Hello everyone
Now I'm trying to configure the alert of Multi-KPI and Single-KPI. But I don't have any idea about how to configure the correlation search to create the notable events for the status change of the single KPI (e.g. one KPI like CPU utilization or Memory usage in 1 service).
Could anyone teach me how to setup the correlation search for Single KPI in ITSI?
Thank you
Hi!
Check out https://docs.splunk.com/Documentation/CPITSIMonitorAlert/2.2.0/CP/About for how to get started with correlation searches. This will give you the tools you need. For example "Service Monitoring - Sustained KPI Degradation (Recommended)" can be a good start.
To filter to specific to a specific service and or KPI use something like
| mstats latest(*) as * where index=itsi_summary_metrics
[| `service_kpi_list`
| search service_name="*" kpi_name=*
| fields kpiid
| rename kpiid as itsi_kpi_id
| format ] by host span=1m
is_entity_in_maintenance
is_service_aggregate
is_service_disabled
is_service_in_maintenance
is_service_max_severity_event
itsi_kpi_id
itsi_service_id
itsi_team_id
kpi_base_search
kpi_importance
## OR from event index
index=itsi_summary [|`service_kpi_list` | search service_name="*" kpi_name=* | fields kpiid | format ]
| lookup service_kpi_lookup _key as itsi_service_id OUTPUT title as service_name
| table _time kpi, alert_*, entity_* service*,indexed_is_service_aggregate
/Seb