Generating and providing concurrent journey visualizations associated with different journey definitions

    公开(公告)号:US11144185B1

    公开(公告)日:2021-10-12

    申请号:US16147310

    申请日:2018-09-28

    Applicant: SPLUNK INC.

    Abstract: Systems, methods, and computer readable media are disclosed for generating and providing concurrent journey visualizations associated with different journey definitions. In computer-implemented embodiments, a data intake and query system, or a journey visualization computing tool, can be used to generate and provide concurrent representations corresponding with different journey definitions. In operation, a set of journey instances associated with a journey having a set of steps is obtained. Each step may be associated with at least one event that includes raw machine data produced by a component of an information technology environment. Upon obtaining different journey definitions specifying filters to apply to the set of journey instances, the data intake and query system can generate journey visualizations in accordance with the journey definitions. Thereafter, the journey visualizations corresponding with the journey definitions can be concurrently displayed by a computing device via a graphical user interface.

    SELECTING ACTIONS RESPONSIVE TO COMPUTING ENVIRONMENT INCIDENTS BASED ON SEVERITY RATING

    公开(公告)号:US20210314347A1

    公开(公告)日:2021-10-07

    申请号:US17185612

    申请日:2021-02-25

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of operating an advisement system to provide actions in a computing environment includes identifying a security incident in the computing environment, identifying a criticality rating for the asset, and obtaining enrichment information for the security incident from one or more internal or external sources. The method also provides identifying a severity rating for the security incident based on the enrichment information, and determining one or more security actions based on the enrichment information. The method further includes identifying effects of the one or more security actions on operations of the computing environment based on the criticality rating and the severity rating, and identifying a subset of the one or more security actions to respond to the security incident based on the effects.

    Multi-field search query of result data set generated from event data

    公开(公告)号:US11138191B1

    公开(公告)日:2021-10-05

    申请号:US16526833

    申请日:2019-07-30

    Applicant: Splunk Inc.

    Abstract: In accordance with various embodiments of the present disclosure, a data intake and query system (DIQS) performs a query on event data to return a result data set. A client device receives an input that includes one or more text strings and expands the received input into a multi-field search query, which is transmitted to the DIQS. The DIQS then parses the result data set by performing the multi-field search query on the result data set to return at least one event that includes one or more fields that have one or more values that correspond to the one or more text strings. The at least one event may then be caused to be displayed by the client device through a graphical user interface.

    FREQUENT PATTERN BASED ANOMALY EVENT DETECTION

    公开(公告)号:US20210286874A1

    公开(公告)日:2021-09-16

    申请号:US17332804

    申请日:2021-05-27

    Applicant: Splunk Inc.

    Abstract: A method is disclosed that includes receiving, at a computing device, an event log including multiple events, where the events are derived from machine data, determining a first score associated with a first granularity level by comparing an event from the event log with a first frequent patterns generated for the first granularity level, and determining a second score associated with a second granularity level by comparing the event with a second frequent patterns generated for the second granularity level. The method further includes determining an aggregate score for the event based on the first score and the second score, and comparing the aggregate score for the event with an anomaly score threshold. Further, the method includes issuing an alert identifying the event as an anomaly based on the aggregate score exceeding the anomaly score threshold.

    PROVIDING ACTION RECOMMENDATIONS BASED ON ACTION EFFECTIVENESS ACROSS INFORMATION TECHNOLOGY ENVIRONMENTS

    公开(公告)号:US20210281601A1

    公开(公告)日:2021-09-09

    申请号:US17326070

    申请日:2021-05-20

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide action recommendations to administrators of a computing environment based on effectiveness of previously implemented actions. In one example, an advisement system identifies a security incident for an asset in the computing environment, and obtains enrichment information for the incident. Based on the enrichment information a rule set and associated recommended security actions are identified for the incident. Once the recommended security actions are identified, a subset of the action recommendations are organized based on previous action implementations in the computing environment, and the subset is provided to an administrator for selection.

    Recommending query templates during query formation

    公开(公告)号:US11113294B1

    公开(公告)日:2021-09-07

    申请号:US16513573

    申请日:2019-07-16

    Applicant: Splunk Inc.

    Abstract: Systems and methods are disclosed for recommending query templates to a user. The system can identify a token query parameter from a portion of a query entered in a user interface, and use the token to identify a query template from a group of query templates. In some cases, some of the query templates can correspond to other queries associated with users of different tenants and can be generated by replacing user query parameters with placeholders. The system can identify query parameters for the placeholders and cause a user interface to display the query template with the query parameters in place of the placeholders.

Patent Agency Ranking