Part 1: Getting Started with AIOps: Event Correlation Basics and Alert Storm Detection in Splunk IT Service Intelligence
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark Topic
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
LesediK

Splunk Employee
09-14-2022
02:16 PM
Part 1 | Getting Started with AIOps:
Event Correlation Basics and Alert Storm Detection in Splunk IT Service Intelligence
Video Player is loading.
Current Time 0:00
/
Duration 0:00
Loaded: 0%
Stream Type LIVE
Remaining Time -0:00
1x
- Chapters
- descriptions off, selected
- captions settings, opens captions settings dialog
- captions off, selected
This is a modal window.
Beginning of dialog window. Escape will cancel and close the window.
End of dialog window.
This is a modal window. This modal can be closed by pressing the Escape key or activating the close button.
WATCH NOW
You’ll learn how to leverage the Content Pack for Monitoring and Alerting with ITSI to quickly create and group notable events from ITSI services & 3rd party monitoring tools, and answer questions like:
- Is the volume of incoming alerts higher, lower, or the same as what I typically see?
- Which hosts, checks, KPIs, and Services are contributing to the highest volumes of alerts and episodes?
- During an alert storm, what types of alerts are major contributors to the sudden increase in alert volume?
Want to Learn More?
Part 2 | Diving Deeper With AIOps
Getting the Most Out of Event Correlation and Alert Storm Detection in Splunk IT Service Intelligence
Labels
2 Comments
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.