Splunk ITSI Integration
This guide explains how to integrate Cisco ThousandEyes with Splunk IT Service Intelligence (ITSI). The integration enables you to ingest test data, send alert notifications, and visualize Splunk episodes directly in ThousandEyes.
Prerequisites
Ensure you have the following components installed:
Splunk ITSI version 4.20.x or later. For installation instructions, see Splunk ITSI: Install and Upgrade Manual.
Cisco ThousandEyes App for Splunk version 0.1.0 or later.
Splunk App for Content Packs version 2.3.0 or later. For installation instructions, see Splunk ITSI: Install the Splunk App for Content Packs.
Content Pack for ITSI Monitoring and Alerting version 2.3.0 or later. For more information, see the section below.
Install the Content Pack for Cisco ThousandEyes
Follow the instructions in Install the Content Pack for Cisco ThousandEyes until you reach the step that says “Follow the on-screen instructions to install the content pack.”
Then return to this guide to complete the remaining steps.
Click Proceed.
Click Import as enabled. Optionally disable backfill if you do not want to import historical data.
Click Install selected.
Cisco ThousandEyes Content Pack Installation In the confirmation dialog, click Install.
Wait for the installation to complete. The dialog will show the installed KPI base searches, entity types, service templates, and services.
Return to the Data Integrations page. The Cisco ThousandEyes content pack should display a green checkmark with the status “All Saved Searches activated.”
In ITSI, go to Configuration > Service Monitoring > Service and KPI Management to confirm that the ThousandEyes services are enabled.
Update the Index Used by the Content Pack
If your test stream does not use the thousandeyes
index, update the content pack's search macro to match your selected index.
In Splunk Enterprise, go to Settings > Advanced search > Search macros.
In the App drop-down menu, select Cisco ThousandEyes (DA-ITSI-CP-thousandeyes).
In the Filter field, type
itsi_cp_thousandeyes_index
to locate the macro.Click itsi_cp_thousandeyes_index to open it.
In the Definition field, update the value of
index="thousandeyes"
to match the index used by the Cisco ThousandEyes App for Splunk.Click Save to apply your changes.
Configure the Content Pack for ITSI Monitoring and Alerting
In Splunk ITSI, go to Configuration > Data Integrations.
Select the Content library tab.
Select the ITSI Monitoring and Alerting content pack.
Review what's included in the content pack, then click Proceed.
Leave the default Add all 45 objects.
Click Import as enabled.
Optionally backfill your ITSI environment with the previous seven days of KPI data.
Click Install selected.
ITSI Monitoring and Alerting Content Pack Installation Click Install.
For more information, see Install and configure the Content Pack for ITSI Monitoring and Alerting.
Stream ThousandEyes Test Data to Splunk ITSI
Ingest ThousandEyes network data to Splunk using the Cisco ThousandEyes App for Splunk.
Note: The default expected index is thousandeyes
. If your data stream uses a different index, you must update the macro as described in the Update the index section.

Send ThousandEyes Alert Notifications to Splunk ITSI
Step 1: Configure a Custom Webhook in ThousandEyes
Follow the steps in Splunk Alert Notification to create a custom webhook for sending ThousandEyes alerts to Splunk ITSI.

Step 2: Enable Cisco ThousandEyes Inbound Notifications in Splunk ITSI
In Splunk ITSI, go to Configuration > Data Integrations.
Under Alerts, click Cisco ThousandEyes.
In the connections table, click the ⋮ (more actions) menu for
thousandeyes_default
, then click Activate.The connection status should update to Active.
Send Splunk ITSI Episodes to ThousandEyes
Configure Alert Rule for Aggregation Policies
In Splunk ITSI, Go to Configuration > Event Management > Notable Event Aggregation Policies.
For each enabled aggregation policy:
Open the Action Rules tab.
Click + Add Rule.
Under If, select:
The number of events in this episode is
Greater than or equal to
1
Under Then, select:
Send to ThousandEyes
Repeat every event while episode is active
Alert Rule for Aggregation Policies Click Configure.
Enter the public host URL of your Splunk instance.
This URL is prepended to the ITSI episode URI and used to generate a direct link from ThousandEyes to the episode details page.
Click Done, then Save.
Configure Search Macros for the Content Pack for ITSI Monitoring and Alerting
If you're using the Content Pack for ITSI Monitoring and Alerting, update the search macros to enrich alerts with the ThousandEyes test ID, as described in the Splunk documentation.
From the Splunk Enterprise main menu, go to Settings > Advanced search > Search macros.
In the App filter drop-down, select IT Service Intelligence (itsi).
In the Filter field, search for the macro
enrich_entity_notables_with_entity_alias_and_info(1)
.Click the macro name to view the full details.
In the Definition field, uncomment the existing block by doing the following:
Remove the first line beginning with
eval spl_comment ...
.On the new first line, remove the leading
| noop ```
.On the last line, remove the trailing
```
.
After making these changes, the Definition should contain:
lookup itsi_entities _key as $entity_key$ OUTPUT _itsi_informational_lookups _itsi_identifier_lookups | eval _itsi_entity_enrichment_fields=mv_to_json_array(mvappend(mvmap(_itsi_informational_lookups, "entity.info."._itsi_informational_lookups), mvmap(_itsi_identifier_lookups, "entity.alias."._itsi_identifier_lookups))) | rex mode=sed field=_itsi_entity_enrichment_fields "s/=/\":\"/g s/\[/{/g s/\]/}/g" | spath input=_itsi_entity_enrichment_fields | foreach "entity.alias.*" "entity.info.*" [| eval keep.<<FIELD>> = if(in("<<MATCHSTR>>", `entity_enrichment_fields_list`), '<<FIELD>>', null())] | fields - entity.info.* entity.alias.* | rename keep.entity.* as entity.* | eval spl_comment="After enrichment is done, pull certain CPMA fields automatically from the entity enrichment logic" | eval alert_group=coalesce(alert_group, 'entity.info.alert_group')
Alternatively, you can replace the entire definition with the snippet above.
Click Save to apply the changes and return to the Search macros page.
In the Filter field, search for the macro
entity_enrichment_fields_list
.Click the macro name to open it.
In the Definition field, insert
"thousandeyes_test_id",
between"alert_group",
and""
.After the update, the Definition should contain:
"alert_group", "thousandeyes_test_id", ""
Click Save to apply the change.
Visualize ITSI Episodes in ThousandEyes
Open a ThousandEyes test impacted by an ITSI episode.
In the test timeline, Splunk ITSI episodes appear as yellow swimlane annotations below the primary metric.
Splunk ITSI Episode Visualization Hover over an annotation to see a summary of the number of episodes at that point in time and the total number of notable events across all episodes.
Click the Splunk ITSI tab to view episode details.
Splunk ITSI Tab Use the ITSI URL to navigate back to the episode in Splunk.
To go back to the episode in Splunk ITSI, click the ITSI URL.
Last updated