Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Splunk Inc patents


Recent patent applications related to Splunk Inc. Splunk Inc is listed as an Agent/Assignee. Note: Splunk Inc may have other listings under different names/spellings. We're not affiliated with Splunk Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "S" | Splunk Inc-related inventors


Three-dimensional point-in-polygon operation to facilitate visualizing data points bounded by 3d geometric regions

A system, a method and instructions embodied on a non-transitory computer-readable storage medium that solve a 3D point-in-polygon (PIP) problem is presented. This system projects polygons that comprise a set of polyhedra onto projected polygons in a reference plane. Next, the system projects a data point onto the reference plane,... Splunk Inc

Generating and storing summarization tables for searchable events

Embodiments are directed are towards the transparent summarization of events. Queries directed towards summarizing and reporting on event records may be received at a search head. Search heads may be associated with one more indexers containing event records. The search head may forward the query to the indexers the can... Splunk Inc

Transforming event data using remote capture agents and transformation servers

The disclosed embodiments provide a method and system for processing network data. During operation, the system obtains, at a remote capture agent, configuration information for the remote capture agent from a configuration server over a network. Next, the system uses the configuration information to configure the generation of event data... Splunk Inc

Priority-based processing of messages from multiple servers

Systems and methods for priority-based processing of messages received from multiple servers. An example method comprises: receiving a plurality of network packets from one or more servers; processing the plurality of network packets to produce a first message associated with a first timestamp and a second message associated with a... Splunk Inc

Creating and testing a correlation search

One or more processing devices receive a definition of a search query for a correlation search of a data store, the data store comprising time-stamped events that each comprise a portion of raw machine data reflecting activity in an information technology environment and produced by a component of the information... Splunk Inc

Data forwarding using multiple data pipelines

In accordance with implementations of the present disclosure, a backup of live data received by a data forwarder is generated at the data forwarder while the live data is provided to a real-time data pipeline for forwarding from the data forwarder. A a first portion of the live data is... Splunk Inc

Performing rule-based actions based on accessed domain name registrations

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An... Splunk Inc

Automatic associations in an i.t. monitoring system

A computer system exposes an interface for the specification of filter criteria. The filter criteria may identify control information of a service monitoring system (SMS) that defines entities in an IT environment monitored by the SMS. An association of identified entities with a monitored service may be made to direct... Splunk Inc

Periodically processing data in files identified using checksums

Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two... Splunk Inc

Storing log data as events and performing a search on the log data and data obtained from a real-time monitoring environment

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data... Splunk Inc

Storing and executing a search on log data and data obtained from a real-time monitoring environment

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data... Splunk Inc

Log data time stamp extraction and search on log data and data obtained from a real-time monitoring environment

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data... Splunk Inc

Incident review interface

A computing machine performs a correlation search against KPI data for one or more services using a selection criteria and a triggering condition. When the triggering condition is satisfied a notable event or incident is created and information about the notable event is presented using a user interface that may... Splunk Inc

Thresholds for key performance indicators derived from machine data

One or more processing devices access a service definition for a service provided by one or more entities that each produce machine data or about which machine data is generated. The service definition identifies the entities that provide the service and, for each entity, identifying information for locating machine data... Splunk Inc

Monitoring it services at an individual overall level from machine data

One or more processing devices derive values indicative of various aspects of how a particular service in an information technology (IT) environment is performing at a point in time or for a period of time. The values are derived by a search query over machine data associated with the one... Splunk Inc

Graphical user interface for static and adaptive thresholds

Techniques are disclosed for providing a graphical user interface (GUI) for displaying and configuring adaptive or static thresholds for Key Performance Indicators (KPIs). The GUI may include one or more presentation schedules that may display threshold information associated with time policies. Each presentation schedule may include multiple time slots and... Splunk Inc

Correlating application errors with incomplete transactions

Various methods and systems for tracking incomplete purchases in correlation with application performance, such as application errors or crashes, are provided. In this regard, aspects of the invention facilitate monitoring transaction and application error events and analyzing data associated therewith to identify data indicating an impact of incomplete purchases in... Splunk Inc

Techniques for curating data for query processing

Improved crawling and curation of data and metadata from diverse data sources is described. In some embodiments, improvements are achieved by interpreting the context, vocabulary and relationships of data element, to enable relational data search capability for users. The user querying process is improved by systematic identification of the data... Splunk Inc

Techniques for compiling and presenting query results

Improved crawling and curation of data and metadata from diverse data sources is described. In some embodiments, improvements are achieved by interpreting the context, vocabulary and relationships of data element, to enable relational data search capability for users. The user querying process is improved by systematic identification of the data... Splunk Inc

Aligning a result image with a source image to create a blur effect for the source image

A processing device receives input representing a selection of a first area of a source image. The processing device identifies a result image that corresponds to the source image. The result image is previously created for the source image using a blur operation. The processing device aligns the selected first... Splunk Inc

Configuring generation of event streams by remote capture agents

The disclosed embodiments provide a system that processes network data. During operation, the system obtains, at a remote capture agent, a first protocol classification for a first packet flow captured by the remote capture agent. Next, the system uses configuration information associated with the first protocol classification to build a... Splunk Inc

Efficient point-in-polygon indexing technique to visualize data points bounded by geometric regions

A system that displays geographic data is disclosed. The system obtains polygons that define a set of geographic regions. Then, the system projects rays from endpoints of the line segments that define the polygons onto a reference line to form intersection points. For each interval between pairs of consecutive intersection... Splunk Inc

Creating an entity definition from a search result set

A processing device performs a search query to produce a search result set having entries having data items. A table, having rows and columns, is displayed in a user interface. Each data item of a particular entry appears in a respective column of the same row of the table. Each... Splunk Inc

Dynamic search guidance for machine data indexing and search system

Disclosed is a guidance technique that can be applied to guide search and analysis of stored data by a user. The technique can include inputting from a user a portion of a search query expressed in a pipelined search language, at a system for indexing and searching machine data. The... Splunk Inc

Central repository for storing configuration files of a distributed computer system

In a computer-implemented method for configuring a distributed computer system comprising a plurality of nodes of a plurality of node classes, configuration files for a plurality of nodes of each of the plurality of node classes are stored in a central repository. The configuration files include information representing a desired... Splunk Inc

Application deployment for data intake and query system

An application development and deployment system allows an application developer to develop applications for a distributed data intake and query system. The application may include information that associates portions of the application with particular server groups of the distributed data intake and query system. The application may be partitioned to... Splunk Inc

Previewing raw data parsing

Embodiments are directed towards previewing results generated from indexing data raw data before the corresponding index data is added to an index store. Raw data may be received from a preview data source. After an initial set of configuration information may be established, the preview data may be submitted to... Splunk Inc

Conveying state-on-state data to a user via hierarchical clusters in a three-dimensional model

Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment.... Splunk Inc

Automatically determining unpopulated entries of a provisioning template for a hosted computing environment

Systems and methods are provided for provisioning a hosted computing environment in accordance with customer requirements relating to a service. In some embodiments, a computer-implemented method is provided. The method includes generating a graphical interface on a computing device and receiving input corresponding to an indication of one or more... Splunk Inc

Technology add-on control console

The operation of an automatic data input and query system is controlled by well-defined control data. The system exposes user interfaces enabling an administrator to interact with control data to modify the ongoing operation of the system. Certain control data determines the collection and treatment of data from various technology... Splunk Inc

Technology add-on packages controlling a data input and query system

The operation of an automatic data input and query system is controlled by well-defined control data. Technology Add-On (TA) control data extends the operations of the system to gather and process machine data from additional sources. A user interface is exposed enabling a user who may be agnostic of requirements... Splunk Inc

Query-triggered processing of performance data and log data from an information technology environment

The disclosed system and method acquire and store performance measurements relating to performance of a component in an information technology (IT) environment and log data produced by the IT environment, in association with corresponding time stamps. The disclosed system and method correlate at least one of the performance measurements with... Splunk Inc

Field extraction rules from clustered data samples

The operation of an automatic data input and query system is controlled by well-defined control data. Certain control data may relate to data schemas and direct operations performed by the system to extract fields from machine data. Automatic methods may determine proper field extraction control information by analyzing a sample... Splunk Inc

Event limited field picker

An event limited field picker for a search user interface is described. In one or more implementations, a service may operate to collect and store data as events each of which includes a portion of the data correlated with a point in time. Clients may use a search user interface... Splunk Inc

File browser user interface

A search support system allows a customer to browse data contained in files stored on an external storage system. The search support system allows a customer to specify data processing tasks to be performed on raw data retrieved from a file stored on the external storage system. The customer specifies... Splunk Inc

09/21/17 / #20170272458

Network security system with real-time and batch paths

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies... Splunk Inc

09/21/17 / #20170270088

Automatic rule modification

Embodiments are directed towards real time display of event records and extracted values based on at least one extraction rule, such as a regular expression. A user interface may be employed to enable a user to have an extraction rule automatically generate and/or to manually enter an extraction rule. The... Splunk Inc

09/21/17 / #20170270186

Generating statistics

Embodiments are directed towards real time display of event records and extracted values based on at least one extraction rule, such as a regular expression. A user interface may be employed to enable a user to have an extraction rule automatically generate and/or to manually enter an extraction rule. The... Splunk Inc

09/21/17 / #20170270219

Advanced field extractor

Embodiments are directed towards a graphical user interface identify locations within event records with splittable timestamp information. A display of event records is provided using any of a variety of formats. A splittable timestamp selector allows a user to select one or more locations within event records as having time... Splunk Inc

09/14/17 / #20170264512

Systems and methods for monitoring and analyzing performance in a computer system with state distribution ring

A system that displays performance data for a computing environment. During operation, the system determines performance states for a plurality of entities that comprise the computing environment based on values of a performance metric for the entities. Next, the system displays the computing environment as a tree comprising nodes representing... Splunk Inc

09/07/17 / #20170255349

Systems and methods for monitoring and analyzing performance in a computer system with node pinning for concurrent comparison of nodes

In some embodiments, in response to the user selecting a first node in the tree to be pinned, the system displays a first detail panel for the first node, wherein the first detail panel displays state information for the first node, wherein the state information is frozen at the time... Splunk Inc

09/07/17 / #20170255481

Systems and methods for automatically characterizing performance of a hypervisor system

Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on lower level state assessments. A reviewer can also view historical... Splunk Inc

09/07/17 / #20170255683

Processing of performance data and structure data by thresholding log data

The disclosed system and method acquire and store performance measurements relating to performance of a component in an information technology (IT) environment and log data produced by the IT environment, in association with corresponding time stamps. The disclosed system and method correlate at least one of the performance measurements with... Splunk Inc

09/07/17 / #20170255711

Processing of performance data and raw log data from an information technology environment

The disclosed system and method acquire and store performance measurements relating to performance of a component in an information technology (IT) environment and log data produced by the IT environment, in association with corresponding time stamps. The disclosed system and method correlate at least one of the performance measurements with... Splunk Inc

09/07/17 / #20170257292

Systems and methods for displaying metrics on real-time data in an environment

A system and computer-implemented is provided for displaying a configurable metric relating to an environment in a graphical display along with a value of the metric calculated over a configurable time period. The metric is used to identify events of interest in the environment based on processing real time machine... Splunk Inc

09/07/17 / #20170257293

Systems and methods for monitoring and analyzing performance in a computer system with severity-state sorting

The disclosed embodiments relate to a system that displays performance data for a computing environment. During operation, the system first determines values for a performance metric for entities that comprise the computing environment. Next, the system displays the computing environment as a tree comprising nodes representing the entities and edges... Splunk Inc

09/07/17 / #20170255601

Determining events associated with a value

Embodiments are directed towards real time display of event records and extracted values based on at least one extraction rule, such as a regular expression. A user interface may be employed to enable a user to have an extraction rule automatically generate and/or to manually enter an extraction rule. The... Splunk Inc

09/07/17 / #20170255606

Determining events having a value

Embodiments are directed towards real time display of event records and extracted values based on at least one extraction rule, such as a regular expression. A user interface may be employed to enable a user to have an extraction rule automatically generate and/or to manually enter an extraction rule. The... Splunk Inc

09/07/17 / #20170255695

Determining rules based on text

Embodiments are directed towards real time display of event records and extracted values based on at least one extraction rule, such as a regular expression. A user interface may be employed to enable a user to have an extraction rule automatically generate and/or to manually enter an extraction rule. The... Splunk Inc

08/24/17 / #20170243132

Machine-learning data analysis tool

Disclosed herein is a computer-implemented tool that facilitates data analysis by use of machine learning (ML) techniques. The tool cooperates with a data intake and query system and provides a graphical user interface (GUI) that enables a user to train and apply a variety of different ML models on user-selected... Splunk Inc

08/17/17 / #20170237634

Transformation of network data at remote capture agents

The disclosed embodiments provide a method and system for processing network data. During operation, the system obtains, at a remote capture agent, configuration information for the remote capture agent from a configuration server over a network. Next, the system uses the configuration information to configure the generation of event data... Splunk Inc

08/17/17 / #20170237683

Processing event data using dynamic data server nodes

A system of dynamically-instantiated data server components provides access to a data repository. Different data server components are assigned to different data collections in the repository. A distribution component receives messages and, based on data collection identifiers associated with the messages, routes the messages to corresponding data server components. Based... Splunk Inc

08/17/17 / #20170237761

Monitoring search query results relating to alert notifications

The disclosed embodiments relate to a system that generates an alert based on information extracted from search results generated by a query. During operation, the system executes the query to generate the search results. The system also obtains configuration information for the alert, wherein the configuration information identifies information associated... Splunk Inc

08/10/17 / #20170228942

Conveying machine data to a user via attribute mapping in a three-dimensional model

Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment.... Splunk Inc

08/10/17 / #20170228943

Conveying data to a user via field-attribute mappings in a three-dimensional model

Systems and methods according to various embodiments enable a user to view three-dimensional representations of data objects (“nodes”) within a 3D environment from a first person perspective. The system may be configured to allow the user to interact with the nodes by moving a virtual camera through the 3D environment.... Splunk Inc

08/03/17 / #20170220632

Identifying field values based on delimiters

In embodiments, method and systems are provided for facilitating identification of field values based on delimiters. In some implementations, a user selection of a delimiter type to use for identifying values within fields is received. The values within fields are generally separated from one another by delimiters. A first set... Splunk Inc

08/03/17 / #20170220633

Context-adaptive selection options in a modular visualization framework

A modular visualization framework registers definitions for a variety of visualization types. The definitions are tagged with visualization characteristics. During a working session, likely interactive, a user identifies a search query used to produce data to be visualized. The working context, including the search query and data produced by its... Splunk Inc

08/03/17 / #20170220651

Optimizing index file sizes based on indexed data storage conditions

Techniques and mechanisms are disclosed to optimize the size of index files to improve use of storage space available to indexers and other components of a data intake and query system. Index files of a data intake and query system may include, among other data, a keyword portion containing mappings... Splunk Inc

08/03/17 / #20170220672

Enhancing time series prediction

Embodiments of the present invention are directed to facilitating enhancement of time series prediction. In accordance with aspects of the present disclosure, a set of time series data is determined to have at least one missing data value. Based on the missing data value(s), a predicted missing value is generated... Splunk Inc

08/03/17 / #20170220685

Facilitating data model acceleration in association with an external data system

Embodiments of the present invention are directed to facilitating data model acceleration in association with an external data system. In accordance with aspects of the present disclosure, at a core engine, a search request associated with a data model is received. The data model generally designates one or more fields,... Splunk Inc

08/03/17 / #20170220938

Concurrently forecasting multiple time series

Embodiments of the present invention are directed to facilitating concurrent forecasting associating with multiple time series data sets. In accordance with aspects of the present disclosure, a request to perform a predictive analysis in association with multiple time series data sets is received. Thereafter, the request is parsed to identify... Splunk Inc

08/03/17 / #20170223030

Detection of security transactions

In a method, a plurality of events is accessed, wherein an event of the plurality of events includes a portion of raw-machine data from a data source of a plurality of data sources. For at least one event of the plurality of events, a transaction phase of a computer security... Splunk Inc

08/03/17 / #20170223036

Model training and deployment in complex event processing of computer network data

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies... Splunk Inc

07/20/17 / #20170206185

Efficient calculation and organization of approximate order statistics of real numbers

A method, system, and processor-readable storage medium are directed towards calculating approximate order statistics on a collection of real numbers. In one embodiment, the collection of real numbers is processed to create a digest comprising hierarchy of buckets. Each bucket is assigned a real number N having P digits of... Splunk Inc

07/20/17 / #20170206205

Query conversion for converting structured queries into unstructured queries for searching unstructured data

Technologies are described herein for executing queries expressed with reference to a structured query language against unstructured data. A user issues a structured query through a traditional structured data management (“SDM”) application. Upon receiving the structured query, an SDM driver analyzes the structured query and extracts a data structure from... Splunk Inc

Patent Packs
07/20/17 / #20170206639

Minimizing blur operations for creating a blur effect for an image

A processing device receives input representing a selection of a first area of an image. The processing device determines whether the first selected area of the image corresponds to a blurred area previously created for a second selected area of the image. The blurred area is previously created for the... Splunk Inc

07/20/17 / #20170208089

Blocking domain name access using access patterns and domain name registrations

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An... Splunk Inc

07/13/17 / #20170201606

Automatically adjusting timestamps from remote systems based on time zone differences

The disclosed embodiments provide a system that processes data received from a remote system. During operation, the system sends, from a computer system to a remote system, a request for a local time at the remote system and records a time of transmission of the request. Next, the system obtains,... Splunk Inc

07/06/17 / #20170195195

Defining a graphical visualization along a time-based graph lane using key performance indicators derived from machine data

A service monitoring system receives a selection of key performance indicators (KPIs) that each indicate a different aspect of how a service provided by one or more entities is performing. Each entity of the one or more entities produces machine data or wherein each entity has its operation reflected in... Splunk Inc

06/29/17 / #20170185607

Managing datasets produced by alert-triggering search queries

An example method for managing datasets produced by alert-triggering search queries may include producing a dataset by executing a search query on a portion of data associated with a time window defined relative to a current time. The method may further include responsive to determining that a portion of the... Splunk Inc

06/15/17 / #20170169082

Processing of performance data and log data from an information technology environment by using diverse data stores

The disclosed system and method acquire and store performance measurements relating to performance of a component in an information technology (IT) environment and log data produced by the IT environment, in association with corresponding time stamps. The disclosed system and method correlate at least one of the performance measurements with... Splunk Inc

06/15/17 / #20170169134

Gui-triggered processing of performance data and log data from an information technology environment

The disclosed system and method acquire and store performance measurements relating to performance of a component in an information technology (IT) environment and log data produced by the IT environment, in association with corresponding time stamps. The disclosed system and method correlate at least one of the performance measurements with... Splunk Inc

06/01/17 / #20170155558

Machine data-derived key performance indicators with per-entity states

Raw machine data are captured and may be organized as events. Entity definitions representing machine entities that perform a service identify the machine data pertaining to respective entities. KPI search queries each define a KPI. Each KPI search query derives one or more values for the KPI from machine data... Splunk Inc

05/25/17 / #20170147681

Portable control modules in a machine data driven service monitoring system

The operation of an automatic service monitoring system (SMS) is directed by stored control information. Methods and mechanisms are provided to create portable control modules based on the control information. The portable modules may be transmitted or otherwise conveyed to a second SMS and imported there to establish the control... Splunk Inc

05/18/17 / #20170139692

System for displaying notification dependencies between component instances

The disclosed embodiments relate to a system that facilitates developing applications in a component-based software development environment. This system provides an execution environment comprising instances of application components and a registry that maps names to instances of application components. Within the registry, each entry is associated with a list of... Splunk Inc

05/18/17 / #20170139928

Query conversion for converting structured queries into unstructured queries for searching unstructured data

Technologies are described herein for executing queries expressed with reference to a structured query language against unstructured data. A user issues a structured query through a traditional structured data management (“SDM”) application. Upon receiving the structured query, an SDM driver analyzes the structured query and extracts a data structure from... Splunk Inc

05/18/17 / #20170139961

Search based on a relationship between log data and data from a real-time monitoring environment

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data... Splunk Inc

05/18/17 / #20170139962

Unified time series search across both log data and data from a real-time monitoring environment

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data... Splunk Inc

05/18/17 / #20170139963

Query-initiated search across separate stores for log data and data from a real-time monitoring environment

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data... Splunk Inc

05/18/17 / #20170139964

Query handling for field searchable raw machine data

Embodiments are directed towards a method for searching data. The method comprises providing an inverted index that comprises at least one record, wherein the at least one record comprises at least one field name and a corresponding at least one field value. The at least one field name and corresponding... Splunk Inc

Patent Packs
05/18/17 / #20170139965

Query handling for field searchable raw machine data and associated inverted indexes

Embodiments are directed towards a method for searching data. The method comprises providing an inverted index that comprises at least one record, wherein the at least one record comprises at least one field name and a corresponding at least one field value. The at least one field name and corresponding... Splunk Inc

05/18/17 / #20170139968

Source differentiation of machine data

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data... Splunk Inc

05/18/17 / #20170139983

Data model selection and application based on data sources

Embodiments include generating data models that may give semantic meaning for unstructured or structured data that may include data generated and/or received by search engines, including a time series engine. A method includes generating a data model for data stored in a repository. Generating the data model includes generating an... Splunk Inc

05/18/17 / #20170139996

Collection query driven generation of inverted index for raw machine data

Embodiments of the present disclosure provide a method for generating an inverted index in accordance with a user generated collection query. The method comprises providing a field searchable data store that comprises a plurality of event records, each event record comprising a time-stamped portion of raw machine data. The method... Splunk Inc

05/18/17 / #20170140013

Directly field searchable and indirectly searchable by inverted indexes raw machine datastore

Embodiments are directed towards a method for searching data. The method comprises generating an inverted index that comprises at least one record, wherein the at least one record comprises at least one field name and a corresponding at least one field value. The at least one field name and corresponding... Splunk Inc

05/18/17 / #20170140033

Identifying relationships between network traffic data and log data

Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine data is a product of information-processing systems (e.g., activity logs, configuration files, messages, database records) and represents the evidence of particular events that have... Splunk Inc

05/18/17 / #20170140039

Graphical display of field values extracted from machine data

The disclosure relates to certain system and method embodiments for generating reports from unstructured data. In one embodiment, a method can include identifying events matching criteria of an initial search query (each of the events including a portion of raw machine data that is associated with a time), identifying a... Splunk Inc

05/18/17 / #20170140071

Mapping key performance indicators derived from machine data to dashboard templates

Raw machine data are captured and organized as events. Entity definitions representing machine entities that perform a service identify the machine data associated with respective entities. KPI search queries each define a KPI. Each KPI search query derives one or more values for the KPI from machine data identified in... Splunk Inc

05/18/17 / #20170140575

Three-dimensional point-in-polygon operation to facilitate displaying three-dimensional structures

A system, a method and instructions embodied on a non-transitory computer-readable storage medium that solve a 3D point-in-polygon (PIP) problem is presented. This system projects polygons that comprise a set of polyhedra onto projected polygons in a reference plane. Next, the system projects a data point onto the reference plane,... Splunk Inc

05/18/17 / #20170141969

Service monitoring interface

Services in an operating environment are represented by stored service definitions that identify entities that perform the service. Entity definitions identify machine data pertaining to the entity. A key performance indicator (KPI) of the service characterizes the service on the whole or some aspect of it. Each KPI is defined... Splunk Inc

05/18/17 / #20170142140

Event specific relationship graph generation and application in a machine data processing platform

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies... Splunk Inc

05/18/17 / #20170142143

Identifying notable events based on execution of correlation searches

Systems and methods are provided for identifying network addresses and/or IDs of a deduplicated list among network data, machine data, and/or events derived from network data and/or machine data, and for identifying notable events by searching for the presence of network addresses and/or network IDs that are deduplicated across lists... Splunk Inc

05/18/17 / #20170142146

Capture triggers for capturing network data

The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification mechanism for identifying a security risk from time-series event data generated from network packets captured by one or more remote capture agents distributed across a network. Next, the system provides... Splunk Inc

05/18/17 / #20170142149

Graphical display of events indicating security threats in an information technology system

A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data... Splunk Inc

05/18/17 / #20170139887

Advanced field extractor with modification of an extracted field

The technology disclosed relates to formulating and refining field extraction rules that are used at query time on raw data with a late-binding schema. The field extraction rules identify portions of the raw data, as well as their data types and hierarchical relationships. These extraction rules are executed against very... Splunk Inc

05/11/17 / #20170134410

Dual-path distributed architecture for network security analysis

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies... Splunk Inc

05/11/17 / #20170134415

Network security threat detection by user/user-entity behavioral analysis

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies... Splunk Inc

05/04/17 / #20170124220

Search interface with search query history based functionality

In various embodiments, methods and systems for presenting a search interface with search query history based functionality is provided. A search query history store comprising search queries is accessed. The search query history store includes search queries executed in a search computing system. A search query comprises one or more... Splunk Inc

03/30/17 / #20170093645

Displaying interactive topology maps of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view... Splunk Inc

03/23/17 / #20170083572

Entity detail monitoring console

An automatic service monitor in an information-technology environment performs regular search queries against generated machine data to derive performance measurements. The information technology environment is defined in terms of services provided by entities, and the performance measurements are defined as key performance indicators (KPIs) of the services. Generated machine data... Splunk Inc

03/23/17 / #20170083585

Circular timeline displays of timestamped event data

Techniques and mechanisms are disclosed that enable a data intake and query system to generate and cause display of circular timelines of timestamped event data. As used herein, a circular timeline generally refers to a graphical display of timestamped events stored by a data intake and query system, wherein the... Splunk Inc

03/23/17 / #20170085446

Generating and displaying topology map time-lapses of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view... Splunk Inc

03/23/17 / #20170085447

Adaptive control of data collection requests sent to external data sources

Techniques and mechanisms are disclosed that enable a data collection system to adaptively control collection of data from one or more external data sources. At a high level, adaptively controlling collection of data from external data sources may include collecting performance information related to one or more data collection nodes... Splunk Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Splunk Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Splunk Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###