
Normalize alerts with correlation search templates in ITSI
IT Service Intelligence (ITSI) ships with several predefined correlation search templates to help you normalize alerts from common third-party systems. Leverage these searches when creating a correlation search to bring third-party alerts into ITSI and normalize them as notable events. For more information about correlation searches, see Overview of correlation searches in ITSI.
Prerequisites
Requirement | Description |
---|---|
ITSI role | You must have the write_itsi_correlation_search capability to create a correlation search. The itoa_admin and itoa_team_admin ITSI roles have this capabilities by default. |
Ingest third-party data | You must be ingesting data from the corresponding third-party alerting system into Splunk Enterprise in order to normalize it in ITSI. Optionally, you can install the related Splunk add-on for that system. The table below lists the add-ons related to each search, if available. |
Access correlation search templates
All third-party search templates are available within the correlation search creation workflow. To leverage a template, perform the following steps:
- From the ITSI main menu, click Configuration > Correlation Searches.
- Click Create New Search > Create Correlation Search.
- Provide a name and description for the search.
- For Search Type, choose Predefined.
- Click Select a Search and choose from one of the predefined search templates described below.
- Click Select an index and choose an index to use for the search.
- Configure the rest of the correlation search to normalize the third-party alert fields. For instructions, see Ingest third-party alerts into ITSI.
Available correlation search templates
Choose from the following correlation search templates to bring third-party alerts into ITSI:
Search name | Search | Description |
---|---|---|
BMC TrueSight Events |
|
BMC Truesight (patrol, msend) stateful events. Deduplicated by alias_host , alias_parameter , Msg .
|
MuleSoft Events |
|
MuleSoft stateful related events, filtering out severity=INFO, deduplicated by source .
|
Nagios Events |
|
Nagios stateful performance events. Filtering by sourcetype=nagiosserviceperf, deduplicated by consecutive , src_host , severity , name .Add-on: Splunk Add-on for Nagios Core |
Netcool Events |
|
Netcool stateful performance events. Deduplicated by consecutive , itsi_host , itsi_alertID , itsi_alertKey .
|
NewRelic Events |
|
New Relic stateful events. Filtering by sourcetype=newrelic*, deduplicated by transaction_name , health_status .Add-on: Splunk Add-on for New Relic |
ScienceLogic em7 |
|
ScienceLogic em7 stateful events. Deduplicated by em7_var_evententityname , em7_var_alertid (used by notable event identifier fields).
|
SolarWinds Events |
|
SolarWinds stateful events, not performance metrics. Deduplicated by NodeName , eventtype , StatusDescription .Add-on: SolarWinds Add-on for Splunk |
Unix or Linux Events |
|
Unix and Linux-based stateful events using the field Status as severity. If clearing events (Up) are being ingested, remove the filter for status=Stopped (clearing events can be used to automatically clear notable events). Deduplicated by host , status , and Description .Add-on: Splunk Add-on for Unix and Linux |
WinEvent:System or WinEvent:Application |
|
Windows-based stateful events from winevents:system and winevents:application. Filtering out informational events and deduplicated on Message , host , and orig_event_id . |
AppDynamics
Search name | Search | Description |
---|---|---|
Events |
|
AppDynamics stateful events based on the ingest events from AppDynamics, using spath to expand the key-value pairs into single fields. Deduplicated by itsi_triggeredEntity , itsi_application , and itsi_subType .Add-on: Splunk Add-on for AppDynamics |
Health Rule Violations |
|
AppDynamics health rule stateful violations based on the ingest of health rule events from AppDynamics, using spath to expand the key-value pairs into single fields. Deduplicated on healthrule_violations{}.affectedEntityDefinition.entityId and healthrule_violations{}.deepLinkUrl .Add-on: Splunk Add-on for AppDynamics |
PREVIOUS Ingest third-party alerts into ITSI |
NEXT Ingest SNMP traps into ITSI |
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.6.0 Cloud only, 4.6.1 Cloud only, 4.6.2 Cloud only, 4.7.0, 4.7.1, 4.7.2, 4.8.0 Cloud only, 4.8.1 Cloud only
Feedback submitted, thanks!