Shashwat Sehgal, Justin Smith, David Tagatac, Rashmi Kalyani Vasudevan, John Bennett Wundes
-
Patent number: 11860821Abstract: An application development and deployment system allows an application developer to develop applications for a distributed data intake and query system. The application may include information that associates portions of the application with particular server groups of the distributed data intake and query system. The application may be partitioned to generate target application packages for each of the server groups of the data intake and query system.Type: GrantFiled: October 15, 2021Date of Patent: January 2, 2024Assignee: Splunk, Inc.Inventors: Grigori Melnik, David Searle Noble, Itay Alfred Neeman, Cecelia Campbell
-
Patent number: 11863583Abstract: Described herein are systems and methods for enhancing an interface for an information technology (IT) environment. In one implementation, an incident service causes display of a first version of a course of action and obtains input indicative of a request for a new action in the course of action. The incident service further determines suggested actions based at least one the input and causes display of the suggested actions. Once displayed, the incident service obtains input indicative of a selection of at least one action from the suggested actions, and causes display input indicative of a selection of at least one action from the suggested actions.Type: GrantFiled: May 21, 2021Date of Patent: January 2, 2024Assignee: Splunk Inc.Inventors: Oliver Friedrichs, Atif Mahadik, Govind Salinas, Sourabh Satish
-
Patent number: 11860881Abstract: A method, system, and processor-readable storage medium are directed towards generating a report derived from data, such as event data, stored on a plurality of distributed nodes. In one embodiment the analysis is generated using a “divide and conquer” algorithm, such that each distributed node analyzes locally stored event data while an aggregating node combines these analysis results to generate the report. In one embodiment, each distributed node also transmits a list of event data references associated with the analysis result to the aggregating node. The aggregating node may then generate a global ordered list of data references based on the list of event data references received from each distributed node. Subsequently, in response to a user selection of a range of global event data, the report may dynamically retrieve event data from one or more distributed nodes for display according to the global order.Type: GrantFiled: November 15, 2021Date of Patent: January 2, 2024Assignee: Splunk Inc.Inventors: Steve Yu Zhang, Stephen Phillip Sorkin