Dynamically updating feature set recommendation databases

    公开(公告)号:US10904295B2

    公开(公告)日:2021-01-26

    申请号:US16817070

    申请日:2020-03-12

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide for identifying recommended feature sets for new security applications. In one example, a method of providing recommended feature sets for a new security application includes identifying a request for the new security application, and determining a classification for the new security application. The method further provides identifying related applications to the new security application based on the classification, and identifying a feature set for the new security application based on features provided in the related applications.

    GENERATING EVENTS IN EXCESS OF LICENSED EVENT COUNT

    公开(公告)号:US20210011932A1

    公开(公告)日:2021-01-14

    申请号:US17038472

    申请日:2020-09-30

    Applicant: SPLUNK Inc.

    Abstract: In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of the at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. The method may also include completing processing of the received network communication after the transmitting of the at least some of the identified settings.

    FIELD VALUE AND LABEL EXTRACTION FROM A FIELD VALUE

    公开(公告)号:US20210011925A1

    公开(公告)日:2021-01-14

    申请号:US16919400

    申请日:2020-07-02

    Applicant: SPLUNK Inc.

    Abstract: First one or more values are extracted from a plurality of events using a first extraction rule. The extracted first one or more values are assigned to a first field of the plurality of events as a first set of field-data item pairs. Second one or more values are extracted from the plurality of the events using a second extraction rule. The second extraction rule identifies the second one or more values and a field label corresponding to the second one or more values in the extracted first one or more values of the first set of field-data item pairs. The extracted second one or more values are assigned to a second field of the plurality of events as a second set of field-data item pairs. The field label extracted using the second extraction rule or a modified version thereof may be assigned to the second field.

    Precise plane detection and placement of virtual objects in an augmented reality environment

    公开(公告)号:US10891792B1

    公开(公告)日:2021-01-12

    申请号:US16264504

    申请日:2019-01-31

    Applicant: SPLUNK INC.

    Abstract: A mobile device executes an augmented reality (AR) software application that detects an orientation of a client device. The AR software application projects a line from a reference position on the client device to a physical object. The AR software application identifies a first location on the physical object that intersects with the line. The AR software application determines an x-coordinate and a y-coordinate of a portion of the physical object included in an image displayed on the client device based on the first location. The AR software application receives a z-coordinate of the portion of the physical object. In response to receiving user input via the client device, the AR software application anchors an augmented reality object at a second location that corresponds to the x-coordinate, the y-coordinate, and the z-coordinate. The orientation of the augmented reality object corresponds to the orientation of the client device.

    DISPLAYING EVENT RECORDS WITH EMPHASIZED FIELDS

    公开(公告)号:US20210004205A1

    公开(公告)日:2021-01-07

    申请号:US17028755

    申请日:2020-09-22

    Applicant: SPLUNK INC.

    Abstract: Embodiments are directed towards real time display of event records with an indication of previously provided extraction rules. A plurality of extraction rules may be provided to the system, such as automatically generated and/or user created extraction rules. These extraction rules may include regular expressions. A plurality of event records may be displayed to the user, such that text in a field defined by an extraction rule is emphasized in the display of the event record. The same emphasis may be provided for text in overlapping fields, or the emphasis may be somewhat different for different fields. The user interface may enable a user to select a portion of text of an event record, such as by rolling-over or clicking on an emphasized part of the event record. By selecting the portion of the event record, the interface may display each extraction rule associated with the selected portion.

    Server-side interactive search results

    公开(公告)号:US10860591B2

    公开(公告)日:2020-12-08

    申请号:US16193781

    申请日:2018-11-16

    Applicant: Splunk Inc.

    Abstract: A method, system, and processor-readable storage medium are directed towards generating a report derived from data, such as event data, stored on a plurality of distributed nodes. In one embodiment the analysis is generated using a “divide and conquer” algorithm, such that each distributed node analyzes locally stored event data while an aggregating node combines these analysis results to generate the report. In one embodiment, each distributed node also transmits a list of event data references associated with the analysis result to the aggregating node. The aggregating node may then generate a global ordered list of data references based on the list of event data references received from each distributed node. Subsequently, in response to a user selection of a range of global event data, the report may dynamically retrieve event data from one or more distributed nodes for display according to the global order.

    Periodically processing data in files identified using checksums

    公开(公告)号:US10860537B2

    公开(公告)日:2020-12-08

    申请号:US15663652

    申请日:2017-07-28

    Applicant: Splunk Inc.

    Abstract: Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two or more item identifiers may include analyzing the item using a small item size characteristic, a compressed item, or for an identifier collision. The two or more item identifiers may be employed to determine if the item is a new or existing item. In one embodiment, the two or more item identifiers may be compared to a record about an existing item to determine if the item is a new or existing item. If the item is an existing item, then the item may be further processed to determine if the existing item has actually changed.

    Management of actions in a computing environment based on asset classification

    公开(公告)号:US10855718B2

    公开(公告)日:2020-12-01

    申请号:US16042283

    申请日:2018-07-23

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing assets in the environment. In one example, a method of operating an advisement computing system includes identifying a security threat for an asset in the computing environment, and identifying a classification for the asset in relation to other assets within the computing environment. The method further provides determining a rule set for the security threat based on the classification for the asset and initiating a response to the security threat based on the rule set.

    TRACE AND SPAN SAMPLING AND ANALYSIS FOR INSTRUMENTED SOFTWARE

    公开(公告)号:US20200372007A1

    公开(公告)日:2020-11-26

    申请号:US16757354

    申请日:2019-10-28

    Applicant: Splunk Inc.

    Abstract: Embodiments of the present disclosure provide for trace and span sampling and analysis for instrumented software. Each span may be annotated with one or more tags that provide context about an executed task, such as a user instrumenting the software, a document involved in a request, an infrastructure element used in servicing a request, etc. A sampler may perform tail-based sampling of traces comprising spans. The sampler may select a portion of the traces having selected features and send them to an analyzer. The analyzer may receive the selected traces and determine whether the selected traces are indicative of configuration problems for the instrumented software. An alert may be generated based on identified configuration problems.

    Behavioral based device clustering system and method

    公开(公告)号:US10833942B2

    公开(公告)日:2020-11-10

    申请号:US16051001

    申请日:2018-07-31

    Applicant: Splunk Inc.

    Abstract: One or more embodiments are directed behavioral based device clustering. A network traffic log of devices in the network is received. Features of devices are extracted from the network traffic log and aggregated into an aggregated feature matrix on a per device basis. By applying a topic modeling algorithm to the aggregated feature matrix, the devices are clustered into device groups according to behavior groups. A device is assigned to the device group to create an assignment.

Patent Agency Ranking