Group related alerts with ITSI

Group related alerts to reduce alert noise

Gain a holistic understanding of issues in the ITSI environment

Lauren can use aggregation policies in ITSI to group alerts logically for faster tracking and troubleshooting while viewing details in the Service Analyzer and Alerts and Episodes Review dashboards that are part of ITSI.

Lauren also knows that when Splunk Observability Cloud alerts are integrated with ITSI, a holistic understanding of Observability events, which are not the same as notable events tracked by ITSI, can help with problem diagnosis and troubleshooting.

Observability events provide context for point-in-time occurrences and display as overlays atop familiar dashboards, complete with event markers that show the start and end times of a given event.

Example of Observability events display

To access event data by creating an alert sent directly from ITSI to Splunk Observability Cloud and leverage the capability of event analytics in ITSI, Lauren does the following:

  1. Installs Splunk Observability Cloud Alert Action for Splunk.
  2. Pastes the Observability API token into the Configuration field of that app.
  3. Runs a correlation search.
  4. Creates an alert based on search results.
  5. Chooses fields such as app_name, eventtype, and detectorID from the search results to add as dimensions included with events.
  6. Adds the alert action for the app to take, such as specifying that email alias lauren@buttercupbank be designated as an alert recipient.

Summary

In this scenario, Lauren reduced alert noise by using aggregation policies to group related alerts in ITSI, and integrated ITSI with Splunk Observability Cloud so as to have similar visibility into Observability events. As a result, Lauren can more efficiently monitor system health and key performance indicators for Buttercup Bank, reducing mean time to problem detection and mean time to problem resolution.