When working with a notable event group in the Notable Events Review dashboard, which of the following can be set at the individual or group level?
A. Service, status, owner.
B. Severity, status, owner.
C. Severity, comments, service.
D. Severity, status, service.
Explanation: In the Notable Events Review dashboard within Splunk IT Service
Intelligence (ITSI), when working with a notable event group, users can set or adjust certain
attributes at the individual event level or at the group level. These attributes include:
Severity: The importance or impact level of the notable event or group, which can
be adjusted to reflect the current assessment of the situation.
Status: The current state of the notable event or group, such as "New," "In
Progress," or "Resolved," indicating the progress in addressing the event or group.
Owner: The user or team responsible for managing and resolving the notable event
or group.
These settings allow for effective management and tracking of notable events, ensuring
that they are appropriately prioritized, acted upon, and resolved by the responsible parties.
Which of the following is a best practice for identifying the most effective services with which to start an iterative ITSI deployment?
A. Only include KPIs if they will be used in multiple services.
B. Analyze the business to determine the most critical services.
C. Focus on low-level services.
D. Define a large number of key services early.
Reference: [Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/MKA, A best practice for identifying the most effective services with which to start an iterative ITSI deployment is to analyze the business to determine the most critical services that have the most impact on revenue, customer satisfaction, or other key performance indicators. You can use the Service Analyzer to prioritize and monitor these services. References: Service Analyzer, , ]
What should be considered when onboarding data into a Splunk index, assuming that ITSI will need to use this data?
A. Use | stats functions in custom fields to prepare the data for KPI calculations.
B. Check if the data could leverage pre-built KPIs from modules, then use the correct TA to onboard the data.
C. Make sure that all fields conform to CIM, then use the corresponding module to import related services.
D. Plan to build as many data models as possible for ITSI to leverage
When onboarding data into a Splunk index, assuming that ITSI will need to use this data,
you should consider the following:
B. Check if the data could leverage pre-built KPIs from modules, then use the correct TA to
onboard the data. This is true because modules are pre-packaged sets of services, KPIs,
and dashboards that are designed for specific types of data sources, such as operating
systems, databases, web servers, and so on. Modules help you quickly set up and monitor
your IT services using best practices and industry standards. To use modules, you need to
install and configure the correct technical add-ons (TAs) that extract and normalize the data
fields required by the modules.
The other options are not things you should consider because:
A. Use | stats functions in custom fields to prepare the data for KPI calculations. This is not
true because using | stats functions in custom fields can cause performance issues and
inaccurate results when calculating KPIs. You should use | stats functions only in base
searches or ad hoc searches, not in custom fields.
C. Make sure that all fields conform to CIM, then use the corresponding module to import
related services. This is not true because not all modules require CIM-compliant data
sources. Some modules have their own data models and field extractions that are specific
to their data sources. You should check the documentation of each module to see what
data requirements and dependencies they have.
D. Plan to build as many data models as possible for ITSI to leverage. This is not true
because building too many data models can cause performance issues and resource
consumption in your Splunk environment. You should only build data models that are
necessary and relevant for your ITSI use cases.
Anomaly detection can be enabled on which one of the following?
A. KPI
B. Multi-KPI alert
C. Entity
D. Service
Explanation: A is the correct answer because anomaly detection can be enabled on a KPI level in ITSI. Anomaly detection allows you to identify trends and outliers in KPI search results that might indicate an issue with your system. You can enable anomaly detection for a KPI by selecting one of the two anomaly detection algorithms in the KPI configuration panel.
Which of the following is an advantage of an adaptive time threshold?
A. Automatically alerting when KPI value patterns change over time.
B. Automatically adjusting thresholds as normal KPI values change over time.
C. Automatically adjusting to holiday schedules.
D. Automatically predicting future degradation of KPI values over time.
Explanation: An adaptive time threshold in the context of Splunk IT Service Intelligence (ITSI) refers to the capability of dynamically adjusting threshold values for Key Performance Indicators (KPIs) based on historical data trends and patterns. This feature allows thresholds to evolve as the 'normal' behavior of KPIs changes over time, ensuring that alerts remain relevant and reduce the likelihood of false positives or negatives. The advantage of this approach is that it accommodates for natural fluctuations in KPI values that may occur due to changes in business operations, seasonality, or other factors, without requiring manual threshold adjustments. This makes the monitoring system more resilient and responsive to actual conditions, improving the overall effectiveness of IT operations management.
When installing ITSI to support a Distributed Search Architecture, which of the following items apply? (Choose all that apply.)
A. Copy SA-IndexCreation to all indexers.
B. Copy SA-IndexCreation to the etc/apps directory on the index cluster master node.
C. Extract installer package into etc/apps directory of the cluster deployer node.
D. Extract ITSI app package into etc/apps directory of search head.
A is the correct answer because when installing ITSI to support a distributed search architecture, you need to copy SA-IndexCreation to all indexers. SA-IndexCreation is an app that contains the definitions of the ITSI indexes, such as itsi_summary, itsi_tracked_alerts, itsi_grouped_alerts, etc. You need to copy this app to all indexers to ensure that they can store and search the ITSI data. B is not a correct answer because you do not need to copy SA-IndexCreation to the etc/apps directory on the index cluster master node. The index cluster master node does not store or search data, it only manages the replication and availability of data across the index cluster peers. C is not a correct answer because you do not need to extract the installer package into etc/apps directory of the cluster deployer node. The cluster deployer node is used to distribute apps and configuration updates to the search head cluster members. You need to extract the installer package into etc/shcluster/apps directory of the cluster deployer node instead. D is not a correct answer because you do not need to extract the ITSI app package into etc/apps directory of search head. You need to extract the ITSI app package into etc/shcluster/apps directory of the cluster deployer node and use the deployer to push the app to all search head cluster members.
Page 2 out of 15 Pages |
Previous |