Splunk® IT Service Intelligence

Event Analytics Manual

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

About the default aggregation policy in ITSI

The default aggregation policy in IT Service Intelligence (ITSI) groups notable events that don't match the filtering criteria of any other policies you create. If you don't want to create your own aggregation policies, use the default policy to group events. You can't delete or disable the default policy. For more information about aggregation policies in ITSI, see Overview of aggregation policies in ITSI.

Only a user assigned the itoa_admin role, or a role that inherits from itoa_admin, can modify the default aggregation policy.

The default aggregation policy has the following characteristics:

    • Doesn't include any filtering criteria. The default policy catches events not captured by the filtering criteria of any other aggregation policies, so you can't add any.
    • Splits events into multiple episodes by the source field. You can change the field that is used to split events, specify more than one field by which to split events, or choose to not split events by not specifying a field name.
    • The episode breaks if the flow of events is paused for 7200 seconds (2 hours). You can change the length of time or modify the breaking criteria.
    • Episode information such as Episode Title, Episode Description, and Episode Severity are set to be the same as the first event in the episode.
    • No action rules are defined.

To view or modify the default aggregation policy, click Configuration > Notable Event Aggregation Policies > Default Policy.

The default policy doesn't have Smart Mode enabled by default. For information about Smart Mode, see Group similar events with Smart Mode in ITSI.

Last modified on 28 April, 2023
PREVIOUS
Overview of aggregation policies in ITSI
  NEXT
Configure episode filtering and breaking criteria in ITSI

This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.11.0, 4.11.1, 4.11.2, 4.11.3, 4.11.4, 4.11.5, 4.11.6, 4.12.0 Cloud only, 4.12.1 Cloud only, 4.12.2 Cloud only, 4.13.0, 4.13.1, 4.13.2, 4.13.3, 4.14.0 Cloud only, 4.14.1 Cloud only, 4.14.2 Cloud only, 4.15.0, 4.15.1, 4.15.2, 4.15.3, 4.16.0 Cloud only, 4.17.0, 4.17.1, 4.18.0, 4.18.1


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters