Splunk® IT Service Intelligence

Use Splunk IT Service Intelligence

Download manual as PDF

Download topic as PDF

Overview of Episode Review in ITSI

Use Episode Review to see a unified view of all your service-impacting alerts. Episode Review displays episodes (groups of notable events) and their current status.

EpisodeReview.png

A notable event represents an anomalous incident detected by an ITSI multi-KPI alert, a correlation search, or anomaly detection algorithms. For example, a notable event can represent:

  • An alert that ITSI ingests from a third-party product into the itsi_tracked_alerts index.
  • A single KPI (such as cpu_load_percent) that exceeds a pre-defined threshold.
  • The result of a multi-KPI alert that correlates the status of multiple KPIs based on multiple trigger conditions.
  • The result of a correlation search that looks for relationships between data points.
  • An anomaly that has been detected when anomaly detection is enabled.

An episode represents a group of events occurring as part of a larger sequence (an incident or period considered in isolation).

As an analyst, you can use Episode Review to gain insight into the severity of episodes occurring in your system or network. You can use the console to triage new episodes, assign episodes to analysts for review, and examine episode details for investigative leads.

As an administrator, you can manage and customize Episode Review and episode settings.

You can perform actions on episodes, including running a script, sending an email, creating a ticket in ServiceNow or Remedy (if configured), adding a link to a ticket in an external system, and any other custom actions that are configured. You can also automatically perform actions on episodes through the use of notable event aggregation policies. See Notable event aggregation policies overview for ITSI for more information.

Note: Monitor episodes and actions in Episode Review with the Event Analytics Audit dashboard. For more information, see Event Analytics Audit dashboard in this manual.

Episode management workflow

You can use this example workflow to triage and work on episodes in Episode Review:

  1. An IT operations analyst monitors the Episode Review, sorting and performing high-level triage on newly-created episodes.
  2. When an episode warrants investigation, the analyst acknowledges the episode, which moves the status from New to In Progress.
  3. The analyst researches and collects information on the episode using the drilldowns and fields in the episode details. The analyst records the details of their research in the Comments section of the episode.
  4. If the analyst cannot immediately find the root cause of the episode, the analyst might open a ticket in Remedy or ServiceNow.
  5. After the analyst has addressed the cause of the episode and any remediation tasks have been escalated or solved, the analyst sets the episode status to Resolved.
  6. The analyst assigns the episode to a final analyst for verification.
  7. The final analyst reviews and validates the changes made to resolve the episode, and sets the status to Closed.

When you close an episode created by an aggregation policy, this breaks the episode (no more events can be added to it) even if the breaking criteria specified in the aggregation policy were not met.

PREVIOUS
Investigate a service with poor health in ITSI
  NEXT
Triage episodes in ITSI

This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.1.0, 4.1.1, 4.1.2, 4.1.5, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.3.0, 4.3.1


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters