Automation of Event Correlation and Clustering With Built in Machine Learning Algorithms in Splunk It Service Intelligence Itsi PDF
Automation of Event Correlation and Clustering With Built in Machine Learning Algorithms in Splunk It Service Intelligence Itsi PDF
09/08/2017 | Washington, DC
Forward-Looking Statements
During the course of this presentation, we may make forward-looking statements regarding future events or
the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in
the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2017 Splunk Inc. All rights reserved.
You Need an Approach That…
Provides easy and seamless access to all data of any type and volume
1 Delivers
service context
to prioritize investigation
2 Understands
time-based behavior
based on historical patterns
▶ For the purposes of this talk when we say “Event” we are referring to Events in
the IT sense not the Splunk sense.
▶ Self descriptive message that tells a user that something happened.
▶ Usually contain some sort of title, severity, and description.
▶ Used to determine in the moment health.
▶ Often very noisey.
▶ Think alarm data coming out of tools like Nagios, Solarwinds, APM, Netcool, etc.
Example Event
Nagios Health Check
.conf 2016
ITSI releases the Policy
Engine. Users can curate
policies that reduce the
noise in events and take
automated action.
Splunk ITSI for Event Analytics
Simplify Your Operations With Artificial Intelligence and Service Context
0110010111000110
1101011101010110
0010011101011000
Find and fix the most Transform IT operations with Get a full view of your IT
important issues machine learning environment
name = "check_dhcp
Group 1 severity = “OK”
Metadata reason = “OK: Received 1 DHCPOFFER(s)
Group 2
src_host="splunk_sh-01
Metadata statetype="HARD"
This is not easy
Big O is not your friend
src_host="splunk_sh-01" perfdata="SERVICEPERFDATA”
src_host="splunk_sh-01" perfdata="SERVICEPERFDATA”
severity="OK” name="check_dhcp" …...
severity="OK” name="check_dhcp"
host="splunk01" …...
status=“up” severity=“critical” …...
...
...
host= host=splunk01
splunk01, ,status=up,
LN status=up, severity=critica
…. l, …
Step 3 – Backtracking
host= host= severity
splunk0 splunk0
status=
… ... =
up
1 2 critical
...
host= host=splunk01
splunk01, ,status=up,
status=up, severity=critica
…. l, …
host= host= severity
splunk0 splunk0
status=
… ... =
up
1 2 critical
...
host= host=splunk01
splunk01, ,status=up,
status=up, severity=critica
…. l, …
host= host= severity
splunk0 splunk0
status=
… ... =
up
1 2 critical
host= host=splunk01
splunk01, ,status=up,
status=up, severity=critica
…. l, …
Let’s run in real time!
Notable Events No
Smart Mode