Splunk ITSI

How to change notable event aggregation policy for a set of episodes?

PotatoDataUser
Explorer

My team has setup with correlation_search_1, service1 creating notable events that have the notable event aggregation policy - policy1. 

Now I made additions, correlation_search2, service2 and policy2.

But when I went to the episodes review window I find out that notable event episodes from search2 are still using policy1, how do I get these set of episodes to follow policy2 without disturbing the previous setup following policy1, I cant find any setting that allows me to do so, please help where I can find this if it exists.

Labels (1)
0 Karma

jg91
Path Finder

If you want to use different policies for different correlation searches, You should add some filtering criteria in your second Notable Event Aggregation Policy (NEAP). For example you can use search_name (or source) matches correlation_search2 in include the events if section of Filtering Criteria and Instructions tab in your second NEAP.
5734be35-c327-43cf-87eb-78bbc3883cb9.png

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...