Splunk® IT Service Intelligence

Install and Upgrade Manual

Acrobat logo Download manual as PDF

Acrobat logo Download topic as PDF

Configure indexes in ITSI

IT Service Intelligence (ITSI) implements custom indexes for event storage. All ITSI indexes are listed in $SPLUNK_HOME/etc/apps/SA-IndexCreation/default/indexes.conf.

  • In a single instance deployment, the installation of ITSI creates the indexes in the default path for data storage.
  • In a Splunk Cloud deployment, customers work with Splunk Support to set up, manage, and maintain their cloud index parameters. See Manage Splunk Cloud indexes in the Splunk Cloud User Manual.
  • In a distributed deployment, create the indexes on all Splunk platform indexers or search peers.

For detailed examples of configuring indexes, see indexes.conf.example in the Splunk Enterprise Admin Manual.

ITSI-specific indexes

The following table describes the indexes available in $SPLUNK_HOME/etc/apps/SA-IndexCreation/default/indexes.conf:

Index Description
itsi_summary Stores the results of scheduled KPIs searches. Summary indexing lets you run fast searches over large data sets by spreading out the cost of a computationally expensive report over time.
itsi_summary_metrics A metrics index that stores the results of scheduled KPI searches. Every KPI is summarized in both the itsi_summary events index and the metrics index. This index improves the performance of the searches dispatched by ITSI, particularly for very large environments.
anomaly_detection An internal index used to support trending and cohesive anomaly detection in ITSI.
itsi_tracked_alerts Stores active raw notable event data.
itsi_notable_audit Stores all audit events for episodes, including actions, comments, status change, and owner change.
itsi_notable_archive Stores episode metadata (tags and comments) that has been moved from the KV store after a default 6 month retention period, which begins when you close an episode in the UI. Moving data from the KV store removes extraneous data and helps improve performance.
itsi_grouped_alerts Stores active episode data.
snmptrapd Stores events coming in from SNMP traps. For more information, see Ingest SNMP traps into ITSI.
Last modified on 17 June, 2020
PREVIOUS
Install IT Service Intelligence in a search head cluster environment
  NEXT
Uninstall Splunk IT Service Intelligence

This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.6.0 Cloud only, 4.6.1 Cloud only, 4.6.2 Cloud only, 4.7.0


Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters