An Aggregation Policy in ITSI tells the system:
“When many similar Notable Events happen around the same time, group them together into one consolidated event.”
Why is this helpful?
Because large environments can generate hundreds of alerts at once—sometimes all related to the same root issue.
Aggregation policies help you:
Reduce alert noise
Avoid duplication
Improve clarity
Aggregation policies group, prioritize, and format Notable Events.
The result is fewer but more informative alerts that are easier to investigate and resolve.
These rules determine which events are considered for aggregation.
You can filter based on:
Severity
Service name
Entity
Custom fields
Example:
Only include events where severity = Critical and service = "Checkout API"
These define what makes events similar.
You might group events by:
Service
Entity (host)
KPI name
Source
Example:
Group all events from the same host or same application
This helps consolidate:
10 alerts from the same server → into 1 grouped event
This defines how close together in time events must be to be grouped.
If multiple events happen within this time window, they are considered part of the same issue.
Example:
If 5 events occur within 10 minutes, group them.
These rules assign severity to the grouped event.
The priority can be based on:
The most severe included event
A weighted scoring system
Custom logic
Example:
If even one Critical event is included, mark the group as Critical.
Here’s what you get when aggregation works well:
Instead of 10 separate alerts about a database, you see 1 single incident.
Your team is not overwhelmed by duplicate messages.
You can focus on the real problem, not individual symptoms.
You can click into the grouped event to view:
All the original, raw Notable Events
Search results and related logs
This helps with fast root cause analysis.
You can configure events to automatically close when:
Conditions return to normal
No new events are added after a certain time
This helps reduce manual cleanup and keeps dashboards tidy.
ITSI can prioritize critical business services so that:
High-impact events are shown first
Less important alerts are delayed or hidden
This helps incident response teams focus on what really matters.
Too much grouping can hide real issues.
For example:
Don’t group all web server alerts together if they belong to different services.
Every environment is different. You might need to group by:
Host in one case
Service in another
Application ID in others
Adjust aggregation fields based on your monitoring goals
Over time, you should:
Analyze which policies are working well
Adjust time windows or severity rules
Remove unused or redundant policies
This keeps your alerting accurate and efficient.
Aggregation Policies group similar Notable Events to reduce noise and highlight real incidents.
They use filters, time windows, and severity rules to control how alerts are combined.
Advanced features like drill-downs, auto-close, and prioritization make event management easier.
Follow best practices to ensure policies are effective and tuned to your environment.
Aggregation Policies in ITSI play a key role after a Notable Event is generated.
A correlation search or KPI threshold breach triggers a Notable Event.
Aggregation policies then review these events in real time and decide:
Whether to group similar events
How to assign severity to the group
How to name and tag the resulting episode
Aggregation is not responsible for detecting issues—that’s the job of correlation or threshold logic.
Instead, it focuses on post-processing and consolidating alerts into meaningful incidents.
Once events are grouped by an aggregation policy, the resulting Episode is immediately visible in the Episode Review interface.
You can:
Click on an episode to see all grouped Notable Events
View event metadata (e.g., service, entity, severity)
Drill into root causes or logs from the same screen
Clarification to remember:
Aggregation happens after Notable Events are created. It organizes them into meaningful groups, which are displayed in Episode Review.
One of the most frequently confused topics is the difference between Correlation Searches and Aggregation Policies.
Let’s clarify the distinction:
| Feature | Correlation Search | Aggregation Policy |
|---|---|---|
| Primary Role | Detect patterns, anomalies, or conditions | Organize, group, and prioritize events |
| Data Source | Logs, metrics, KPIs, custom SPL logic | Notable Events generated by correlation/KPIs |
| Timing | Before events are generated | After events are generated |
| Action | Creates new Notable Events or triggers | Groups Notable Events into Episodes |
| Tool/Module | Built in Correlation Search Editor | Managed in Aggregation Policy Editor |
Correlation searches generate Notable Events by identifying patterns. Aggregation policies manage those events by grouping, prioritizing, and formatting them.
Aggregation policies are applied after Notable Events are created.
Their role is to group similar events into one episode, reducing alert fatigue and improving clarity.
They are fully visible and actionable within the Episode Review interface.
Aggregation is not a detection mechanism—it’s a management layer that works in tandem with correlation logic.
Confusing correlation and aggregation can lead to exam mistakes—remember that correlation finds, and aggregation organizes.
What is the primary purpose of aggregation policies in ITSI?
To group related notable events into episodes.
Aggregation policies determine how individual notable events are grouped together into episodes for incident management. Instead of treating every alert as a separate issue, ITSI analyzes event attributes and applies aggregation rules to determine whether multiple alerts represent the same underlying problem. For example, alerts generated from the same host or service within a short time window may be grouped into a single episode. This grouping reduces alert noise and helps operators focus on incidents rather than individual alerts. Aggregation policies therefore play a key role in organizing and managing notable events within ITSI.
Demand Score: 80
Exam Relevance Score: 90
What does Smart Mode do in an ITSI aggregation policy?
It automatically groups notable events using built-in correlation logic.
Smart Mode simplifies aggregation policy configuration by automatically determining how events should be grouped. Instead of requiring administrators to manually define complex grouping rules, Smart Mode analyzes event attributes such as host, service, and event time to identify related alerts. This automated grouping approach helps reduce configuration complexity and allows ITSI to efficiently cluster alerts that likely originate from the same incident. However, administrators may still refine grouping rules if Smart Mode groups unrelated events together.
Demand Score: 84
Exam Relevance Score: 88
Which attributes are commonly used when defining manual aggregation rules?
Attributes such as host, service, or event identifier fields.
Manual aggregation policies rely on defined event attributes to determine how alerts should be grouped. Administrators can specify fields such as host name, service identifier, source, or custom event identifiers when configuring aggregation rules. When new notable events arrive, ITSI evaluates these fields and determines whether the event matches an existing episode or requires a new episode. Choosing appropriate attributes ensures that related alerts are grouped correctly while unrelated alerts remain separate. Proper rule configuration therefore improves the accuracy of incident grouping and reduces alert noise.
Demand Score: 74
Exam Relevance Score: 86
What problem can occur if aggregation policies are configured too broadly?
Unrelated alerts may be grouped into the same episode.
Aggregation policies rely on matching event attributes to determine whether alerts should be grouped. If the grouping criteria are too general—such as matching only a service name or time window—events that represent different incidents may be combined into a single episode. This can make troubleshooting difficult because operators must analyze multiple unrelated alerts within the same incident record. Administrators should therefore carefully define grouping attributes to ensure that only genuinely related events are aggregated together. Proper aggregation configuration helps maintain accurate incident representation within ITSI.
Demand Score: 76
Exam Relevance Score: 85