-
公开(公告)号:US20240333752A1
公开(公告)日:2024-10-03
申请号:US18740314
申请日:2024-06-11
Applicant: SPLUNK INC.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
CPC classification number: H04L63/1433 , G06F16/285 , G06F21/554 , H04L63/14 , H04L63/1408 , H04L63/1416 , G06F2221/034 , G06F2221/2151 , H04L63/20
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the Gl.
-
2.
公开(公告)号:US11178167B2
公开(公告)日:2021-11-16
申请号:US16526354
申请日:2019-07-30
Applicant: SPLUNK INC.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
-
3.
公开(公告)号:US20190356690A1
公开(公告)日:2019-11-21
申请号:US16526354
申请日:2019-07-30
Applicant: SPLUNK INC.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
-
4.
公开(公告)号:US20180351990A1
公开(公告)日:2018-12-06
申请号:US15996866
申请日:2018-06-04
Applicant: SPLUNK INC.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
CPC classification number: H04L63/1433 , G06F16/285 , G06F21/554 , G06F2221/034 , G06F2221/2151 , H04L63/14 , H04L63/1408 , H04L63/1416 , H04L63/20
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
-
5.
公开(公告)号:US08752178B2
公开(公告)日:2014-06-10
申请号:US13956285
申请日:2013-07-31
Applicant: Splunk Inc.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
IPC: G06F11/00
CPC classification number: H04L63/1433 , G06F17/30598 , G06F21/554 , G06F2221/034 , G06F2221/2151 , H04L63/14 , H04L63/1408 , H04L63/1416 , H04L63/20
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
Abstract translation: 所公开的计算机实现的方法包括接收和索引原始数据。 索引包括将原始数据划分为包含与计算机或网络安全相关的信息的时间戳搜索事件。 将索引数据存储在索引数据存储中,并使用模式从索引数据中的字段中提取值。 搜索提取的字段值以获取安全信息。 使用安全信息确定一组安全事件。 每个安全事件都包括由条件指定的字段值。 提供包括安全事件组的摘要,安全事件的其他摘要和删除元素(与摘要相关联)的图形界面(GI)。 接收与删除元素的交互相对应的输入。 与删除元素进行交互会导致摘要从GI中移除。 更新GI以从GI中删除摘要。
-
公开(公告)号:US20130318236A1
公开(公告)日:2013-11-28
申请号:US13956338
申请日:2013-07-31
Applicant: Splunk, Inc.
Inventor: John Coates , Lucas Murphey , James Hansen , David Hazekamp
IPC: H04L12/26
CPC classification number: H04L43/045 , H04L41/22
Abstract: A system and computer-implemented is provided for displaying a configurable metric relating to an environment in a graphical display along with a value of the metric calculated over a configurable time period. The metric is used to identify events of interest in the environment based on processing real time machine data from one or more sources. The configurable metric is selected and a corresponding value is calculated based on the events of interest over the configurable time period. The value of the metric may be continuously updated in real time based on receiving additional real-time machine data and displayed in a graphical interface as time progresses. Statistical trends in the value of the metric may also be determined over the configurable time period and displayed in the graphical interface as well as an indication if the value of the metric exceeds a configurable threshold value. Further, a selection of one or more thresholds for the value of the metric may be applied and an indication displayed indicating if the threshold(s) have been exceeded.
Abstract translation: 提供了一种系统和计算机实现的,用于显示与图形显示中的环境相关的可配置度量以及在可配置的时间段内计算出的度量的值。 该度量用于基于处理来自一个或多个源的实时机器数据来识别环境中感兴趣的事件。 选择可配置度量,并根据可配置时间段内感兴趣的事件计算相应的值。 可以基于接收附加的实时机器数据来实时地持续更新度量的值,并且随着时间的推移在图形界面中显示。 度量值的统计趋势也可以在可配置的时间周期上确定并显示在图形界面中,以及指示值是否超过可配置的阈值。 此外,可以应用对度量的值的一个或多个阈值的选择,并且显示指示是否已经超过阈值的指示。
-
7.
公开(公告)号:US20200153714A1
公开(公告)日:2020-05-14
申请号:US16741450
申请日:2020-01-13
Applicant: SPLUNK INC.
Inventor: John Coates , Lucas Murphey , James Hansen , David Hazekamp
Abstract: A system and computer-implemented is provided for displaying a configurable metric relating to an environment in a graphical display along with a value of the metric calculated over a configurable time period. The metric is used to identify events of interest in the environment based on processing real time machine data from one or more sources. The configurable metric is selected and a corresponding value is calculated based on the events of interest over the configurable time period. The value of the metric may be continuously updated in real time based on receiving additional real-time machine data and displayed in a graphical interface as time progresses. Statistical trends in the value of the metric may also be determined over the configurable time period and displayed in the graphical interface as well as an indication if the value of the metric exceeds a configurable threshold value. Further, a selection of one or more thresholds for the value of the metric may be applied and an indication displayed indicating if the threshold(s) have been exceeded.
-
8.
公开(公告)号:US20150040225A1
公开(公告)日:2015-02-05
申请号:US14280311
申请日:2014-05-16
Applicant: Splunk Inc.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
IPC: H04L29/06
CPC classification number: H04L63/1433 , G06F17/30598 , G06F21/554 , G06F2221/034 , G06F2221/2151 , H04L63/14 , H04L63/1408 , H04L63/1416 , H04L63/20
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
Abstract translation: 所公开的计算机实现的方法包括接收和索引原始数据。 索引包括将原始数据划分为包含与计算机或网络安全相关的信息的时间戳搜索事件。 将索引数据存储在索引数据存储中,并使用模式从索引数据中的字段中提取值。 搜索提取的字段值以获取安全信息。 使用安全信息确定一组安全事件。 每个安全事件都包括由条件指定的字段值。 提供包括安全事件组的摘要,安全事件的其他摘要和删除元素(与摘要相关联)的图形界面(GI)。 接收与删除元素的交互相对应的输入。 与删除元素进行交互会导致摘要从GI中移除。 更新GI以从GI中删除摘要。
-
公开(公告)号:US12034759B2
公开(公告)日:2024-07-09
申请号:US17507698
申请日:2021-10-21
Applicant: SPLUNK INC.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
CPC classification number: H04L63/1433 , G06F16/285 , G06F21/554 , H04L63/14 , H04L63/1408 , H04L63/1416 , G06F2221/034 , G06F2221/2151 , H04L63/20
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
-
10.
公开(公告)号:US09992220B2
公开(公告)日:2018-06-05
申请号:US15421420
申请日:2017-01-31
Applicant: Splunk Inc.
Inventor: John Coates , Lucas Murphey , David Hazekamp , James Hansen
CPC classification number: H04L63/1433 , G06F17/30598 , G06F21/554 , G06F2221/034 , G06F2221/2151 , H04L63/14 , H04L63/1408 , H04L63/1416 , H04L63/20
Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
-
-
-
-
-
-
-
-
-