Configure Event Analytics for federated search head in ITSI
Federated search can be configured with ITSI Event Analytics to ingest events from a remote search head provider, and get notable events to a federated search head.
Prerequisites
Requirement | Description |
---|---|
Turn on federated search | You must have federated search turned on. |
Configure federated search
Follow these steps to configure federated search. For more extensive steps, see About Federated Search for Splunk.
- On the remote federated provider, create the federatedrole role, with admin inheritance.
- On the remote federated provider, create a user called federateduser that has the federatedrole role.
- On the federated search head, select Settings then Federated search.
- Select Add federated provider.
- Set the Provider mode to the Transparent mode.
- Enter a provider name and set the remote host with a management port. For example,
federatedprovider.splunkcloud.com:8089
- Provide the username and password credentials of the federateduser account.
- Select Test connection to verify the search, then select Save.
Disable the Rules Engine and correlation searches
Real-time searches are currently not supported in federated search mode. Any events stored in itsi_tracked_alerts will not be found by the itsi_event_grouping search. However, the events will be found by the ITSI Rules Engine periodic backfill searches, which run every 12 minutes.
To ensure that event grouping on the federated search head does not conflict with the remote federated provider and create duplicates, turn off the Rules Engine and remove correlation searches from the remote federated provider. To turn off the Rules Engine on the executor node so it doesn't run locally, follow these steps.
- On the Executor node, select Settings then Searches, reports, and alerts.
- Change the App: context to All.
- Search for the itsi_event_grouping search. The Rules Engine runs when this search is turned on.
- In the Actions column, select Edit then Disable to turn off the Rules Engine on the executor node.
Configure correlation searches on the federated search head to query remote indexes
Once federated search is configured, you can create correlation searches.
For example, when you create a correlation search that searches the main index, the scheduled search finds all of the events which are sent to the federated search head's itsi_tracked_alerts as notable events.
Note: Events directly ingested to the remote providers will not be found by the realtime search. Only ingest these events to the federated search head.
Overview of correlation searches in ITSI | Generate events with correlation searches in ITSI |
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.19.0, 4.19.1
Feedback submitted, thanks!