
Users log into an interconnected stack of systems, services, devices and applications which are connected with each other.

In your network traffic data, a source IP connects to a destination IP with attributes like bytes in/out, packets, ports, and other properties. So where do you find them? And what does any of this have to do with Splunk? A Coal Mining ExerciseĪlmost all data in Splunk can be turned into graphs, and that's possibly something you may not have considered before. Long story short, graphs can be very valuable and precious - just like gemstones. And finally, you're probably reading this article on a device that’s connected to a giant graph structure - called the internet.your credit card provider that successfully protects you from fraud.your favorite online shop that provides you with interesting recommendations.your navigation system that gets you to your meeting on time.Yet not that many people are aware of the power of graphs - despite the fact that most of us benefit from its real-world applications on a daily basis such as: In the last few decades publications from formal graph theory, up to applied (social) network sciences and complex system dynamics have been flourishing.

If you have never heard of graphs, think of a network of connected elements. And believe it or not, if you've got the latest version of Splunk’s Machine Learning Toolkit, the gems are even closer than you think - so let’s get started! But you will be rewarded with artifacts that you can use to start your gemstone mining journey today.

Do you like gems? Perfectly cut diamonds? Crystal clear structures of superior beauty? You do? Then join me on a 10 minute read about a quest for hidden gems in your data: graphs!īe warned, it is going to be a mysterious journey into data philosophy.
