Splunk IT Service Intelligence

How to get adaptive threshold without using ITSI for Splunk?



I have around 300 KPIs whose variation over time is needed to be monitored. The deviation and count of the KPI are not uniform across all the 300 KPIs. The requirement is that Splunk should set a threshold for each of the KPIs by itself. I'm aware that this capability is available in ITSI but I don't have the scope to use ITSI.
Is there a way to achieve that? Also, would like to know what's the best way to set visualization for such a huge number of KPIs.



It sounds like a combination of relative_time and pushing the results to a summary index would do the trick.

You would need to a scheduled search that looks at the past 30 days to determine a normal baseline then have another scheduled search which will push the hourly counts into the summary index. You can than craft an alert query to determine a number of standard deviations from the mean

0 Karma

Path Finder

@MousumiChowdhury, Summary indexing all 300 kpis may be the best option here.

  1. Write 300 KPI search results every hour to same summary index.
  2. If all 300 kpi are already scheduled and want to avoid modifying them all, try running a different scheduled search that scans for all 300 SIDs from internal logs and use map command with loadjob to load all results in single shot into a summary index.
  3. Summary index should have kpiname and its measure value in each result
  4. Run a search on summary index, use streamstats to measure running avg of past 30 days for each kpi and measure current values deviation, filter the results for curent time period and sort by deviation and show top results or results higher than a threshold. (Trellis layout with single value will give same look as ITSI service overview but there is a limit of 20 results)
0 Karma


@MousumiChowdhury, for adaptive Thresholding, I would say you would need two things:

1) Machine Learning Toolkit(https://splunkbase.splunk.com/app/2890/) for setting up Outlier/Statndard Deviation thresholds (you can start off with trivial statistical thresholds. (For example: Hourly 2nd Standard Deviation for every hour of the week based on historical data from last 1-2 years etc).
2) Ample Historic Data (Which implies Summary Indexing/Accelerated Data Model for hitorical searches to return results fast)

While viewing KPIs in a single place you should determine whether you need to see all 300 at the same time or may be broken out by either Type of Service, Type of KPI, Type of Server etc. That way while you will have capability to monitor everything you will not load all of them at the same time. (I have not used ITSI, but I think even ITSI by default shows you 50 KPIs in a single place).

| makeresults | eval message= "Happy Splunking!!!"
0 Karma


Hi @niketnilay,

There is no scope to group the KPIs. I need to display only those top KPIs where there is a significant deviation. I can't figure out the search how to do that. My use case is like: I have to compare the count of my KPI at a certain hour of current day with the average count of that KPI over past 30 days or so for the same hour and calculate the deviation. I hope my use case is understandable.


0 Karma
Get Updates on the Splunk Community!

Optimize Cloud Monitoring

  TECH TALKS Optimize Cloud Monitoring Tuesday, August 13, 2024  |  11:00AM–12:00PM PST   Register to ...

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...