You have integrated your Splunk Observability Cloud alerts with Splunk ITSI and normalized Splunk Observability Cloud alerts into the ITSI Universal Alert Schema. Now you want to configure the universal correlation search to create notable events in Splunk ITSI. These notable events are stored in a Splunk index called
This article is part of the Splunk Use Case Explorer for Observability, which is designed to help you identify and implement prescriptive use cases that drive incremental business value. It explains the solution using a fictitious example company, called CSCorp, that hosts a cloud native application called Online Boutique. In the AIOps lifecycle described in the Use Case Explorer, this article is part of Event analytics.
Use the Content Pack for ITSI Monitoring and Alerting and Splunk Enterprise to query normalized alert data and create Splunk ITSI notable events.
Watch this video to see how to create and deploy the universal correlation search to process all of the Splunk Observability Cloud alerts that arrive into the Alerts index to create ITSI notable events. The universal correlation search is a scheduled search that runs on the ITSI search head or search head cluster.
Still having trouble? Splunk has many resources available to help get you back on track.
- Splunk OnDemand Services: Use these credit-based services for direct access to Splunk technical consultants with a variety of technical services from a pre-defined catalog. Most customers have OnDemand Services per their license support plan. Engage the ODS team at OnDemand-Inquires@splunk.
com if you require assistance.
- Splunk Answers: Ask your question to the Splunk Community, which has provided over 50,000 user solutions to date.
- Splunk Customer Support: Contact Splunk to discuss your environment and receive customer support.
- Splunk Observability Training Courses: Comprehensive Splunk training to fully unlock the power of Splunk Observability Cloud.