Splunk IT Service Intelligence

Grouping ITSI correlation searches

noorna
New Member

Hi,

I'm trying to reduce the incidents in our environment as a part of which trying to group the events if they have similar fields and error messages. As a part of which I have below

itsi_entity=xxx (hostname)

itsi_correlation_key=alertname."~".fingerprint (finger print is a unique for each alert)

Now in my environment, have multiple hosts which may generate same alert

My search is working well when it comes to single host where it is giving correlation key like below

itsi_entity- xxx

itsi-correlation-key-spacealert ~6089797
itsi_message : Nodes affected: xxx description:space alert

If an itsi_entity is having multiple hosts which are impacted then it looks below

itsi-entity- abc,xvz,def

itsi-correction-key - null (does not display anything)

itsi-message: Nodes affected abc,xvz,def description:high Cpu alert

 

I need some help here to display the correlation key if the entity has multiple values.

 

 

 

 

 

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...