throbber
Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 1 of 85
`
`
`
`
`Frank E. Scherkenbach (CA SBN 142549)
`scherkenbach@fr.com
`Andrew G. Pearson (Pro Hac Vice forthcoming)
`pearson@fr.com
`Adam Kessel (Pro Hac Vice forthcoming)
`kessel@fr.com
`Kevin Su (Pro Hac Vice forthcoming)
`su@fr.com
`Kayleigh E. McGlynn (Pro Hac Vice forthcoming)
`mcglynn@fr.com
`Daniel H. Wade (Pro Hac Vice forthcoming)
`wade@fr.com
`FISH & RICHARDSON P.C.
`One Marina Park Drive
`Boston, MA 02210
`Telephone: (617) 542-5070
`Facsimile: (617) 542-8906
`
`Olivia T. Nguyen (CA SBN 337927)
`onguyen@fr.com
`FISH & RICHARDSON P.C.
`500 Arguello Street, Suite 400
`Redwood City, CA 94063
`Telephone: (650) 839-5070
`Facsimile: (650) 839-5071
`
`
`Attorneys for Plaintiff
`SPLUNK INC.
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`
`
`
`Case No. _______________
`
`Plaintiff,
`
`COMPLAINT
`
`
`
`JURY TRIAL DEMANDED
`
`SPLUNK INC.,
`
`
`
`
`
`v.
`
`
`CRIBL, INC., and CLINT SHARP, an
`individual,
`
`
`
`
`
`
`Defendants.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`1
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 2 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`This is an intellectual property case involving two competing software companies:
`
`Splunk, a pioneer and leader in the data analytics software industry, and Cribl, a business built
`
`on the back of Splunk’s labor and intellectual property, without license and without regard for
`
`ethics, the rights of others, or the law.
`
`Cribl was founded fourteen years after Splunk by a former Splunk employee, Clint Sharp.
`
`Mr. Sharp founded Cribl using code he intentionally and unlawfully took from Splunk when he
`
`was a Splunk employee without a license or permission to do so. Since that time, Cribl and Mr.
`
`Sharp have recruited numerous Splunk employees to Cribl, and have systematically encouraged
`
`employees to take Splunk’s confidential technical and business documents with them. In turn,
`
`10
`
`Cribl has used the information it misappropriated to compete unfairly against Splunk. At the
`
`11
`
`same time, Cribl has developed and marketed its software by making unlicensed copies of
`
`12
`
`Splunk’s copyrighted software, and by willfully infringing the patents that the United States
`
`13
`
`Patent and Trademark Office awarded to Splunk for its foundational innovations. Cribl has
`
`14
`
`attempted to mislead the market into believing that Cribl is an innovator, when in fact Cribl’s
`
`15
`
`“innovation” is derivative of Splunk’s intellectual property.
`
`16
`
`Splunk encourages fair competition, and it embraces the ability of third parties to build
`
`17
`
`software on top of its software platform. Splunk recognizes that innovation by third parties
`
`18
`
`working with Splunk’s software makes the Splunk ecosystem better for everyone—for Splunk’s
`
`19
`
`customers, for Splunk itself, and for other Splunk partners. But Cribl’s unlawful actions are not
`
`20
`
`innovation, and they have no place on the Splunk platform or in our economy. Cribl’s unethical
`
`21
`
`actions, its willful disregard of intellectual property rights, and its coordinated campaign of
`
`22
`
`misappropriation have left Splunk no choice but to file this lawsuit to stop Cribl’s unlawful
`
`23
`
`actions and to seek redress for the damage that Cribl has caused.
`
`24
`
`Plaintiff Splunk Inc. (“Splunk”) files this Complaint against Defendants Cribl, Inc.
`
`25
`
`(“Cribl”) and Clint Sharp and alleges as follows:
`
`26
`
`1.
`
`Splunk develops and operates an industry-leading data platform for analyzing
`
`27
`
`large volumes of machine data. Splunk was founded in 2003, pioneered the machine data
`
`28
`
`analytics industry, and still leads it in both innovation and customer affinity to this day.
`
`
`
`
`
`2
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 3 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`2.
`
`Cribl is a software company whose products leverage Splunk’s data platform. It
`
`was founded in 2017 by three former Splunk employees. These employees built critical
`
`functionality into Cribl’s first software product by improperly using Splunk source code
`
`intentionally misappropriated from Splunk. As set forth below, since this initial misuse, Cribl
`
`has taken an immense volume of additional confidential material from Splunk and used that
`
`material to compete unfairly against Splunk. Cribl has also developed its products with willful
`
`disregard for Splunk’s patent rights and used Splunk software in a manner that willfully infringes
`
`Splunk’s copyrights.
`
`3.
`
`Cribl’s first product was released in late 2018. At that time, Cribl did not reveal
`
`10
`
`to Splunk that its product was based on misuse of misappropriated Splunk code. Instead, Cribl
`
`11
`
`held itself out as a partner of Splunk. In fact, Cribl joined Splunk’s official Technology Alliance
`
`12
`
`Partner Program under this pretense, branding itself as the partner of a company it actually
`
`13
`
`sought to undermine.
`
`14
`
`4.
`
`Not content with unlawfully taking and misusing Splunk’s code, Cribl also took
`
`15
`
`other confidential material from Splunk, including by soliciting important technical and business
`
`16
`
`documents from departing Splunk employees, and then using those documents to further develop
`
`17
`
`its software and interfere with Splunk’s customer relationships. On information and belief,
`
`18
`
`Cribl’s CEO and co-founder, Clint Sharp, actively participated in this effort, recruiting Splunk
`
`19
`
`employees to join Cribl and encouraging them to bring Splunk confidential material with them.
`
`20
`
`5.
`
`Cribl’s actions led to Splunk terminating Cribl’s status as a Splunk partner. But
`
`21
`
`Cribl has continued to misuse Splunk’s proprietary information and has operated with wanton
`
`22
`
`disregard of Splunk’s patents and copyrights. For example, on information and belief, Cribl has
`
`23
`
`used Splunk’s copyrighted software in conjunction with its software development work and
`
`24
`
`marketing, despite having no license to do so. And the software that Cribl has developed
`
`25
`
`infringes numerous Splunk patents, despite, on information and belief, Cribl’s awareness of the
`
`26
`
`patents and knowledge of its infringement or willful blindness thereof.
`
`27
`
`28
`
`
`
`
`
`6.
`
`Cribl’s course of conduct has left Splunk no choice but to file this lawsuit.
`
`3
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 4 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`7.
`
`Splunk supports a robust innovation ecosystem around its products because it
`
`believes that fair competition and collaboration on Splunk’s platform will benefit Splunk’s
`
`customers. Accordingly, Splunk encourages third parties—and especially its partners—to
`
`develop software that extends the features and functionality of Splunk’s data platform, pursuant
`
`to its partner programs and while respecting Splunk’s proprietary rights. But Cribl’s actions are
`
`neither innovative nor fair.
`
`8.
`
`Cribl built its business on a foundation of misappropriated and misused Splunk
`
`code and documents, willful infringement of intellectual property, and a disregard of contractual
`
`and ethical obligations and principles of fair competition. While Cribl now markets itself as an
`
`10
`
`“innovator,” and describes Splunk to its employees and customers as “stale,” the reality could
`
`11
`
`not be further from Cribl’s characterizations. Splunk’s innovations are reflected in the well over
`
`12
`
`1,000 patents it has been awarded by the United States Patent and Trademark Office, while
`
`13
`
`Cribl’s “innovation” is reflected in the number of patents it possesses: zero. Since Cribl is
`
`14
`
`unwilling to compete fairly in the market, it must account for its actions in court.
`
`15
`
`16
`
`9.
`
`Plaintiff Splunk is a Delaware corporation with its principal place of business at
`
`THE PARTIES
`
`17
`
`270 Brannan Street, San Francisco, CA 94107.
`
`18
`
`10.
`
`Defendant Cribl is a Delaware corporation with its principal place of business at
`
`19
`
`44 Tehama Street, Suite 201, San Francisco, CA 94105.
`
`20
`
`11.
`
`Defendant Clint Sharp is the CEO and co-founder of Cribl. On information and
`
`21
`
`belief, Mr. Sharp resides in Oakland, CA.
`
`22
`
`23
`
`JURISDICTION, VENUE, AND DIVISIONAL ASSIGNMENT
`
`12.
`
`This Court has original jurisdiction to adjudicate Splunk’s Patent Act, Copyright
`
`24
`
`Act, and Digital Millennium Copyright Act claims pursuant to 17 U.S.C. § 101 et seq., 28 U.S.C.
`
`25
`
`§ 1331, and 28 U.S.C. § 1338(a). This Court has supplemental jurisdiction over the other claims
`
`26
`
`asserted herein pursuant to 28 U.S.C. § 1367 because they are so related to the claims in this
`
`27
`
`action for which the Court has original jurisdiction that they form part of the same case or
`
`28
`
`controversy under Article III of the United States Constitution.
`
`
`
`
`
`4
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 5 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13.
`
`As set forth above, all Defendants are residents of and/or have a regular and
`
`established place of business in the State of California and this judicial district. In addition, a
`
`substantial part of the events giving rise to the claims alleged in this Complaint occurred in this
`
`judicial district. Venue therefore lies in the United States District Court for the Northern District
`
`of California pursuant to 28 U.S.C. § 1391(b), (c) and (d), as well as 28 U.S.C. § 1400(a) and (b).
`
`14.
`
`On information and belief, a substantial part of the events giving rise to the claims
`
`alleged in this Complaint occurred in the City and County of San Francisco. For purposes of
`
`divisional assignment under Civil L.R. 3-2(c) and 3-5(b), this action involves intellectual
`
`property rights and will be assigned on a district-wide basis.
`
`GENERAL ALLEGATIONS
`
`Splunk’s Technology
`
`15.
`
`Splunk was founded in 2003. Since then, it has pioneered software that captures,
`
`13
`
`indexes, and analyzes large volumes of machine data in real time, allowing users to make use of
`
`14
`
`that data in profound ways. Splunk’s software has applications in diverse fields ranging from
`
`15
`
`information security to manufacturing to business analytics.
`
`16
`
`16. Machine data is data generated by machines and software running on those
`
`17
`
`machines. Modern businesses generate this data constantly in tremendous volumes—software,
`
`18
`
`servers, sensors, mobile devices, factory equipment, and essentially any other digital device are
`
`19
`
`all potential sources of machine data. On its own, this data is not particularly useful—it exists in
`
`20
`
`an overwhelming number of formats, it is not cross-correlated, and it is so voluminous that
`
`21
`
`humans themselves have no way of gaining insights from or reacting to the data in a meaningful
`
`22
`
`fashion. Prior attempts to try to manage such a large volume of varied data were inelegant and
`
`23
`
`inefficient, and could not handle problems unique to “big data” and large computer networks,
`
`24
`
`such as real-time changes, varied inputs, and analyzing data without structure.1 Splunk’s
`
`25
`
`26
`
`27
`
`28
`
`
`1 Big data has been defined as “an accumulation of data that is too large and complex for processing
`by traditional database management tools.” “Big Data,” Merriam-Webster’s Collegiate Dictionary
`(11th ed. 2020). The “big data” problems that Splunk solves include those that are unique to
`complex and massive computer networks.
`
`
`
`
`
`5
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 6 of 85
`
`
`
`
`disruptive vision in 2003 was to bring this diverse data into a single system, index it, and provide
`
`a platform and interface for this data to be searched, analyzed, and acted upon at scale.
`
`17.
`
`Splunk’s flagship product is named Splunk Enterprise, and can be run locally by
`
`Splunk’s customers, or hosted in the cloud by Splunk for its customers (via the Splunk Cloud
`
`Platform). Splunk Enterprise ingests real-time flows of machine data from disparate sources
`
`across a distributed environment and indexes that data, regardless of its source or format.
`
`Customers can then interact with their data through an interface from which they can generate
`
`graphs, reports, alerts, dashboards, and visualizations. Customers can thus use Splunk Enterprise
`
`to monitor and react to their data in real time.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`18.
`
`Splunk’s software has significantly impacted the way companies across the world
`
`11
`
`use data. Today, Splunk has thousands of customers, including many of the world’s largest and
`
`12
`
`most complex organizations in both the private and public sectors. Splunk not only pioneered
`
`13
`
`the industry in which it now operates, but it continues to lead that industry.
`
`14
`
`19.
`
`Indeed, in 2021, Fortune Magazine selected Splunk as one of the 2021 World’s
`
`15
`
`Most Admired Companies for its highly regarded corporate reputation and continued growth as a
`
`16
`
`software leader. Market reports from Gartner, Omdia Universe, Research in Action,
`
`17
`
`Constellation Research, and others consistently recognize Splunk as a market leader based on the
`
`18
`
`technological capabilities of its software, and for achieving high levels of customer satisfaction.
`
`19
`
`20. Many of Splunk’s innovations are reflected in the well over 1,000 patents issued
`
`20
`
`to it by the United States Patent and Trademark Office, and in Splunk’s nearly 100 U.S.
`
`21
`
`Copyright Registrations. Splunk’s patents cover diverse technological innovations related to
`
`22
`
`many aspects of software in this industry, from parsing rules to data visualization to remote data
`
`23
`
`capture to working with dual-queue systems. Several such technologies are at issue in this case,
`
`24
`
`and related patents are addressed later in this Complaint.
`
`25
`
`21.
`
`Splunk has continuously developed and enhanced its software products for nearly
`
`26
`
`two decades, as reflected in the many versions of its software it has released over the years.
`
`27
`
`These software versions are protected by valid and duly issued U.S. Copyright Registrations.
`
`28
`
`
`
`See, e.g., Exhibit A. For example, the copyright registrations below cover numerous versions of
`COMPLAINT
`Case No._________
`
`6
`
`
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 7 of 85
`
`
`
`
`Splunk Enterprise and related technologies (hereinafter “Splunk Enterprise” is used to refer to
`
`any or all of the below-referenced versions of Splunk Enterprise, whether deployed on premises
`
`or on the Splunk Cloud Platform):
`
`Registered Work:
`Exploring Splunk Search Processing Language
`(SPL) Primer and Cookbook.
`Indexer 1.0 /by Splunk, Inc.
`Indexer 2.0.1 /by Splunk, Inc.
`Indexer 2.1 /by Splunk, Inc.
`Indexer 2.2.
`Splunk Enterprise 1.0.
`Splunk Enterprise 2.0.1.
`Splunk Enterprise 2.1.
`Splunk Enterprise 2.2.
`Splunk Enterprise 3.0.
`Splunk Enterprise 3.1.
`Splunk Enterprise 3.2.
`Splunk Enterprise 3.3.
`Splunk Enterprise 3.4.
`Splunk Enterprise 4.0.
`Splunk Enterprise 4.1.
`Splunk Enterprise 4.2.
`Splunk Enterprise 4.3.
`Splunk Enterprise 5.0.
`Splunk Enterprise 6.0.
`Splunk Enterprise 6.1.
`Splunk Enterprise 6.2.
`Splunk Enterprise 6.3.
`Splunk Enterprise 6.4.
`Splunk Enterprise 6.5.
`Splunk Enterprise 6.6.
`Splunk Enterprise 7.0.
`Splunk Enterprise 7.1.
`Splunk Enterprise 7.2.
`Splunk Enterprise 7.3.
`Splunk Enterprise 8.0.0.
`Splunk Enterprise 8.1.0.
`Splunk Enterprise 8.2.0.
`Splunk Enterprise 9.0.0.
`Splunk Enterprise S2S Tool.
`
`U.S. Copyright Registration:
`TX 7-631-106
`
`TX 7-541-301
`TX 7-548-761
`TX 7-556-414
`TX 7-567-237
`TX 7-659-994
`TX 7-659-825
`TX 7-659-905
`TX 7-710-860
`TX 7-660-059
`TX 7-660-042
`TX 7-660-046
`TX 7-660-053
`TX 7-660-065
`TX 7-659-847
`TX 7-660-037
`TX 7-659-918
`TX 7-659-917
`TX 7-659-915
`TX 7-801-578
`TX 7-918-705
`TX 7-994-799
`TX 8-216-021
`TX 8-284-845
`TX 8-350-486
`TX 8-410-385
`TX-8-545-897
`TX 8-747-518
`TX 8-747-523
`TX 8-749-975
`TX 8-823-041
`TX 9-154-003
`TX 9-154-008
`TX 9-154-016
`TXu 2-335-442
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`27
`
`28
`
`
`
`
`
`7
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 8 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Splunk’s Partner Program
`
`22.
`
`Because different businesses have different types of data and use that data in
`
`different ways, Splunk built Splunk Enterprise to be a customizable software platform. In other
`
`words, Splunk Enterprise provides a flexible foundation upon which dashboards and software
`
`can be built for application- or use case-specific purposes, sometimes referred to as “solutions,”
`
`“apps,” or “add-ons.”
`
`23.
`
`For example, one company might be interested in monitoring the network traffic
`
`of all servers and computers on its computer network for cyber-security purposes. This company
`
`could use Splunk Enterprise to ingest network log data from all of its computers and servers, and
`
`10
`
`customize Splunk Enterprise so that its data analysis, monitoring, and visualization features are
`
`11
`
`catered to security issues—e.g., graphing incoming and outgoing network traffic, and providing
`
`12
`
`alerts for anomalous activities on the network. On the other hand, a different company may seek
`
`13
`
`to use Splunk Enterprise to handle different data for different reasons—e.g., a manufacturing
`
`14
`
`company may use Splunk Enterprise to ingest data from factory equipment to understand
`
`15
`
`mechanical performance and throughput in real time.
`
`16
`
`24.
`
`Splunk itself publishes solutions directed to various such purposes (e.g.,
`
`17
`
`customizations of and extensions to Splunk Enterprise that cater to advanced network threat
`
`18
`
`detection, digital customer experience, cloud monitoring, or manufacturing). Splunk also
`
`19
`
`supports and encourages third parties to develop on top of the Splunk platform in appropriate and
`
`20
`
`lawful ways, extending the features and functionality of the Splunk platform in accordance with
`
`21
`
`their own business needs or those of Splunk’s customers.
`
`22
`
`25.
`
`Indeed, Splunk maintains a Technology Alliance Partner (“TAP”) Program,
`
`23
`
`pursuant to which partners are provided a license to various software development tools and
`
`24
`
`interfaces (such as application programming interfaces, known as “APIs”) and other materials
`
`25
`
`and information in order to develop software that extends the features or functionality of Splunk
`
`26
`
`Enterprise. TAP partners are also granted a limited license to run Splunk Enterprise software for
`
`27
`
`related software development purposes.
`
`28
`
`
`
`
`
`8
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 9 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`26.
`
`To join the TAP Program, a third party must sign and execute a contract called the
`
`TAP Agreement. See Exhibit B.
`
`27.
`
`The license to Splunk Enterprise provided to Splunk TAP partners under the TAP
`
`Agreement is limited. In relevant part, the license provides TAP partners with “a nonexclusive,
`
`non-transferable, worldwide, non sublicensable license during the Term to download (and make
`
`up to five (5) copies) and use the Splunk software” for only two uses: (1) to “test the Splunk
`
`Software for purposes of developing TAP Extensions”; and (2) to “demonstrate the use of TAP
`
`Extensions with the Splunk Software to actual, potential or prospective Users.” Id., Section 3.3.
`
`Any use of the Splunk Software that is not in accordance with the Agreement is expressly
`
`10
`
`prohibited. Id., Section 4(h).
`
`11
`
`28.
`
`In particular, the TAP Agreement expressly prohibits a host of other activities.
`
`12
`
`For example, the TAP Agreement does not allow TAP partners to: “(a) copy any Splunk
`
`13
`
`Software (except as required to run the Splunk Software and for reasonable backup purposes);
`
`14
`
`(b) modify, adapt, or create derivative works of the Splunk Software; . . . (d) decompile,
`
`15
`
`disassemble or reverse engineer the Splunk Software, or determine or attempt to determine any
`
`16
`
`source code, algorithms, methods or techniques embodied in the Splunk Software, except to the
`
`17
`
`extent expressly permitted by applicable law notwithstanding a contractual prohibition to the
`
`18
`
`contrary; . . . [or] (f) attempt to disable or circumvent any license key or other technological
`
`19
`
`mechanisms or measures intended to prevent, limit or control use or copying of, or access to,
`
`20
`
`any materials included in the Splunk Software.” Id., Section 4.
`
`21
`
`29.
`
`As addressed in greater detail below, Cribl was formerly a Splunk partner
`
`22
`
`pursuant to a TAP Agreement. Prior to its termination, the TAP Agreement granted Cribl
`
`23
`
`permission to use Splunk Enterprise to develop software that extends Splunk Enterprise’s
`
`24
`
`features or functionality.
`
`25
`
`30.
`
`Splunk invests substantial resources into maintaining its TAP program and
`
`26
`
`supporting the work of its partners.
`
`27
`
`28
`
`
`
`31.
`
`For example, Splunk provides software that permits its partners to feed data into,
`
`or retrieve data from, an instance of Splunk Enterprise. Using this software, a Splunk partner
`COMPLAINT
`Case No._________
`
`9
`
`
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 10 of 85
`
`
`
`
`can develop software capable of sending data to, or retrieving data from, an instance of Splunk
`
`Enterprise. This software—known as the “HEC” protocol—reflects Splunk’s commitment to its
`
`partners: HEC is provided by Splunk to allow Splunk partners to develop software that works
`
`with Splunk Enterprise and extends its features and functionality.
`
`32.
`
`Although Splunk provides HEC for third parties to use, Splunk maintains other
`
`aspects of its software as proprietary. One example of such proprietary software is the “S2S”
`
`protocol. S2S stands for “Splunk-to-Splunk,” and this is software that Splunk itself uses to send
`
`data to, or receive data from, Splunk Enterprise and other Splunk software and technologies.
`
`Splunk does not support use of S2S by third parties, does not publish S2S’s source code, and
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`does not document S2S in a manner that facilitates third-party use of this protocol. As discussed
`
`11
`
`in greater detail herein, Splunk has improved the S2S protocol over time, as reflected in the
`
`12
`
`multiple versions of this protocol that Splunk has released.
`
`13
`
`14
`
`Cribl Was Founded to Capitalize on Splunk’s Technology and Success
`
`33.
`
`Defendant Clint Sharp is a former Senior Director of Product Management at
`
`15
`
`Splunk. As a senior Splunk employee, Mr. Sharp had access to a wide array of Splunk
`
`16
`
`proprietary and confidential information, including Splunk’s S2S protocol and code, and played
`
`17
`
`a significant role in Splunk’s technical organization. Before resigning from Splunk, in early
`
`18
`
`2017, unbeknownst to Splunk and without authorization, Mr. Sharp posted a derivation of
`
`19
`
`Splunk’s proprietary and confidential source code for version 3 of the S2S protocol to his
`
`20
`
`personal github webpage (a publicly accessible website for sharing source code). Mr. Sharp
`
`21
`
`named this derived code “go-S2S.”
`
`22
`
`34. Mr. Sharp created go-S2S by copying Splunk’s S2S version 3 protocol source
`
`23
`
`code without authorization to do so and creating a derivation of that code. At the time, Mr.
`
`24
`
`Sharp had access to this proprietary code only by virtue of his work for Splunk, but he did not
`
`25
`
`have authorization to post Splunk’s code on the Internet or to create new software derived from
`
`26
`
`it.
`
`27
`
`28
`
`
`
`35.
`
`Version 3 of Splunk’s S2S protocol source code is covered by Splunk’s valid and
`
`duly issued U.S. Copyright Registrations for Splunk Enterprise identified in Paragraph 21,
`COMPLAINT
`Case No._________
`
`10
`
`
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 11 of 85
`
`
`
`
`above, including, for example, U.S. Copyright Registration TXu 2-335-442, which covers one
`
`implementation of that version of the protocol.
`
`36.
`
`On information and belief, Mr. Sharp derived go-S2S from Splunk’s copyrighted
`
`source code with the intention of using it for his own personal financial gain at a different
`
`company. On information and belief, Mr. Sharp derived go-S2S from at least the code protected
`
`by the above-referenced U.S. Copyright Registrations.
`
`37.
`
`The Splunk S2S version 3 code that Mr. Sharp copied contained Splunk copyright
`
`headers indicating authorship and ownership information, reflecting Splunk’s copyright in and
`
`ownership of this code, but Mr. Sharp removed this information from the derived files that he
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`posted on his personal github page.
`
`11
`
`38.
`
`On March 24, 2017, a few months after his initial copying of Splunk’s source
`
`12
`
`code, Mr. Sharp resigned from Splunk to co-found Cribl with Dritan Bitincka and Ledion
`
`13
`
`Bitincka—both former software architects at Splunk. On information and belief, Mr. Sharp’s
`
`14
`
`plan was to build a business using the code he had taken from Splunk. For example, Mr. Sharp
`
`15
`
`and Cribl sought to capitalize on their access to the S2S version 3 protocol, which until Mr.
`
`16
`
`Sharp’s misappropriation, had been in Splunk’s exclusive control.
`
`17
`
`39.
`
`Cribl was incorporated in May 2017 and released its first software product,
`
`18
`
`“LogStream,” now known as “Stream,” in October 2018. (Hereinafter, both “LogStream” and
`
`19
`
`“Stream” are referred to as “Stream.”)
`
`20
`
`40.
`
`On information and belief, go-S2S, and/or other source code copied or derived
`
`21
`
`from Splunk’s Splunk Enterprise source code, is currently used within Stream and has been used
`
`22
`
`within Stream since its release. On information and belief, Clint Sharp provided this code to
`
`23
`
`Cribl for its use within Stream, and, to this day, has encouraged and induced Cribl’s use of this
`
`24
`
`code. On information and belief, Mr. Sharp has done so with knowledge that go-S2S was an
`
`25
`
`unlicensed derivative of Splunk’s copyrighted S2S version 3 code.
`
`26
`
`41.
`
`On information and belief, each new version of Cribl’s Stream software includes
`
`27
`
`a new copy of this unlicensed derivative of Splunk’s copyrighted S2S version 3 code.
`
`28
`
`
`
`
`
`11
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 12 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`42.
`
`In or around December 2018, Mr. Sharp added an open-source MIT license to the
`
`go-S2S source code on his personal github webpage, falsely identifying himself as the author
`
`and/or owner of the copyright in the go-S2S code, and falsely providing open-source terms for
`
`use of the go-S2S code, despite its derivation from Splunk’s proprietary source code. In fact,
`
`Mr. Sharp was not the author or owner of the copyright in go-S2S, nor did he have any authority
`
`to license the go-S2S code, which was an unlawful and unlicensed derivation of Splunk’s source
`
`code.
`
`43.
`
`On information and belief, Mr. Sharp added this false license to the go-S2S code
`
`to obscure his own unlawful copying of Splunk’s copyrighted source code.
`
`10
`
`44. Mr. Sharp maintained the go-S2S code online until at least December 2021,
`
`11
`
`thereby distributing a derivation of Splunk’s copyrighted source code to the public and providing
`
`12
`
`the public with false information regarding the copyright authorship and ownership of this code.
`
`13
`
`45.
`
`Cribl’s Stream software is and has been marketed primarily to Splunk customers.
`
`14
`
`Indeed, Cribl relies heavily on its Splunk experience in its advertisements and boasts about its
`
`15
`
`ability to “speak… S2S.” See Exhibit C (excerpts of https://cribl.io/blog/3-ways-logstream-can-
`
`16
`
`improve-your-data-agility/).
`
`17
`
`46.
`
`A primary function of Stream is to filter the data that Splunk customers send to a
`
`18
`
`Splunk Enterprise instance. In essence, Cribl’s Stream sits between a Splunk customer’s sources
`
`19
`
`of machine data and that customer’s Splunk Enterprise instance. Instead of flowing directly
`
`20
`
`from data sources into Splunk Enterprise, data flows into Stream. Stream can then filter this data
`
`21
`
`before it is passed along to Splunk Enterprise, with a goal of reducing the total volume of data a
`
`22
`
`customer adds to its Splunk Enterprise instance.
`
`23
`
`47.
`
`On information and belief, Cribl has used its illicitly obtained support for the S2S
`
`24
`
`version 3 protocol as a means to convince Splunk’s customers to buy software and services from
`
`25
`
`Cribl. On information and belief, Cribl’s ability to get a foothold in the market depended upon
`
`26
`
`its ability to make available and support the S2S version 3 protocol, which it implemented using
`
`27
`
`Splunk’s proprietary source code without authorization.
`
`28
`
`
`
`
`
`12
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 13 of 85
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`48.
`
`For example, by building S2S support into Cribl’s software using misappropriated
`
`Splunk source code, rather than using the authorized HEC functionality that Splunk makes
`
`available to its partners, Cribl facilitated its sales efforts to Splunk’s customers. Splunk had
`
`invested significant resources in creating and facilitating the creation of customer environments
`
`in which Splunk’s customers used the S2S protocol to transmit data to Splunk. Some of these
`
`environments contained a very large number of data source endpoints configured to transmit data
`
`to Splunk Enterprise via S2S. On information and belief, Cribl targeted and continues to target
`
`Splunk customers with S2S environments on the basis of its illicitly obtained S2S support.
`
`49.
`
`For example, on information and belief, Cribl advertised to Splunk customers that
`
`10
`
`it was able to greatly simplify the process of deploying its Stream software to Splunk customers
`
`11
`
`who were already configured to transmit data to Splunk via S2S. According to Cribl, its support
`
`12
`
`for S2S meant that Splunk customers seeking to use Cribl’s software would not need to spend
`
`13
`
`time or money reconfiguring their customer environment to support a non-S2S protocol (such as
`
`14
`
`HEC). Indeed, Cribl advertises to this day that it can “receive data from whatever you [a Splunk
`
`15
`
`customer] already have in place,” including the “S2S protocol.” Exhibit C
`
`16
`
`(https://cribl.io/blog/3-ways-logstream-can-improve-your-data-agility/).
`
`17
`
`50.
`
`On information and belief, Cribl’s illicit support for Splunk’s S2S protocol
`
`18
`
`continues to be an important part of Cribl’s marketing to customers and potential customers. As
`
`19
`
`set forth in greater detail in this Complaint, as of November 9, 2022, Cribl publicly announced
`
`20
`
`that it had added support for version 4 of Splunk’s S2S protocol to its software. Cribl’s public
`
`21
`
`announcement did not, however, advise its customers and potential customers that Cribl has no
`
`22
`
`right or license to version 4 of the S2S protocol. Indeed, on information and belief, the only way
`
`23
`
`in which Cribl could have added support for version 4 of the S2S protocol is by reverse
`
`24
`
`engineering Splunk software or otherwise using Splunk software in contravention of the licenses
`
`25
`
`Splunk makes available for that software, and/or through unlicensed and unauthorized use of
`
`26
`
`confidential Splunk materials including copyrighted source code. This copyrighted source code
`
`27
`
`is covered by Splunk’s valid and duly issued U.S. Copyright Registrations for Splunk Enterprise
`
`28
`
`
`
`
`
`13
`
`COMPLAINT
`Case No._________
`
`

`

`Case 3:22-cv-07611 Document 1 Filed 12/02/22 Page 14 of 85
`
`
`
`
`identified in Paragraph 21 that correspond to the versions of Splunk Enterprise that support S2S
`
`version 4.
`
`Cribl’s Continued Misappropriation and Unlawful Acts
`
`51.
`
`Splunk was initially unaware that Mr. Sharp misappropriated S2S source code in
`
`2017, and permitted Cribl to join Splunk’s TAP Program in 2018.
`
`
`
`
`52. While it was a member of the TAP Program, Cribl held itself out to Splunk as a
`
`
`
`“partner,” while surreptitiously misappropriating critical information from Splunk and seeking to
`
`undermine its reputation a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket