Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 24b781f

Browse files
Merge pull request #1683 from splunk/repo-sync
Pulling refs/heads/main into main
2 parents 9872552 + 12b1cf1 commit 24b781f

31 files changed

+219
-1099
lines changed

alerts-detectors-notifications/alerts-and-detectors/alerts-detectors-notifications.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To learn more, see :ref:`condition-reference`.
8585
<h2>Alerts<a name="alerts" class="headerlink" href="#alerts" title="Permalink to this headline">¶</a></h2>
8686
</embed>
8787

88-
When data in an input MTS matches a condition, the detector generates a trigger event and an alert that has a specific severity level. You can configure an alert to send a notification using Splunk On-Call. For more information, see the :new-page:`Splunk On-Call <https://help.victorops.com/>` documentation.
88+
When data in an input MTS matches a condition, the detector generates a trigger event and an alert that has a specific severity level. You can configure an alert to send a notification using Splunk On-Call. For more information, see the :ref:`about-spoc` documentation.
8989

9090
Alert rules use settings you specify for built-in alert conditions to define thresholds that trigger alerts. When a detector determines that the conditions for a rule are met, it triggers an alert, creates an event, and sends notifications (if specified). Detectors can send notifications via email, as well as via other systems, such as Slack, or via a webhook.
9191

gdi/opentelemetry/components/receiver-creator-receiver.rst

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ Receiver creator receiver
77
.. meta::
88
:description: Use the receiver creator to create receivers at runtime in the OpenTelemetry Collector based on rules. Read on to learn how to configure the component.
99

10-
The receiver creator receiver allows the Splunk Distribution of the OpenTelemetry Collector to create new receivers at runtime based on configured rules and observer extensions. The supported pipeline types are ``metrics``, ``traces``, and ``logs``. See :ref:`otel-data-processing` for more information.
10+
Use the Receiver creator receiver with the Splunk Distribution of the OpenTelemetry Collector to create new receivers at runtime based on configured rules and observer extensions. The supported pipeline types are ``metrics``, ``traces``, and ``logs``. See :ref:`otel-data-processing` for more information.
1111

12-
You can use any of the following observer extensions as listeners for the receiver creator:
12+
You can use any of the following observer extensions as listeners for the Receiver creator:
1313

1414
- ``docker_observer``: Detects and reports running container endpoints through the Docker API.
1515
- ``ecs_task_observer``: Detects and reports container endpoints for running ECS tasks.
@@ -29,17 +29,16 @@ Follow these steps to configure and activate the component:
2929
- :ref:`otel-install-windows`
3030
- :ref:`otel-install-k8s`
3131

32-
2. Configure the receiver creator receiver as described in the next section.
32+
2. Configure the Receiver creator receiver as described in the next section.
3333
3. Restart the Collector.
3434

35-
Sample configurations
35+
Sample configuration
3636
----------------------
3737

38-
To activate the receiver creator receiver, add the desired extensions to the ``extensions`` section of your configuration file, followed by ``receiver_creator`` instances in the ``receivers`` section. For example:
38+
To activate the Receiver creator receiver add the desired extensions to the ``extensions`` section of your configuration file, followed by ``receiver_creator`` instances in the ``receivers`` section. For example:
3939

4040
.. code-block:: yaml
4141
42-
4342
extensions:
4443
# Configures the Kubernetes observer to watch for pod start and stop events.
4544
k8s_observer:
@@ -76,16 +75,10 @@ To activate the receiver creator receiver, add the desired extensions to the ``e
7675
7776
You can nest and configure any supported receiver inside the ``receivers`` section of a ``receiver_creator`` configuration. Which receiver you can nest depends on the type of infrastructure the receiver creator is watching through the extensions defined in ``watch_observers``.
7877

79-
Rules expressions
80-
------------------------------------
81-
82-
New receivers are created dynamically based on rules. Each rule must start with ``type == ("pod"|"port"|"hostport"|"container"|"k8s.node") &&`` such that the rule matches only one endpoint type. For a list of variable available to each endpoint type, see :new-page:`Rules expressions <https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/receiver/receivercreator/README.md#rule-expressions>` on GitHub.
83-
84-
85-
Docker observer example
78+
Example: Docker observer
8679
------------------------------------
8780

88-
The following example shows how to configure the receiver creator using the Docker observer:
81+
The following example shows how to configure the Receiver creator receiver using the Docker observer:
8982

9083
.. code-block:: yaml
9184
@@ -113,10 +106,10 @@ The following example shows how to configure the receiver creator using the Dock
113106
114107
.. note:: See :new-page:`https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/extension/observer/dockerobserver/README.md` for a complete list of settings.
115108

116-
Kubernetes observer example
109+
Example: Kubernetes observer
117110
------------------------------------
118111

119-
The following example shows how to configure the receiver creator using the Kubernetes observer:
112+
The following example shows how to configure the receiver creator receiver using the Kubernetes observer:
120113

121114
.. code-block:: yaml
122115
@@ -149,10 +142,18 @@ The following example shows how to configure the receiver creator using the Kube
149142
150143
.. note:: See :new-page:`https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/extension/observer/k8sobserver/README.md` for a complete list of settings.
151144

145+
Rules to create new receivers
146+
============================================
147+
148+
You can use this receiver to dynamically create new receivers based on rules. Each rule must start with ``type == ("pod"|"port"|"hostport"|"container"|"k8s.node") &&`` such that the rule matches only one endpoint type.
149+
150+
For a list of variables available to each endpoint type, see :new-page:`Rules expressions <https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/receiver/receivercreator/README.md#rule-expressions>` on GitHub.
151+
152+
152153
Settings
153154
======================
154155

155-
The following table shows the configuration options for the receiver creator receiver:
156+
The following table shows the configuration options for the Receiver creator receiver:
156157

157158
.. raw:: html
158159

@@ -161,8 +162,6 @@ The following table shows the configuration options for the receiver creator rec
161162
Troubleshooting
162163
======================
163164

164-
165-
166165
.. raw:: html
167166

168167
<div class="include-start" id="troubleshooting-components.rst"></div>

get-started/overview.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ For more information, see :ref:`logs-intro-logconnect`.
105105

106106
Splunk On-Call incident response software aligns log management, monitoring, chat tools, and more, for a single-pane of glass into system health. Splunk On-Call automates delivery of alerts to get the right alert, to the right person, at the right time.
107107

108-
For more information, see the :new-page:`Splunk On-Call documentation <https://help.victorops.com/>`.
108+
For more information, see the :ref:`about-spoc`.
109109

110110
.. raw:: html
111111

sp-oncall/admin/get-started/admin-getting-started.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The Team page is your central location for configuring teams, schedules, rotatio
5757
:ref:`Create Escalation Policies <team-escalation-policy>` - Escalation policies determine which incidents are routed, to whom they are routed, and how they are escalated. Essentially, an escalation policy is how Splunk On-Call escalates a triggered event.
5858

5959
- Best practice for setting up your escalation policy is to establish a minimum of three escalation paths: on-duty user, previous or next user in a rotation, and manager or team lead.
60-
- :ref:`Read this post <mult-escalation-policies>` for more tips and tricks on how to manage multiple alert behaviors within a single team.
60+
- :ref:`Read this post <multi-escalation-policies>` for more tips and tricks on how to manage multiple alert behaviors within a single team.
6161

6262
- :ref:`Configure Routing Keys <spoc-routing-keys>` - Routing keys tie the alerts from your monitoring tools to the specific team (or escalation policy) in Splunk On-Call. This helps get the right person on the problem and reduce alert noise for those unrelated to a specific incident. These can be found by navigating to :menuselection:`Settings` then :menuselection:`Routing Keys`.
6363

sp-oncall/admin/get-started/api.rst

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
2-
31
.. _spoc-api:
42

53
************************************************************************

sp-oncall/admin/get-started/onboarding-milestones.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Team milestones include the following:
4949
- :ref:`schedule-examples`
5050
#. Implementation of Team Workflows, including:
5151
- :ref:`Create escalation policies <team-escalation-policy>`.
52-
- :ref:`Tips and tricks for multiple escalation policies <mult-escalation-policies>`.
52+
- :ref:`Tips and tricks for multiple escalation policies <multi-escalation-policies>`.
5353

5454

5555
Integration milestones

sp-oncall/admin/get-started/team-dashboard.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
.. _team-dashboard:
22

33
************************************************************************
4-
Splunk On-Call Team dashboard
4+
Splunk On-Call
55
************************************************************************
66

77
.. meta::
88
:description: Splunk On-Call system requirements, including browsers, mobile support, and incident requirements.
99

1010

1111

12-
The Splunk On-Call Team Dashboard provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
12+
The Splunk On-Call provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
1313

1414
All incidents derived from integrated monitoring tools in the incident table include their respective logos to help you rapidly identify the source of an alert. Manually created incidents, along with incidents originating from the Email Endpoint or the REST API integrations, will remain logo free.
1515

1616
Information Alerts can still be found on the Timeline Page.
1717

1818
.. image:: /_images/spoc/team-dashboard.png
1919
:width: 100%
20-
:alt: An image of the team dashboard. On-Call individuals listed on the left; Team incidents are shown in the main pane.
20+
:alt: An image of the . On-Call individuals listed on the left; Team incidents are shown in the main pane.
2121

2222

2323
Filters
@@ -44,12 +44,12 @@ Quickly identify responsible parties during a firefight by easily seeing which p
4444
Manual Incident Creation
4545
----------------------------
4646

47-
You can create a manual incident from the team dashboard by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
47+
You can create a manual incident from the by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
4848

4949
Incident War Rooms
5050
----------------------------
5151

52-
Access Incident Details directly from the Team Dashboard by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
52+
Access Incident Details directly from the by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
5353

5454
People Table
5555
==================

sp-oncall/admin/sso/single-sign-sso.rst

Lines changed: 20 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,17 @@ Configure Single Sign-On for Splunk On-Call
1010
.. toctree::
1111
:hidden:
1212

13-
sp-sso-okta
14-
sp-sso-google
15-
sp-sso-adfs
13+
Configure SSO for Okta<sp-sso-okta>
14+
Configure SSO for Google<sp-sso-google>
15+
Configure SSO for ADFS<sp-sso-adfs>
16+
Configure SSO for other IDPs<sp-sso-other>
1617
sp-sso-users
1718

18-
Requirements
19-
==================
19+
.. raw:: html
20+
21+
<embed>
22+
<h2>Requirements<a name="requirements" class="headerlink" href="#requirements" title="Permalink to this headline">¶</a></h2>
23+
</embed>
2024

2125
This integration is compatible with the following versions of Splunk On-Call:
2226

@@ -25,18 +29,16 @@ This integration is compatible with the following versions of Splunk On-Call:
2529
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are
2630
interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
2731

28-
29-
3032
Configure Single Sign On (SSO) between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
3133
complete the setup on the back-end and respond with confirmation.
3234

3335
If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see :ref:`spoc-support`.
3436

35-
36-
37-
38-
Administrator Setup
39-
==========================
37+
.. raw:: html
38+
39+
<embed>
40+
<h2>Configure SSO: Admin guides<a name="admin-setup" class="headerlink" href="#admin-setup" title="Permalink to this headline">¶</a></h2>
41+
</embed>
4042

4143
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
4244

@@ -46,51 +48,10 @@ Instructions to complete the SSO configuration with Splunk On-Call and your IDP
4648
- :ref:`sso-azure-spoc`
4749
- :ref:`sso-aws-spoc`
4850

51+
.. raw:: html
52+
53+
<embed>
54+
<h2>Sign in to Splunk On-Call through SSO: User guide<a name="user-guide" class="headerlink" href="#user-guide" title="Permalink to this headline">¶</a></h2>
55+
</embed>
4956

50-
51-
.. _sso-onelogin-spoc:
52-
53-
54-
OneLogin
55-
-------------
56-
57-
If you are configuring SSO for OneLogin, the Default relay state is:
58-
59-
https://portal.victorops.com/auth/sso/<<org-slug-here>>
60-
61-
62-
.. _sso-azure-spoc:
63-
64-
65-
Azure Active Directory (SAML-based Sign-on)
66-
-------------------------------------------------------
67-
68-
If you are configuring SSO for Azure Active Directory, use the following values:
69-
70-
- Identifier: :samp:`https://victorops.com`
71-
- Reply URL: :samp:`https://sso.victorops.com/sp/ACS.saml2`
72-
- Sign on URL: :samp:`https://portal.victorops.com/auth/sso/<<org-slug-here>>`
73-
- Relay State: :samp:`https://portal.victorops.com/auth/sso/<<org-slug-here>>`
74-
75-
76-
.. _sso-aws-spoc:
77-
78-
AWS IAM Identity Center - SAML
79-
-------------------------------------------------------
80-
81-
If you are configuring SSO for AWS IAM Identity Center:
82-
83-
84-
#. In the IAM Identity Center console find the :guilabel:`Applications` tab.
85-
#. Select :guilabel:`Add Application` and look for VictorOps.
86-
#. In the configuration settings ensure you set the fields as follows:
87-
88-
- Important: Ensure the Session Duration is set to 1hour.
89-
90-
.. image:: /_images/spoc/sso-aws1.png
91-
:width: 100%
92-
:alt: Application properties page.
93-
94-
.. image:: /_images/spoc/sso-aws2.png
95-
:width: 100%
96-
:alt: Application metadata page.
57+
See :ref:`sp-sso-users`.
Lines changed: 7 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,12 @@
1-
.. _single-sign-sso-google:
1+
.. _sso-google-spoc:
22

33
************************************************************************
4-
Configure Single Sign-On for Splunk On-Call
4+
Configure Single Sign-On for Splunk On-Call using Google Apps
55
************************************************************************
66

77
.. meta::
88
:description: Enable Splunk On-Call SSO for your organization.
99

10-
Requirements
11-
==================
12-
13-
This integration is compatible with the following versions of Splunk On-Call:
14-
15-
- Full-Stack
16-
17-
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
18-
19-
20-
21-
Configure Single Sign On between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
22-
complete the setup on the back-end and respond with confirmation.
23-
24-
If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see :ref:`spoc-support`.
25-
26-
27-
Administrator Setup
28-
==========================
29-
30-
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
31-
32-
- :ref:`sso-okta-spoc`
33-
- :ref:`sso-google-spoc`
34-
-
35-
36-
37-
.. _sso-google-spoc:
38-
39-
Google Apps
40-
================
41-
4210
To configure SSO for Splunk On-Call using Google Apps:
4311

4412
#. Access the Admin portal for Google Apps and navigate to :guilabel:`Apps` then :guilabel:`SAML Apps`.
@@ -53,7 +21,7 @@ To configure SSO for Splunk On-Call using Google Apps:
5321
:width: 100%
5422
:alt: Splunk On-Call SSO Google Apps Setup 2
5523

56-
#. From Step 2 of the wizard, select :guilabel:`Option 2` to download IDP metadata in XML format. Attach and send the downloaded .xml file to :ref:`Splunk On-Call Support <spoc-support>`.
24+
#. From step 2 of the guided setup, select :guilabel:`Option 2` to download IDP metadata in XML format. Attach and send the downloaded .xml file to :ref:`Splunk On-Call Support <spoc-support>`.
5725

5826
.. image:: /_images/spoc/sso-google3.png
5927
:width: 100%
@@ -67,11 +35,8 @@ To configure SSO for Splunk On-Call using Google Apps:
6735
:alt: Splunk On-Call SSO Google Apps Setup 5
6836

6937
#. In the :guilabel:`Service Provider Details` step, enter the following values:
70-
- in the :guilabel:`ACS URL` field: :samp:`https://sso.victorops.com:443/sp/ACS.saml2`
71-
- in the :guilabel:`Entity ID` field: :samp:`victorops.com`
72-
- in the :guilabel:`Start URL` field, enter the following with the correct Organization Slug at the end: :samp:`https://portal.victorops.com/auth/sso/<<org-slug-here>>.`
73-
74-
75-
#. Skip the attribute mapping step and select :guilabel:`Finish`.
76-
38+
- In the :guilabel:`ACS URL` field: :samp:`https://sso.victorops.com:443/sp/ACS.saml2`
39+
- In the :guilabel:`Entity ID` field: :samp:`victorops.com`
40+
- In the :guilabel:`Start URL` field, enter the following with the correct Organization Slug at the end: :samp:`https://portal.victorops.com/auth/sso/<<org-slug-here>>.`
7741

42+
#. Skip the attribute mapping step and select :guilabel:`Finish`.

0 commit comments

Comments
 (0)