How can Service Now incidents be created automatically when a Multi-KPI alert triggers? (select all that apply)
To automatically create ServiceNow incidents when a Multi-KPI alert triggers in Splunk IT Service Intelligence (ITSI), the following approaches can be used:
C) By creating a notable event aggregation policy with a ServiceNow (SNOW) incident action: ITSI allows the creation of notable event aggregation policies that can specify actions to be taken when certain conditions are met. One of these actions can be the creation of an incident in ServiceNow, directly linking the alerting mechanism in ITSI with incident management in ServiceNow.
D) By editing the associated correlation search and specifying an alert action: Correlation searches in ITSI are used to identify patterns or conditions that signify notable events. These searches can be configured to include alert actions, such as creating a ServiceNow incident, whenever the search conditions are met. This direct integration ensures that incidents are automatically generated in ServiceNow, based on the specific criteria defined in the correlation search.
Options A and B are not standard practices for integrating ITSI with ServiceNow for automatic incident creation. The configuration typically involves setting up actionable alert mechanisms within ITSI that are specifically designed to integrate with external systems like ServiceNow.
Herman
10 months agoBonita
10 months agoMattie
9 months agoJulene
9 months agoIrving
9 months agoGermaine
9 months agoVincenza
10 months agoArt
9 months agoHelga
9 months agoLaine
10 months agoTijuana
9 months agoPortia
9 months agoEdna
9 months agoVincent
10 months agoStarr
11 months agoRoxanne
10 months agoRonald
10 months agoFrancoise
10 months agoBeata
10 months agoLeeann
10 months agoHoney
11 months agoEmile
11 months agoErasmo
11 months ago