Shopping cart

Subtotal:

$0.00

SPLK-3002 Managing Notable Events

Managing Notable Events

Detailed list of SPLK-3002 knowledge points

Managing Notable Events Detailed Explanation

1. What Is a Notable Event?

Simple Definition

A Notable Event in ITSI is an alert or incident that gets created automatically when:

  • A KPI crosses a critical threshold, or

  • A pattern is detected through a correlation search.

It’s called "notable" because it signals something that is important, possibly urgent, and should be looked at by a human.

Think of it like:

  • A fire alarm in a building.

  • A red warning light on a car dashboard.

It doesn’t just show data—it’s a call to action.

2. Lifecycle of a Notable Event

Notable Events follow a 4-step lifecycle in ITSI:

a. Triggering

This is the moment when something goes wrong.
Examples:

  • A KPI called “Error Rate” goes above its critical threshold.

  • A correlation search detects a combination of high CPU + memory usage.

As soon as the condition is met, ITSI generates a Notable Event.

b. Aggregation

When many events happen around the same time, ITSI can group them together using rules called Aggregation Policies.

This prevents:

  • Alert fatigue (too many separate alerts for the same issue)

  • Confusion and duplication

  • Missed context

Example: If 5 different services report errors due to the same database problem, ITSI may group them into one master event.

c. Prioritization

ITSI uses your rules to assign a severity level to each event:

  • Info

  • Warning

  • High

  • Critical

This helps teams:

  • Focus on the most important issues first.

  • Filter out low-priority alerts.

You can base priority on:

  • The affected service

  • The impact score

  • The source or entity involved

d. Management

Once an event is created, you can manage it in many ways:

  • Acknowledge it (mark it as being worked on)

  • Assign it to a team or user

  • Escalate it if it hasn’t been resolved

  • Suppress it if you know it’s a false positive or expected (e.g., maintenance)

This keeps your incident management clean and organized.

3. Event Management Features

ITSI gives you several powerful tools to manage events efficiently:

Aggregation Policies

These are rules that tell ITSI how to:

  • Group similar events together

  • Define how long to wait before grouping

  • What fields to use (e.g., same service, same host)

Think of this like smart folders for events:

"If 3 KPIs go critical in the same service within 5 minutes → treat it as one big event."

Event Suppression

Sometimes you know certain issues will happen—for example:

  • During planned maintenance

  • While running load tests

  • When deploying new code

You can set up suppression rules so that:

  • Events during these times are not created

  • Your team isn’t bothered by noise

This is very helpful to keep focus on real problems only.

Workflows

Workflows let you automate actions when a Notable Event is triggered.

Examples:

  • Send an alert to Slack or Microsoft Teams

  • Create a ticket in ServiceNow or Jira

  • Run a script to restart a service

This makes your response faster and consistent.

Custom Fields and Tags

Every event can include:

  • Custom fields like environment (prod/dev), region, team

  • Tags like "database", "frontend", "security"

These make it easier to:

  • Filter events

  • Route them to the right team

  • Search for specific types of problems

Summary: What to Remember About Managing Notable Events

  • A Notable Event is an important alert triggered when something crosses a threshold or matches a pattern.

  • Events go through a clear process: triggering → aggregation → prioritization → management.

  • ITSI provides tools to group, suppress, and automate how events are handled.

  • These events are the starting point for action—helping teams stay focused and fast.

Managing Notable Events (Additional Content)

1. Where Are Notable Events Displayed?

Why it matters:
Knowing where Notable Events appear in the UI helps users visually understand the workflow from data to incident review.

Suggested Explanation:

Notable Events are primarily displayed in the Episode Review interface within ITSI.
To access it:

Go to ITSI → Episode Review

This view shows:

  • Individual or grouped Notable Events

  • Event metadata (severity, time, entity, service)

  • Aggregated episodes with timeline view

Operators and analysts can acknowledge, assign, or close events directly from this interface. It's the central workspace for incident triage in ITSI.

2. Example of Event Aggregation (Trigger Logic)

Why it matters:
Seeing a concrete example helps students understand how multiple raw alerts get transformed into a single, meaningful incident.

Suggested Explanation:

Imagine that three different KPIs for a web server (CPU usage, memory usage, and HTTP 500 errors) all go into warning or critical state within 10 minutes. Without aggregation, this would generate three separate Notable Events.

With an Aggregation Policy configured as:

  • Filter: Service = web-frontend

  • Aggregation Fields: Entity, KPI

  • Time Window: 10 minutes

ITSI groups those events into one episode, providing a consolidated view like:

"Web Frontend experiencing performance degradation on server web01"

This reduces alert fatigue and speeds up root cause analysis.

3. How KPIs Trigger Events (via Action Rules)

Why it matters:
Students benefit from understanding how the KPI layer connects to event generation, closing the loop in their mental model.

Suggested Explanation:

KPIs are linked to event generation through Action Rules, which define:

  • When a KPI status change should trigger an event

  • What severity the resulting event should have

  • Which fields (entity, service, category) are added to the event

You can configure action rules under each KPI definition. For instance:

"If status = Critical for more than 2 minutes → trigger Notable Event with severity = High"

This mechanism ties KPI behavior directly to incident management workflows.

4. How Prioritization Works (Impact Score & Entity Importance)

Why it matters:
Understanding how ITSI determines which events are most urgent is critical for meaningful response prioritization.

Suggested Explanation:

Notable Event priority is influenced by multiple factors, including:

  • Impact Score: Based on KPI severity and health score weights

  • Entity Importance: If an entity (e.g., a production DB) has higher business value, its events may be prioritized higher

  • Custom Priority Rules: Defined in Aggregation Policies or Action Rules

For example:

An event involving a “Critical” database with high entity importance will appear before a warning-level alert on a dev server.

This ensures your team responds to what matters most, not just what’s most frequent.

Summary

These enhancements help build a full lifecycle perspective of Notable Events:

  • KPI behavior → Event trigger → Aggregation → Review → Response

  • Improved clarity around where events live, how they form, and how they're prioritized

  • Stronger readiness for both SPLK-3002 exam success and real-world operational use

Frequently Asked Questions

A correlation search returns results, but no notable events appear in Episode Review. What configuration area should be checked first?

Answer:

Verify that the correlation search is successfully writing events to the itsi_tracked_alerts index.

Explanation:

In ITSI, notable events originate from correlation searches or multi-KPI alerts and are stored in the itsi_tracked_alerts index before being grouped into episodes. If the correlation search does not write events to this index, the Episode Review dashboard cannot display them. A common troubleshooting step is to manually run the correlation search and confirm that events appear in itsi_tracked_alerts. If events exist but still do not appear in Episode Review, the issue may be related to event grouping configuration or the grouping engine responsible for episode creation. Ensuring events exist in the correct index confirms that the alert generation stage is functioning correctly before investigating aggregation or visualization layers.

Demand Score: 92

Exam Relevance Score: 88

Which index stores raw notable events generated by correlation searches before they are grouped into episodes?

Answer:

itsi_tracked_alerts.

Explanation:

ITSI uses multiple indexes to manage notable events and their lifecycle. When a correlation search or multi-KPI alert generates an event, it is first written to the itsi_tracked_alerts index. This index stores the original notable events prior to any grouping or episode aggregation. If event grouping is enabled, the Notable Event Aggregation Policy (NEAP) engine processes those events and creates grouped records in the itsi_grouped_alerts index. Administrators frequently query itsi_tracked_alerts when troubleshooting missing events or verifying that correlation searches are generating alerts correctly. Understanding the distinction between tracked and grouped indexes is essential for diagnosing event visibility issues in Episode Review and ensuring the aggregation pipeline operates correctly.

Demand Score: 85

Exam Relevance Score: 90

An administrator wants to retrieve a list of acknowledged notable events using SPL. Which index typically contains the audit information for acknowledgement actions?

Answer:

itsi_notable_audit.

Explanation:

When a notable event is acknowledged or updated by a user in ITSI, the system records the activity in audit logs. These acknowledgement actions are stored in the itsi_notable_audit index rather than directly modifying event status in the tracked alert index. Administrators often query this index to identify user actions such as acknowledgements, status changes, and updates to notable events. Because the audit record tracks the action rather than the event itself, it usually contains fields describing the activity type, event identifier, and user performing the action. This design allows ITSI to maintain a clear historical record of incident management activities without overwriting the original event data.

Demand Score: 75

Exam Relevance Score: 83

Why might a clearing event with normal severity create a new notable event instead of updating an existing one in an episode?

Answer:

Because the event identifier fields do not match the original notable event identifier hash used for correlation.

Explanation:

ITSI determines whether incoming alerts represent the same issue using configured Notable Event Identifier Fields. These fields are combined to produce a hash that uniquely identifies the alert instance. If a clearing event arrives but its identifier fields differ from the original event—even slightly—the system interprets it as a new alert rather than a status update. As a result, ITSI creates an additional notable event within the same episode instead of updating the previous one. Properly configuring identifier fields is essential for maintaining a consistent event lifecycle, ensuring that clearing alerts correctly resolve or update existing events rather than generating duplicate entries.

Demand Score: 82

Exam Relevance Score: 86

What primary mechanism groups related notable events into a single episode in ITSI?

Answer:

Notable Event Aggregation Policies (NEAP).

Explanation:

Notable Event Aggregation Policies are responsible for grouping multiple related alerts into a single episode. These policies define rules that evaluate incoming notable events and determine whether they should be grouped with existing alerts. For example, rules might group alerts by host, service, or custom attributes. When grouping occurs, ITSI maintains both the original tracked events and the aggregated episode structure. This process reduces alert noise and allows operators to investigate incidents through a consolidated episode rather than multiple independent alerts. Properly configured aggregation policies improve incident triage efficiency and help prevent alert storms from overwhelming operational teams.

Demand Score: 88

Exam Relevance Score: 91

SPLK-3002 Training Course