Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 9a83445

Browse files
committed
replace rST headers with HTML
1 parent 12d8a64 commit 9a83445

File tree

3 files changed

+30
-93
lines changed

3 files changed

+30
-93
lines changed

sp-oncall/admin/get-started/team-dashboard.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
.. _team-dashboard:
22

33
************************************************************************
4-
Splunk On-Call Team dashboard
4+
Splunk On-Call
55
************************************************************************
66

77
.. meta::
88
:description: Splunk On-Call system requirements, including browsers, mobile support, and incident requirements.
99

1010

1111

12-
The Splunk On-Call Team Dashboard provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
12+
The Splunk On-Call provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
1313

1414
All incidents derived from integrated monitoring tools in the incident table include their respective logos to help you rapidly identify the source of an alert. Manually created incidents, along with incidents originating from the Email Endpoint or the REST API integrations, will remain logo free.
1515

1616
Information Alerts can still be found on the Timeline Page.
1717

1818
.. image:: /_images/spoc/team-dashboard.png
1919
:width: 100%
20-
:alt: An image of the team dashboard. On-Call individuals listed on the left; Team incidents are shown in the main pane.
20+
:alt: An image of the . On-Call individuals listed on the left; Team incidents are shown in the main pane.
2121

2222

2323
Filters
@@ -44,12 +44,12 @@ Quickly identify responsible parties during a firefight by easily seeing which p
4444
Manual Incident Creation
4545
----------------------------
4646

47-
You can create a manual incident from the team dashboard by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
47+
You can create a manual incident from the by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
4848

4949
Incident War Rooms
5050
----------------------------
5151

52-
Access Incident Details directly from the Team Dashboard by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
52+
Access Incident Details directly from the by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
5353

5454
People Table
5555
==================

sp-oncall/admin/sso/single-sign-sso.rst

Lines changed: 25 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,11 @@ Configure Single Sign-On for Splunk On-Call
1515
sp-sso-adfs
1616
sp-sso-users
1717

18-
Requirements
19-
==================
18+
.. raw:: html
19+
20+
<embed>
21+
<h2>Requirements<a name="requirements" class="headerlink" href="#requirements" title="Permalink to this headline">¶</a></h2>
22+
</embed>
2023

2124
This integration is compatible with the following versions of Splunk On-Call:
2225

@@ -25,18 +28,16 @@ This integration is compatible with the following versions of Splunk On-Call:
2528
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are
2629
interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
2730

28-
29-
3031
Configure Single Sign On (SSO) between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
3132
complete the setup on the back-end and respond with confirmation.
3233

3334
If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see :ref:`spoc-support`.
3435

35-
36-
37-
38-
Administrator Setup
39-
==========================
36+
.. raw:: html
37+
38+
<embed>
39+
<h2>Administrator setup<a name="admin-setup" class="headerlink" href="#admin-setup" title="Permalink to this headline">¶</a></h2>
40+
</embed>
4041

4142
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
4243

@@ -46,24 +47,22 @@ Instructions to complete the SSO configuration with Splunk On-Call and your IDP
4647
- :ref:`sso-azure-spoc`
4748
- :ref:`sso-aws-spoc`
4849

49-
50-
51-
.. _sso-onelogin-spoc:
52-
53-
54-
OneLogin
55-
-------------
50+
.. raw:: html
51+
52+
<embed>
53+
<h3>OneLogin<a name="sso-onelogin-spoc" class="headerlink" href="#sso-onelogin-spoc" title="Permalink to this headline">¶</a></h3>
54+
</embed>
5655

5756
If you are configuring SSO for OneLogin, the Default relay state is:
5857

5958
https://portal.victorops.com/auth/sso/<<org-slug-here>>
6059

6160

62-
.. _sso-azure-spoc:
63-
64-
65-
Azure Active Directory (SAML-based Sign-on)
66-
-------------------------------------------------------
61+
.. raw:: html
62+
63+
<embed>
64+
<h3>Azure Active Directory (SAML-based sign-on)<a name="sso-azure-spoc" class="headerlink" href="#sso-azure-spoc" title="Permalink to this headline">¶</a></h3>
65+
</embed>
6766

6867
If you are configuring SSO for Azure Active Directory, use the following values:
6968

@@ -73,14 +72,14 @@ If you are configuring SSO for Azure Active Directory, use the following values:
7372
- Relay State: :samp:`https://portal.victorops.com/auth/sso/<<org-slug-here>>`
7473

7574

76-
.. _sso-aws-spoc:
77-
78-
AWS IAM Identity Center - SAML
79-
-------------------------------------------------------
75+
.. raw:: html
76+
77+
<embed>
78+
<h3>AWS IAM Identity Center - SAML<a name="sso-aws-spoc" class="headerlink" href="#sso-aws-spoc" title="Permalink to this headline">¶</a></h3>
79+
</embed>
8080

8181
If you are configuring SSO for AWS IAM Identity Center:
8282

83-
8483
#. In the IAM Identity Center console find the :guilabel:`Applications` tab.
8584
#. Select :guilabel:`Add Application` and look for VictorOps.
8685
#. In the configuration settings ensure you set the fields as follows:

sp-oncall/alerts/team-dashboard.rst

Lines changed: 0 additions & 62 deletions
This file was deleted.

0 commit comments

Comments
 (0)