Creating Alerts in ITSI

Configuring a Basic Alert in Splunk ITSI

This section guides you through configuring a basic alert in Splunk IT Service Intelligence (ITSI). We’ll set up an alert that triggers when our previously created Service breaches a KPI threshold.

Depending on the Service You Created, the KPI we use for this alert will change. In the instruction steps below replace Service Name and KPI appropriately

  • PaymentService2: Business Workflow Error Rate
  • AD-Ecommerce2: Availability

Steps:

  1. Navigate to the KPI:

    • In ITSI, go to “Configuration” -> “Correlation Searches”
    • Click “Create New Search”
  2. Configure the new search:

    • Search Title: Service Name KPI Critical
    • Description: Service Name KPI Critical
    • Search:
    index=itsi_summary kpi="*KPI*" alert_severity=critical
    • Time Range: Last 15 minutes
    • Service: Service Name
    • Entity Lookup Field: itsi_service_id
    • Run Every: minutes
    • Notable Event Title: Service Name KPI Critical
    • Severity: Critical
    • Notable Event Identified Fields: source

After Creating the Alert:

  • You will need to wait 5-10 minutes for the alert to run
  • The alert will be listed in the “Alerts and Episodes” Pane in ITSI.

show-entry show-entry

Important Considerations:

  • Alert Fatigue: Avoid setting up too many alerts or alerts with overly sensitive thresholds. This can lead to alert fatigue, where people become desensitized to alerts and might miss critical issues.