Which of the following are deployment recommendations for ITSI? (Choose all that apply.)
Answer : A, B, C
You might need to increase the hardware specifications of your own Enterprise Security deployment above the minimum hardware requirements depending on your environment.
Install Splunk Enterprise Security on a dedicated search head or search head cluster.
The Splunk platform uses indexers to scale horizontally. The number of indexers required in an Enterprise Security deployment varies based on the data volume, data type, retention requirements, search type, and search concurrency.
Which of the following is a best practice for identifying the most effective services with which to start an iterative ITSI deployment?
Besides creating notable events, what are the default alert actions a correlation search can execute? (Choose all that apply.)
Answer : B, C, D
Throttling applies to any correlation search alert type, including notable events and actions (RSS feed, email, run script, and ticketing).
Which of the following is a good use case for a Multi-KPI alert?
Answer : D
A Multi-KPI alert in Splunk IT Service Intelligence (ITSI) is designed to trigger based on the conditions of multiple Key Performance Indicators (KPIs). This type of alert is particularly useful when a single KPI's state is not sufficient to indicate an issue, but the correlation between multiple KPIs can provide a clearer picture of an emerging problem. The best use case for a Multi-KPI alert is therefore when comparing the values of two or more KPIs indicates an unusual condition is occurring. This allows for more nuanced and context-rich alerting mechanisms that can identify complex issues not detectable by monitoring individual KPIs. This approach is beneficial in complex environments where the interplay between different performance metrics needs to be considered to accurately detect and diagnose issues.
Which of the following describes entities? (Choose all that apply.)
Answer : B, D
Entities are IT components that require management to deliver an IT service. Each entity has specific attributes and relationships to other IT processes that uniquely identify it. Entities contain alias fields and informational fields that ITSI associates with indexed events. Some statements that describe entities are:
B) An abstract (pseudo/logical) entity can be used to split by for a KPI, although no entity rules or filtering can be used to limit data to a specific service. An abstract entity is an entity that does not represent a physical host or device, but rather a logical grouping of data sources. For example, you can create an abstract entity for each business unit in your organization and use it to split by for a KPI that measures revenue or customer satisfaction. However, you cannot use entity rules or filtering to limit data to a specific service based on abstract entities, because they do not have alias fields that match indexed events.
D) To automatically restrict the KPI to only the entities in a particular service, select ''Filter to Entities in Service''. This option allows you to filter the data sources for a KPI by the entities that are assigned to the service. For example, if you have a service for web servers and you want to monitor the CPU load percent for each web server entity, you can select this option to ensure that only the events from those entities are used for the KPI calculation.
Which of the following is a characteristic of base searches?