Pushing alerts to the Splunk platform and ITSI
Splunk ITSI (ITSI) has a robust event analytics engine that can perform a variety of functions. To remediate events quickly, you should push alerts to the Splunk platform, rather than relying on a scheduled input to pull events.
This article is part of the Definitive Guide to Best Practices for IT Service Intelligence. ITSI administrators will benefit from adopting this practice as they work on Event Analytics.
How to use Splunk software for this use case
All episodes follow a basic pattern:
- Failure: Something being monitored fails.
- Detection: The monitoring system detects the failure.
- Alert Creation: An alert is created.
- Episode Creation: The situation is resolved in some manner.
- Clearance Detection: The monitoring system detects that the condition has cleared.
- Clearing Alert: A clearing alert is created.

So what is the difference in this pattern between pushing these events to the Splunk platform versus waiting for the Splunk platform to pull them? The following two timelines show a comparison.
The Splunk platform waits for alerts to be pulled
Pulled alerts rely on “Scheduled Inputs,” which fetch data at set intervals. This scenario introduces lag in several stages. There can be a significant amount of time between when the alert is created in ITSI and when the scheduled input runs. The same lag occurs when the situation is resolved. So while a service might have only been down for a minute, ITSI might think it was down for a half hour. During that lag, you might be paging people to work on a situation that has already been resolved.
The pattern of events in this scenario is:
- Failure: Something being monitored fails.
- Detection: The monitoring system detects the failure.
- Alert Creation: An alert is created within the monitoring system.
- Scheduled Input (Fetch): The scheduled input runs and brings the alert data into Splunk.
- Episode Creation: An ITSI episode is created.
- Resolution: The situation is resolved in some manner.
- Clearance Detection: The monitoring system detects the condition has cleared.
- Clearing Alert: A clearing alert is created within the monitoring system.
- Scheduled Input (Fetch): The scheduled input runs and brings in the clearing alert data.
- Episode Closure: The ITSI episode is closed.

An alert is pushed to the Splunk platform
In this scenario, events are pushed to the Splunk platform. Doing this creates and clears the episode almost immediately. There are fewer steps and they are completed in less time.
The pattern of events in this scenario is:
- Failure: Something being monitored fails.
- Detection: The monitoring system detects the failure.
- Alert Creation/Push: An alert is created and pushed immediately to the Splunk platform.
- Episode Creation: An ITSI episode is created.
- Resolution: The situation is resolved in some manner.
- Clearance Detection: The monitoring system detects the condition has cleared.
- Clearing Alert: A clearing alert is created and sent to the Splunk platform, which closes the episode.

Next steps
You might also be interested in the following Splunk resources:
- Splunk Help: Event analytics manual
- Splunk Help: Send data to Splunk Cloud Platform with ITSI data collection agents
- Splunk Help: Best practices for implementing Event Analytics in ITSI

