Splunk Tech Talks
Deep-dives for technical practitioners.

Part 1: Getting Started with AIOps: Event Correlation Basics and Alert Storm Detection in Splunk IT Service Intelligence

LesediK
Splunk Employee
Splunk Employee

Part 1 | Getting Started with AIOps:
Event Correlation Basics and Alert Storm Detection in Splunk IT Service Intelligence

LesediK_7-1676518142760.png

 

Video Player is loading.
Current Time 0:00
Duration 0:00
Loaded: 0%
Stream Type LIVE
Remaining Time 0:00
 
1x
    • Chapters
    • descriptions off, selected
    • captions off, selected
      (view in My Videos)

      WATCH NOW 

       You’ll learn how to leverage the Content Pack for Monitoring and Alerting with ITSI to quickly create and group notable events from ITSI services & 3rd party monitoring tools, and answer questions like:

      • Is the volume of incoming alerts higher, lower, or the same as what I typically see?
      • Which hosts, checks, KPIs, and Services are contributing to the highest volumes of alerts and episodes?
      • During an alert storm, what types of alerts are major contributors to the sudden increase in alert volume?

       

      LesediK_7-1676518142760.png

      Want to Learn More? 

      Part 2 | Diving Deeper With AIOps

      Learn More

      Getting the Most Out of Event Correlation and Alert Storm Detection in Splunk IT Service Intelligence

       

       

      Get Updates on the Splunk Community!

      Developer Spotlight with Brett Adams

      In our third Spotlight feature, we're excited to shine a light on Brett—a Splunk consultant, innovative ...

      Index This | What can you do to make 55,555 equal 500?

      April 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

      Say goodbye to manually analyzing phishing and malware threats with Splunk Attack ...

      In today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware ...