US 11,855,998 B1
Enabling role-based operations to be performed on machine data in a machine environment
Robin Kumar Das, Healdsburg, CA (US); Ledio Ago, San Leandro, CA (US); Declan Gerald Shanaghy, Benica, CA (US); and Gaurav Gupta, San Francisco, CA (US)
Assigned to SPLUNK INC., San Francisco, CA (US)
Filed by SPLUNK INC., San Francisco, CA (US)
Filed on Feb. 22, 2022, as Appl. No. 17/677,760.
Application 17/677,760 is a continuation of application No. 16/796,825, filed on Feb. 20, 2020, granted, now 11,258,803.
Application 16/796,825 is a continuation of application No. 15/967,398, filed on Apr. 30, 2018, granted, now 10,616,236, issued on Apr. 7, 2020.
Application 15/967,398 is a continuation of application No. 15/339,884, filed on Oct. 31, 2016, granted, now 9,992,208, issued on Jun. 5, 2018.
Application 15/339,884 is a continuation of application No. 14/735,120, filed on Jun. 9, 2015, granted, now 9,516,029, issued on Dec. 6, 2016.
Application 14/735,120 is a continuation of application No. 14/449,135, filed on Jul. 31, 2014, granted, now 9,055,075, issued on Jun. 9, 2015.
Application 14/449,135 is a continuation of application No. 14/068,445, filed on Oct. 31, 2013, granted, now 8,849,779, issued on Sep. 30, 2014.
Application 14/068,445 is a continuation of application No. 13/662,356, filed on Oct. 26, 2012, granted, now 8,682,930, issued on Mar. 25, 2014.
Application 13/662,356 is a continuation of application No. 13/572,434, filed on Aug. 10, 2012, granted, now 8,682,860, issued on Mar. 25, 2014.
Claims priority of provisional application 61/523,063, filed on Aug. 12, 2011.
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 16/21 (2019.01); H04L 9/40 (2022.01); G06F 21/62 (2013.01); G06F 16/13 (2019.01); G06F 16/16 (2019.01); G06F 16/901 (2019.01); G06F 16/951 (2019.01); G06F 16/955 (2019.01); G06F 16/958 (2019.01); G06F 16/22 (2019.01); G06F 16/9537 (2019.01); G06Q 20/14 (2012.01); H04L 12/14 (2006.01); H04L 67/1097 (2022.01); G06F 9/48 (2006.01); G06F 9/50 (2006.01)
CPC H04L 63/105 (2013.01) [G06F 9/4887 (2013.01); G06F 9/5088 (2013.01); G06F 16/13 (2019.01); G06F 16/134 (2019.01); G06F 16/162 (2019.01); G06F 16/21 (2019.01); G06F 16/2228 (2019.01); G06F 16/2272 (2019.01); G06F 16/901 (2019.01); G06F 16/951 (2019.01); G06F 16/955 (2019.01); G06F 16/9537 (2019.01); G06F 16/986 (2019.01); G06F 21/6218 (2013.01); G06Q 20/145 (2013.01); H04L 12/1435 (2013.01); H04L 63/10 (2013.01); H04L 67/1097 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising;
receiving a request for a first user to access an indexed data store associated with a project, wherein the request is based on an invitation received from a second user, and wherein at least some events in a set of events in the indexed data store comprise a portion of raw machine data associated with a timestamp;
determining that the second user is assigned a first role included in one or more roles that enable access to the indexed data store, wherein the first role is associated with a set of permissions for accessing the indexed data store;
assigning at least the first role to the first user based on the second user being assigned the first role;
determining, based on the set of permissions associated with the first role, a set of operations that the first user has permission to perform on the set of events stored in the indexed data store; and
allowing the first user to perform an operation included in the set of operations.