You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
:description: Splunk On-Call system requirements, including browsers, mobile support, and incident requirements.
9
9
10
10
11
11
12
-
The Splunk On-Call Team Dashboard provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
12
+
The Splunk On-Call provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
13
13
14
14
All incidents derived from integrated monitoring tools in the incident table include their respective logos to help you rapidly identify the source of an alert. Manually created incidents, along with incidents originating from the Email Endpoint or the REST API integrations, will remain logo free.
15
15
16
16
Information Alerts can still be found on the Timeline Page.
17
17
18
18
.. image:: /_images/spoc/team-dashboard.png
19
19
:width:100%
20
-
:alt:An image of the team dashboard. On-Call individuals listed on the left; Team incidents are shown in the main pane.
20
+
:alt:An image of the . On-Call individuals listed on the left; Team incidents are shown in the main pane.
21
21
22
22
23
23
Filters
@@ -44,12 +44,12 @@ Quickly identify responsible parties during a firefight by easily seeing which p
44
44
Manual Incident Creation
45
45
----------------------------
46
46
47
-
You can create a manual incident from the team dashboard by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
47
+
You can create a manual incident from the by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
48
48
49
49
Incident War Rooms
50
50
----------------------------
51
51
52
-
Access Incident Details directly from the Team Dashboard by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
52
+
Access Incident Details directly from the by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
Copy file name to clipboardExpand all lines: sp-oncall/admin/sso/single-sign-sso.rst
+25-26Lines changed: 25 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,8 +15,11 @@ Configure Single Sign-On for Splunk On-Call
15
15
sp-sso-adfs
16
16
sp-sso-users
17
17
18
-
Requirements
19
-
==================
18
+
.. raw:: html
19
+
20
+
<embed>
21
+
<h2>Requirements<aname="requirements"class="headerlink"href="#requirements"title="Permalink to this headline">¶</a></h2>
22
+
</embed>
20
23
21
24
This integration is compatible with the following versions of Splunk On-Call:
22
25
@@ -25,18 +28,16 @@ This integration is compatible with the following versions of Splunk On-Call:
25
28
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are
26
29
interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
27
30
28
-
29
-
30
31
Configure Single Sign On (SSO) between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
31
32
complete the setup on the back-end and respond with confirmation.
32
33
33
34
If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see :ref:`spoc-support`.
34
35
35
-
36
-
37
-
38
-
Administrator Setup
39
-
==========================
36
+
.. raw:: html
37
+
38
+
<embed>
39
+
<h2>Administrator setup<aname="admin-setup"class="headerlink"href="#admin-setup"title="Permalink to this headline">¶</a></h2>
40
+
</embed>
40
41
41
42
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
42
43
@@ -46,24 +47,22 @@ Instructions to complete the SSO configuration with Splunk On-Call and your IDP
46
47
- :ref:`sso-azure-spoc`
47
48
- :ref:`sso-aws-spoc`
48
49
49
-
50
-
51
-
.. _sso-onelogin-spoc:
52
-
53
-
54
-
OneLogin
55
-
-------------
50
+
.. raw:: html
51
+
52
+
<embed>
53
+
<h3>OneLogin<aname="sso-onelogin-spoc"class="headerlink"href="#sso-onelogin-spoc"title="Permalink to this headline">¶</a></h3>
54
+
</embed>
56
55
57
56
If you are configuring SSO for OneLogin, the Default relay state is:
<h3>Azure Active Directory (SAML-based sign-on)<aname="sso-azure-spoc"class="headerlink"href="#sso-azure-spoc"title="Permalink to this headline">¶</a></h3>
65
+
</embed>
67
66
68
67
If you are configuring SSO for Azure Active Directory, use the following values:
69
68
@@ -73,14 +72,14 @@ If you are configuring SSO for Azure Active Directory, use the following values:
0 commit comments