Splunk IT Service Intelligence

Grouping ITSI correlation searches

noorna
New Member

Hi,

I'm trying to reduce the incidents in our environment as a part of which trying to group the events if they have similar fields and error messages. As a part of which I have below

itsi_entity=xxx (hostname)

itsi_correlation_key=alertname."~".fingerprint (finger print is a unique for each alert)

Now in my environment, have multiple hosts which may generate same alert

My search is working well when it comes to single host where it is giving correlation key like below

itsi_entity- xxx

itsi-correlation-key-spacealert ~6089797
itsi_message : Nodes affected: xxx description:space alert

If an itsi_entity is having multiple hosts which are impacted then it looks below

itsi-entity- abc,xvz,def

itsi-correction-key - null (does not display anything)

itsi-message: Nodes affected abc,xvz,def description:high Cpu alert

 

I need some help here to display the correlation key if the entity has multiple values.

 

 

 

 

 

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...