Splunk Search

ITSI Grouping

nikitakapoor109
New Member

Hi,

I am using ITSI grouping feature where we need to match the eventid from the two indexes of ITSI, index=itsi_notable_audit and index=itsi_tracked_alerts. The issue is that itsi_notable_audit index is taking the group id ( which groups similar events) as event_id whereas itsi_tracked_alerts is taking eventid of every event not by group.

Now I want to compare the event_id from both the indexes but i cant do so because of itsi grouping. Please help/advice.

thanks

Tags (2)
0 Karma

yannK
Splunk Employee
Splunk Employee

The field "event_id" is mostly used for the notable events, in the itsi_tracked_alerts field.
but in versions older than 3.* it was also used for the group id in the index=itsi_grouped_alerts, and since 4.* for the Episodes ids too.
This can be confusions, as there is also an itsi_group_id field and when you use the API, the id may be referring to the notable or to the group...

The best way to avoid confusion is to do an eval or a rename to create a second field group_id to avoid confusion, depending of the context of the data.

0 Karma

nikita_p
Contributor

Hi renjith.nair,
Have u checked splunk docs below? This might help you.
http://docs.splunk.com/Documentation/ITSI/4.0.0/User/EnableSmartMode

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...