Splunk IT Service Intelligence (ITSI) Training

SPLUNK-ITSI Certification Training Course Overview

Enroll for 4-day Splunk IT Service Intelligence (ITSI) certification training course from Koenig Solutions accredited by Splunk . Splunk IT Service Intelligence course is designed for consultants to install and configure Splunk’s app for IT Service Intelligence.

Through a blend of hands-on labs and interactive lectures, you will be able to learn to use ITSI to monitor mission-critical services. Topics include ITSI architecture, deployment planning, installation, service design and implementation, configuring entities, notable events, and developing glass tables and deep dives.

Splunk IT Service Intelligence (ITSI) Training (Duration : 32 Hours) Download Course Contents

Live Online Training Fee On Request
Group Training Date On Request
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Buy Flexi For Only $99 (Online Training Re-imagined)

Course Modules

Module 1: Introducing ITSI
  • Identify what ITSI does
  • Describe reasons for using ITSI
  • Examine the ITSI user interface
Module 2: Glass Tables
  • Describe glass tables
  • Use glass tables
  • Design glass tables
  • Configure glass tables
Module 3: Managing Notable Events
  • Define key notable events terms and their relationships
  • Describe examples of multi-KPI alerts
  • Describe the notable events workflow
  • Work with notable events
Module 4: Investigating Issues with Deep Dives
  • Describe deep dive concepts and their relationships
  • Use default deep dives
  • Create and customize new custom deep dives
  • Add and configure swim lanes
  • Custom views
  • Describe effective workflows for troubleshooting
Module 5: Installing and Configuring ITSI
  • List ITSI hardware recommendations
  • Describe ITSI deployment options
  • Identify ITSI components
  • Describe the installation procedure
  • Identify data input options for ITSI
  • Add custom data to an ITSI deployment
Module 6: Designing Services
  • Given customer requirements, plan an ITSI implementation
  • Identify site entities
Module 7: Data Audit and Base Searches
  • Use a data audit to identify service key performance indicators
  • Design base searches
Module 8: Implementing Services
  • Use a service design to implement services in ITSI
Module 9: Thresholds and Time Policies
  • Create KPIs with static and adaptive thresholds
  • Use time policies to define flexible thresholds
Module 10: Entities and Dependencies
  • Using entities in KPI searches
  • Defining dependencies
Module 11: Correlation and Multi KPI Searches
  • Define new correlation searches
  • Define multi KPI alerts
  • Manage notable event storage
Module 12: Aggregation Policies
  • Create new aggregation policies
  • Use smart mode
Module 13: Anomaly Detection
  • Enable anomaly detection
  • Work with generated anomaly events
Module 14: Access Control
  • Configure user access control
  • Create service level teams
Module 15: Troubleshooting ITSI
  • Backup and restore
  • Maintenance mode
  • Creating modules
  • Troubleshooting
Download Course Contents

Request More Information

Course Prerequisites
  • Splunk Fundamentals 1.
  • Splunk Funamentals 2.
  • Splunk Enterprise System Administration.
  • Splunk Enterprise Data Administration.

Target Audience:

  • Candidate working as Consultants.
  • Candidate working as IT administrators.
  • Candidate working as Business Analysts
  • Candidate having Business Intelligence experience
  • Anyone whose role requires them to create complex search queries, advanced data models and reports with Splunk who have limited exposure to regular expressions.

Learning Objectives

After completing this course, you will be able to:

  • ITSI architecture and deployment.
  • Installing ITSI.
  • Designing Services-discovery and best practices.
  • Implementing services and entities.
  • Configuring correlation searches and multi KPI alerts.
  • Managing aggregation policies and anomaly detection.
  • Troubleshooting and maintenance.