Access Control is about managing who can do what in ITSI.
It ensures that:
Users only see data that’s relevant to them
Critical configurations are protected from accidental edits
Operations teams don’t step on each other’s work
This is key for both:
Security: Protect sensitive metrics and infrastructure details
Clarity: Keep teams focused on the systems they’re responsible for
ITSI builds on Splunk’s existing RBAC (Role-Based Access Control) model and adds new tools that are service- and team-focused.
Teams are logical groupings in ITSI that link:
Users
Services
Notable Events
Dashboards
Example:
“Web Ops Team” manages web services
“DB Team” focuses on database performance
Each team can:
Own specific services
Receive alerts for only their systems
Access filtered dashboards and Glass Tables
This makes ITSI much more organized and user-specific.
ITSI uses standard Splunk roles (e.g., admin, power, user) and allows you to create custom roles with specific capabilities.
Capabilities can include:
Viewing or editing services
Creating KPIs or Glass Tables
Managing Notable Events
Example Roles:
itsi_admin: Full access to everything in ITSI
itsi_team_lead: Can edit only their team’s services
itsi_viewer: Can view dashboards, but not edit anything
ITSI allows fine-grained control down to the service level:
Use this to:
Prevent unauthorized edits to production-critical services
Let junior team members observe only, without changing configurations
Here's a quick overview of how roles are typically structured in an ITSI setup:
| Role | Permissions |
|---|---|
| ITSI Admin | Full access to all features and settings |
| Service Owner | Manage specific services, KPIs, and alerts |
| Viewer | Read-only access to dashboards, Glass Tables, etc. |
If you already use RBAC in Splunk, extend those roles into ITSI.
This keeps role management simpler and more consistent.
Review user roles every few months.
Remove access for users who’ve changed roles or left the team.
Update team-service mappings as responsibilities shift.
Set up teams in ITSI to mirror how your organization actually works:
Dev teams manage their own apps
Ops teams manage shared infrastructure
This improves communication, ownership, and accountability.
ITSI’s access control ensures that users only see and manage what they’re responsible for.
It uses a mix of teams, roles, and service-level restrictions to secure the environment.
Each team can own services, receive events, and access relevant dashboards.
Use best practices to maintain clarity, security, and operational efficiency.
Access to Glass Tables in ITSI can be restricted by team or role, not just at the dashboard or user level.
This ensures that sensitive visualizations, such as KPIs related to production environments or executive systems, are only visible to authorized users.
Teams can be configured so that each user only sees the Glass Tables linked to their assigned services or responsibilities.
Access to Glass Tables can also be restricted per user/team, ensuring sensitive visualizations are only visible to authorized roles.
This aspect of access control helps enforce data confidentiality and operational boundaries. In the exam, this may be tested under phrases like “Glass Table confidentiality” or “role-based visualization access.”
In ITSI, Notable Events can be automatically routed to the correct team based on:
The service ownership assigned in the service definition
The entity involved in the incident
Predefined routing rules tied to roles or team mappings
This ensures:
Events go to the right people without manual filtering
Reduces cross-team noise
Enhances incident accountability
Notable Events can be automatically routed to teams based on service ownership, reducing noise and ensuring alert accountability.
This routing logic is crucial in enterprise environments where different teams monitor different scopes, and is often covered in both multiple-choice and scenario-based questions.
ITSI includes audit dashboards that allow administrators to:
Track who made changes to services, KPIs, or thresholds
Review what changes were made
See when those changes occurred
These dashboards are key for:
Security compliance
Internal audits
Troubleshooting misconfigurations
ITSI provides audit dashboards to help track who made configuration changes and when, aiding in compliance and troubleshooting.
This feature becomes especially important in environments with strict change control, and knowledge of it is highly relevant to exam questions on configuration management and auditability.
Access control ensures that users only view and manage the services and data they are responsible for.
Access to Glass Tables is also role/team-controlled, not just dashboards.
Notable Events can be routed to the appropriate teams automatically, based on service ownership.
Use audit dashboards to review and track configuration changes, which supports compliance and operational transparency.
The combination of roles, teams, service-level permissions, and auditing tools makes ITSI highly secure and scalable in multi-team environments.
What mechanism does ITSI use to control user permissions and feature access?
Role-based access control (RBAC).
ITSI inherits the role-based access control model from Splunk Enterprise. Each user is assigned one or more roles, and those roles define permissions such as the ability to create services, manage KPIs, configure dashboards, or investigate notable events. Roles also determine which indexes users can search and which applications they can access. By assigning appropriate roles, administrators can restrict access to sensitive configuration features while allowing operators to monitor services and investigate incidents. RBAC therefore provides a structured approach to managing user permissions across ITSI functionality.
Demand Score: 74
Exam Relevance Score: 88
Why might a user be unable to see services in the Service Analyzer dashboard?
Because the user’s role does not have permission to access the services or related indexes.
Service visibility in ITSI depends on user permissions defined through roles and capabilities. If a user lacks access to the indexes or service objects associated with ITSI monitoring data, the Service Analyzer dashboard may appear empty even though services exist. Administrators must ensure that user roles include permissions to access relevant ITSI objects and data indexes. Without these permissions, the platform restricts visibility of services and monitoring information, preventing users from viewing service health dashboards.
Demand Score: 72
Exam Relevance Score: 86
What is the purpose of service-level teams in ITSI?
To assign responsibility for monitoring and managing specific services.
Service-level teams represent groups of users responsible for managing particular services within an organization. Teams can be associated with services so that alerts, incidents, and operational responsibilities are directed to the appropriate group. For example, a database operations team may manage database-related services, while an application team manages application-layer services. This structure helps organizations distribute monitoring responsibilities and ensures that incidents are handled by teams with the relevant expertise.
Demand Score: 70
Exam Relevance Score: 84