Splunk Search

ITSI Grouping

nikitakapoor109
New Member

Hi,

I am using ITSI grouping feature where we need to match the eventid from the two indexes of ITSI, index=itsi_notable_audit and index=itsi_tracked_alerts. The issue is that itsi_notable_audit index is taking the group id ( which groups similar events) as event_id whereas itsi_tracked_alerts is taking eventid of every event not by group.

Now I want to compare the event_id from both the indexes but i cant do so because of itsi grouping. Please help/advice.

thanks

Tags (2)
0 Karma

yannK
Splunk Employee
Splunk Employee

The field "event_id" is mostly used for the notable events, in the itsi_tracked_alerts field.
but in versions older than 3.* it was also used for the group id in the index=itsi_grouped_alerts, and since 4.* for the Episodes ids too.
This can be confusions, as there is also an itsi_group_id field and when you use the API, the id may be referring to the notable or to the group...

The best way to avoid confusion is to do an eval or a rename to create a second field group_id to avoid confusion, depending of the context of the data.

0 Karma

nikita_p
Contributor

Hi renjith.nair,
Have u checked splunk docs below? This might help you.
http://docs.splunk.com/Documentation/ITSI/4.0.0/User/EnableSmartMode

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...