How can Service Now incidents be created automatically when a Multi-KPI alert triggers? (select all that apply)
To automatically create ServiceNow incidents when a Multi-KPI alert triggers in Splunk IT Service Intelligence (ITSI), the following approaches can be used:
C) By creating a notable event aggregation policy with a ServiceNow (SNOW) incident action: ITSI allows the creation of notable event aggregation policies that can specify actions to be taken when certain conditions are met. One of these actions can be the creation of an incident in ServiceNow, directly linking the alerting mechanism in ITSI with incident management in ServiceNow.
D) By editing the associated correlation search and specifying an alert action: Correlation searches in ITSI are used to identify patterns or conditions that signify notable events. These searches can be configured to include alert actions, such as creating a ServiceNow incident, whenever the search conditions are met. This direct integration ensures that incidents are automatically generated in ServiceNow, based on the specific criteria defined in the correlation search.
Options A and B are not standard practices for integrating ITSI with ServiceNow for automatic incident creation. The configuration typically involves setting up actionable alert mechanisms within ITSI that are specifically designed to integrate with external systems like ServiceNow.
Herman
4 months agoBonita
4 months agoMattie
3 months agoJulene
3 months agoIrving
3 months agoGermaine
3 months agoVincenza
4 months agoArt
3 months agoHelga
3 months agoLaine
4 months agoTijuana
3 months agoPortia
3 months agoEdna
3 months agoVincent
4 months agoStarr
5 months agoRoxanne
4 months agoRonald
4 months agoFrancoise
4 months agoBeata
4 months agoLeeann
4 months agoHoney
5 months agoEmile
5 months agoErasmo
5 months ago