US 12,105,724 B1
Tokenized HTTP event collector
Glenn Block, Seattle, WA (US); and Patrick Lane Ogdin, Ann Arbor, MI (US)
Assigned to Splunk Inc., San Francisco, CA (US)
Filed by Splunk Inc., San Francisco, CA (US)
Filed on Apr. 8, 2021, as Appl. No. 17/225,900.
Application 17/225,900 is a continuation of application No. 16/189,124, filed on Nov. 13, 2018, granted, now 10,984,013.
Application 16/189,124 is a continuation of application No. 15/011,651, filed on Jan. 31, 2016, granted, now 10,169,434, issued on Jan. 1, 2019.
Int. Cl. G06F 16/00 (2019.01); G06F 16/22 (2019.01); G06F 16/25 (2019.01)
CPC G06F 16/254 (2019.01) [G06F 16/2228 (2019.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
receiving a message over a network, wherein the message is formatted according to an internet protocol, wherein a payload of the message includes a key-value pair, wherein a key of the key-value pair identifies a value of the key-value pair as recording an event associated with a computing device, and wherein the value of the key-value pair includes machine data produced by the computing device;
extracting, from the value of the key-value pair, using the key of the key-value pair, the machine data from the payload of the message to obtain extracted machine data;
determining, using the extracted machine data, a timestamp associated with the event;
processing the extracted machine data to obtain processed machine data;
generating the event using the processed machine data and the timestamp to obtain a generated event, wherein the generated event includes a portion of the processed machine data and the timestamp; and
outputting the generated event for storage in a field-searchable data store.