Splunk ITSI

How to aggregation one notable event to different episodes in ITSI ?

zhulongshiny
Engager

I configured two aggregation rules :by entity and by service,
This is because our system group needs to see host-based alerts, but the business group wants to see service-based alerts.
In the configuration preview, the rules can take effect normally. But in the episode review,the events will only be aggregated according to the service.

The document says that it is possible to aggregation multiple rules for an event :
https://docs.splunk.com/Documentation/ITSI/4.1.2/Configure/CreateAggregationPolicies
When creating a new policy, be mindful of the policies that have already been created. Multiple aggregation policies can be created with filtering criteria that capture the same set or subset of events. If the same notable events are captured by more than one policy, the action rules from each policy are applied to the notable events.

0 Karma

szhou_splunk
Splunk Employee
Splunk Employee

You can create 2 aggregation policies with the same filtering criteria, and 1st one use service as split by, and 2nd one use entity as split by.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...