A Notable Event in ITSI is an alert or incident that gets created automatically when:
A KPI crosses a critical threshold, or
A pattern is detected through a correlation search.
It’s called "notable" because it signals something that is important, possibly urgent, and should be looked at by a human.
Think of it like:
A fire alarm in a building.
A red warning light on a car dashboard.
It doesn’t just show data—it’s a call to action.
Notable Events follow a 4-step lifecycle in ITSI:
This is the moment when something goes wrong.
Examples:
A KPI called “Error Rate” goes above its critical threshold.
A correlation search detects a combination of high CPU + memory usage.
As soon as the condition is met, ITSI generates a Notable Event.
When many events happen around the same time, ITSI can group them together using rules called Aggregation Policies.
This prevents:
Alert fatigue (too many separate alerts for the same issue)
Confusion and duplication
Missed context
Example: If 5 different services report errors due to the same database problem, ITSI may group them into one master event.
ITSI uses your rules to assign a severity level to each event:
Info
Warning
High
Critical
This helps teams:
Focus on the most important issues first.
Filter out low-priority alerts.
You can base priority on:
The affected service
The impact score
The source or entity involved
Once an event is created, you can manage it in many ways:
Acknowledge it (mark it as being worked on)
Assign it to a team or user
Escalate it if it hasn’t been resolved
Suppress it if you know it’s a false positive or expected (e.g., maintenance)
This keeps your incident management clean and organized.
ITSI gives you several powerful tools to manage events efficiently:
These are rules that tell ITSI how to:
Group similar events together
Define how long to wait before grouping
What fields to use (e.g., same service, same host)
Think of this like smart folders for events:
"If 3 KPIs go critical in the same service within 5 minutes → treat it as one big event."
Sometimes you know certain issues will happen—for example:
During planned maintenance
While running load tests
When deploying new code
You can set up suppression rules so that:
Events during these times are not created
Your team isn’t bothered by noise
This is very helpful to keep focus on real problems only.
Workflows let you automate actions when a Notable Event is triggered.
Examples:
Send an alert to Slack or Microsoft Teams
Create a ticket in ServiceNow or Jira
Run a script to restart a service
This makes your response faster and consistent.
Every event can include:
Custom fields like environment (prod/dev), region, team
Tags like "database", "frontend", "security"
These make it easier to:
Filter events
Route them to the right team
Search for specific types of problems
A Notable Event is an important alert triggered when something crosses a threshold or matches a pattern.
Events go through a clear process: triggering → aggregation → prioritization → management.
ITSI provides tools to group, suppress, and automate how events are handled.
These events are the starting point for action—helping teams stay focused and fast.
Why it matters:
Knowing where Notable Events appear in the UI helps users visually understand the workflow from data to incident review.
Suggested Explanation:
Notable Events are primarily displayed in the Episode Review interface within ITSI.
To access it:
Go to ITSI → Episode Review
This view shows:
Individual or grouped Notable Events
Event metadata (severity, time, entity, service)
Aggregated episodes with timeline view
Operators and analysts can acknowledge, assign, or close events directly from this interface. It's the central workspace for incident triage in ITSI.
Why it matters:
Seeing a concrete example helps students understand how multiple raw alerts get transformed into a single, meaningful incident.
Suggested Explanation:
Imagine that three different KPIs for a web server (CPU usage, memory usage, and HTTP 500 errors) all go into warning or critical state within 10 minutes. Without aggregation, this would generate three separate Notable Events.
With an Aggregation Policy configured as:
Filter: Service = web-frontend
Aggregation Fields: Entity, KPI
Time Window: 10 minutes
ITSI groups those events into one episode, providing a consolidated view like:
"Web Frontend experiencing performance degradation on server web01"
This reduces alert fatigue and speeds up root cause analysis.
Why it matters:
Students benefit from understanding how the KPI layer connects to event generation, closing the loop in their mental model.
Suggested Explanation:
KPIs are linked to event generation through Action Rules, which define:
When a KPI status change should trigger an event
What severity the resulting event should have
Which fields (entity, service, category) are added to the event
You can configure action rules under each KPI definition. For instance:
"If status = Critical for more than 2 minutes → trigger Notable Event with severity = High"
This mechanism ties KPI behavior directly to incident management workflows.
Why it matters:
Understanding how ITSI determines which events are most urgent is critical for meaningful response prioritization.
Suggested Explanation:
Notable Event priority is influenced by multiple factors, including:
Impact Score: Based on KPI severity and health score weights
Entity Importance: If an entity (e.g., a production DB) has higher business value, its events may be prioritized higher
Custom Priority Rules: Defined in Aggregation Policies or Action Rules
For example:
An event involving a “Critical” database with high entity importance will appear before a warning-level alert on a dev server.
This ensures your team responds to what matters most, not just what’s most frequent.
These enhancements help build a full lifecycle perspective of Notable Events:
KPI behavior → Event trigger → Aggregation → Review → Response
Improved clarity around where events live, how they form, and how they're prioritized
Stronger readiness for both SPLK-3002 exam success and real-world operational use
A correlation search returns results, but no notable events appear in Episode Review. What configuration area should be checked first?
Verify that the correlation search is successfully writing events to the itsi_tracked_alerts index.
In ITSI, notable events originate from correlation searches or multi-KPI alerts and are stored in the itsi_tracked_alerts index before being grouped into episodes. If the correlation search does not write events to this index, the Episode Review dashboard cannot display them. A common troubleshooting step is to manually run the correlation search and confirm that events appear in itsi_tracked_alerts. If events exist but still do not appear in Episode Review, the issue may be related to event grouping configuration or the grouping engine responsible for episode creation. Ensuring events exist in the correct index confirms that the alert generation stage is functioning correctly before investigating aggregation or visualization layers.
Demand Score: 92
Exam Relevance Score: 88
Which index stores raw notable events generated by correlation searches before they are grouped into episodes?
itsi_tracked_alerts.
ITSI uses multiple indexes to manage notable events and their lifecycle. When a correlation search or multi-KPI alert generates an event, it is first written to the itsi_tracked_alerts index. This index stores the original notable events prior to any grouping or episode aggregation. If event grouping is enabled, the Notable Event Aggregation Policy (NEAP) engine processes those events and creates grouped records in the itsi_grouped_alerts index. Administrators frequently query itsi_tracked_alerts when troubleshooting missing events or verifying that correlation searches are generating alerts correctly. Understanding the distinction between tracked and grouped indexes is essential for diagnosing event visibility issues in Episode Review and ensuring the aggregation pipeline operates correctly.
Demand Score: 85
Exam Relevance Score: 90
An administrator wants to retrieve a list of acknowledged notable events using SPL. Which index typically contains the audit information for acknowledgement actions?
itsi_notable_audit.
When a notable event is acknowledged or updated by a user in ITSI, the system records the activity in audit logs. These acknowledgement actions are stored in the itsi_notable_audit index rather than directly modifying event status in the tracked alert index. Administrators often query this index to identify user actions such as acknowledgements, status changes, and updates to notable events. Because the audit record tracks the action rather than the event itself, it usually contains fields describing the activity type, event identifier, and user performing the action. This design allows ITSI to maintain a clear historical record of incident management activities without overwriting the original event data.
Demand Score: 75
Exam Relevance Score: 83
Why might a clearing event with normal severity create a new notable event instead of updating an existing one in an episode?
Because the event identifier fields do not match the original notable event identifier hash used for correlation.
ITSI determines whether incoming alerts represent the same issue using configured Notable Event Identifier Fields. These fields are combined to produce a hash that uniquely identifies the alert instance. If a clearing event arrives but its identifier fields differ from the original event—even slightly—the system interprets it as a new alert rather than a status update. As a result, ITSI creates an additional notable event within the same episode instead of updating the previous one. Properly configuring identifier fields is essential for maintaining a consistent event lifecycle, ensuring that clearing alerts correctly resolve or update existing events rather than generating duplicate entries.
Demand Score: 82
Exam Relevance Score: 86
What primary mechanism groups related notable events into a single episode in ITSI?
Notable Event Aggregation Policies (NEAP).
Notable Event Aggregation Policies are responsible for grouping multiple related alerts into a single episode. These policies define rules that evaluate incoming notable events and determine whether they should be grouped with existing alerts. For example, rules might group alerts by host, service, or custom attributes. When grouping occurs, ITSI maintains both the original tracked events and the aggregated episode structure. This process reduces alert noise and allows operators to investigate incidents through a consolidated episode rather than multiple independent alerts. Properly configured aggregation policies improve incident triage efficiency and help prevent alert storms from overwhelming operational teams.
Demand Score: 88
Exam Relevance Score: 91