Splunk ITSI

Grouping ITSI correlation searches

noorna
New Member

Hi,

I'm trying to reduce the incidents in our environment as a part of which trying to group the events if they have similar fields and error messages. As a part of which I have below

itsi_entity=xxx (hostname)

itsi_correlation_key=alertname."~".fingerprint (finger print is a unique for each alert)

Now in my environment, have multiple hosts which may generate same alert

My search is working well when it comes to single host where it is giving correlation key like below

itsi_entity- xxx

itsi-correlation-key-spacealert ~6089797
itsi_message : Nodes affected: xxx description:space alert

If an itsi_entity is having multiple hosts which are impacted then it looks below

itsi-entity- abc,xvz,def

itsi-correction-key - null (does not display anything)

itsi-message: Nodes affected abc,xvz,def description:high Cpu alert

 

I need some help here to display the correlation key if the entity has multiple values.

 

 

 

 

 

Labels (2)
0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...