IT service monitoring by ingested machine data with KPI prediction and impactor determination

    公开(公告)号:US11886475B1

    公开(公告)日:2024-01-30

    申请号:US17745848

    申请日:2022-05-16

    申请人: Splunk Inc.

    IPC分类号: G06F7/00 G06F16/33 G06N5/022

    CPC分类号: G06F16/334 G06N5/022

    摘要: A service monitoring system (SMS) transforms machine data from a monitored information technology (IT) environment into meaningful key performance indicators (KPIs) that each represents some measure of a service implemented by the environment on an ongoing basis. An overall health score for the service is determined from the KPIs and a prediction is made for a future health score. Data regarding a particular KPI and other KPIs is transformed to predicted future values for the particular KPI over a prediction window. Additionally, predicted future KPI scores may be used to determine a KPI impact score reflecting some measure of the degree to which the KPI, its related components, or processing related thereto, can influence the actual future health score. The KPI impact scores condition or direct the future operation of one or more SMS processes. Production of an impactor list identifying priority targets for interventive processing may be produced based at least on KPI impact scores and may also condition or direct the future operation of one or more SMS processes.

    Trusted tunnel bridge
    44.
    发明授权

    公开(公告)号:US11882099B1

    公开(公告)日:2024-01-23

    申请号:US17162941

    申请日:2021-01-29

    申请人: SPLUNK INC.

    摘要: Various embodiments of the present application set forth a computer-implemented method that includes receiving, by a trusted tunnel bridge and from a first application executing in a first network, a first encrypted data packet, where the first encrypted data packet includes an encrypted portion of data, and a destination device identifier (DDI). The method further includes determining, by the trusted tunnel bridge, a particular device in a second network and associated with the DDI included in the first encrypted data packet. The method further includes sending, by the trusted tunnel bridge directly to the particular device, the first encrypted data packet.

    Intercepting and examining a packet header or trailer

    公开(公告)号:US11870673B2

    公开(公告)日:2024-01-09

    申请号:US17451518

    申请日:2021-10-20

    申请人: SPLUNK INC.

    摘要: Various methods and systems for facilitating network traffic monitoring in association with an application running on a client device are provided. In this regard, aspects of the invention facilitate monitoring network traffic being transmitted to and/or from a client device, such as a mobile device, so that network performance can be analyzed. In various implementations, one or more default classes associated with an application on a device are replaced with one or more custom monitoring classes designed to facilitate monitoring data packets being communicated to or from the application. The custom monitoring classes can then be utilized to facilitate monitoring a plurality of data packets communicated to or from the application.

    Techniques for compiling and presenting query results

    公开(公告)号:US11868411B1

    公开(公告)日:2024-01-09

    申请号:US17468428

    申请日:2021-09-07

    申请人: SPLUNK INC.

    发明人: Ramesh Panuganty

    IPC分类号: G06F16/951

    CPC分类号: G06F16/951

    摘要: Improved crawling and curation of data and metadata from diverse data sources is described. In some embodiments, improvements are achieved by interpreting the context, vocabulary and relationships of data element, to enable relational data search capability for users. The user querying process is improved by systematic identification of the data objects, context, and relationships across data objects and elements, aggregation methods and operators on the data objects and data elements as identified in the curation process. User query suggestions and recommendations can be adjusted based on the context, relationships between the data elements, user profile, and the data sources. When the user query is executed, the query text is translated into an equivalent of one or more query statements, such as SQL or PostGre statements, and the query is performed on the identified data sources. Results are assembled to present the answer in a meaningful visualization for the user query.