Splunk ITSI

Grouping ITSI correlation searches

noorna
New Member

Hi,

I'm trying to reduce the incidents in our environment as a part of which trying to group the events if they have similar fields and error messages. As a part of which I have below

itsi_entity=xxx (hostname)

itsi_correlation_key=alertname."~".fingerprint (finger print is a unique for each alert)

Now in my environment, have multiple hosts which may generate same alert

My search is working well when it comes to single host where it is giving correlation key like below

itsi_entity- xxx

itsi-correlation-key-spacealert ~6089797
itsi_message : Nodes affected: xxx description:space alert

If an itsi_entity is having multiple hosts which are impacted then it looks below

itsi-entity- abc,xvz,def

itsi-correction-key - null (does not display anything)

itsi-message: Nodes affected abc,xvz,def description:high Cpu alert

 

I need some help here to display the correlation key if the entity has multiple values.

 

 

 

 

 

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...

Cloud Platform & Enterprise: Classic Dashboard Export Feature Deprecation

As of Splunk Cloud Platform 9.3.2408 and Splunk Enterprise 9.4, classic dashboard export features are now ...