
Normalize event fields in ITSI
Normalizing event fields lets you search similar alerts across multiple alert sources much more easily. It also standardizes methods for "grooming" alerts, regardless of their source.
Normalize entity fields
Add a new alias field called entity_name
to every entity which might be used as the Entity Lookup field in a notable event correlation search. As a best practice, add entity_name
to each entity as an alias containing the title of the entity.
- Click Configure > Entities.
- Click Create Entity > Import from Search.
- Enter the following ad-hoc search:
| inputlookup itsi_entities | eval entity_name=title
- Click Next.
- For the
entity_name
row, change the Import Column As field toEntity Title
. Leave all others asDo Not Import
- Make sure Conflict Resolution is set to
Update Existing Entities
. - Click Import.
After the import completes, click View All Entities, then select any entity. It should have an alias field entity_name
which contains the name of the entity itself. This field can be used for all notable event correlation searches as the Entity Lookup Field
PREVIOUS Set up custom episode actions in ITSI |
NEXT Manage notable events in ITSI |
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5
Feedback submitted, thanks!