-
公开(公告)号:US11714683B1
公开(公告)日:2023-08-01
申请号:US17163320
申请日:2021-01-29
Applicant: Splunk Inc.
Inventor: Jeffery Roberts , Matthew Hanson , Ryan Connor Means , Jeffrey Roecks , Taotao Yu
IPC: G06F15/173 , G06F9/50 , G06F9/455
CPC classification number: G06F9/5027 , G06F9/45558 , G06F2009/45562 , G06F2009/45587
Abstract: A playbook execution architecture used to efficiently execute playbooks by distributing the execution of playbook function blocks to multiple independent “worker” sub-processes is described. Each worker process hosts an independent execution environment used to execute playbook function blocks independently from other worker processes, where each worker process can host an execution environment that is the same as or different from execution environments hosted by other work processes, enabling the playbook execution engine to support function blocks written in multiple different programming language versions or programming languages entirely. The described playbook execution architecture enables an IT and security operations application to vertically scale the computing resources used to execute playbooks, provides users with more control over an amount of computing resources devoted to the execution of playbooks, and enables more expressiveness in the types of actions and efficiency of playbooks by providing support for multiple programming languages and programming language versions.
-
公开(公告)号:US12120124B1
公开(公告)日:2024-10-15
申请号:US17588843
申请日:2022-01-31
Applicant: Splunk Inc.
Inventor: Jacob Davis , Dekel Shahaff , Jeffrey Roecks , Sydney Flak , Navya Mehta , Ian Forrest , Sydney Karimi , Elton Xue
IPC: G06F8/20 , G06F8/30 , G06F8/33 , G06F8/41 , G06F8/71 , H04L9/40 , G06F8/72 , G06F8/77 , G06F11/34 , G06F11/36
CPC classification number: H04L63/105 , G06F8/30 , G06F8/71 , H04L63/102 , G06F8/33 , G06F8/72 , G06F8/77 , G06F11/3438 , G06F11/3688 , G06F11/3692
Abstract: Techniques are described for providing a built-in “app” editor for an information technology (IT) and security operations application that enables users to create, modify, and test operation of apps under development within the editor. Some IT and security operations applications enable users to extend the applications by adding connectivity to third party technologies to run custom actions. For example, a user might create a custom app to enable an IT and security operations application to connect to an external service providing information about malicious Internet Protocol (IP) addresses, to connect to a relevant cloud provider service, or to interact with a firewall or other type of computing device used in a user's computing environment. Given the broad set of technologies that can be orchestrated by an IT and security operations application, apps broadly enable users to add custom functionality to interface with virtually any technology of interest.
-