Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit efd6228

Browse files
authored
Merge pull request #2670 from splunk/bhillmer-spoc-fixes
fixes from conversion
2 parents f942bdb + d8a2e78 commit efd6228

File tree

9 files changed

+20
-50
lines changed

9 files changed

+20
-50
lines changed

infrastructure/metrics-pipeline/use-case-archive.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Actions
4141

4242
Kai decides to use Archived Metrics to control how Splunk Observability Cloud stores their team's data.
4343

44-
#. In Splunk Observability Cloud, Kai goes to :guilabel:` Settings > Metrics Management`. In the :guilabel:`Pipeline Management` tab Kai searches for the metric ``service.latency`` and configures the ingestion route to Archived Metrics. Kai can now see all the MTS as Archived MTS.
44+
#. In Splunk Observability Cloud, Kai goes to :guilabel:`Settings` then :guilabel:`Metrics Management`. In the :guilabel:`Pipeline Management` tab Kai searches for the metric ``service.latency`` and configures the ingestion route to Archived Metrics. Kai can now see all the MTS as Archived MTS.
4545
#. Kai creates a route exception rule and specifies a filter where ``data_center_region = Europe``. This gives them the estimate of 2,497 Real-Time MTS. Kai also restores the previous hour data to make sure they don't have gaps.
4646
#. Now, Kai views the list of charts and detectors that use ``service.latency``. To learn more about viewing or downloading the list, see :ref:`metrics-usage-report`.
4747
#. Kai already had a filter set up on the charts and detectors for ``data_center_region = Europe``. Kai verifies the data is visible in one of the charts.

sp-oncall/admin/get-started/team-dashboard.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
.. _team-dashboard:
22

33
************************************************************************
4-
Splunk On-Call
4+
Splunk On-Call team dashboard
55
************************************************************************
66

77
.. meta::
88
:description: Splunk On-Call system requirements, including browsers, mobile support, and incident requirements.
99

1010

1111

12-
The Splunk On-Call provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
12+
The Splunk On-Call provides a comprehensive overview of incidents. This view automatically defaults to the teams that you are a member of and allows teams to dive into the details and understand the status of alerts or incidents.
1313

14-
All incidents derived from integrated monitoring tools in the incident table include their respective logos to help you rapidly identify the source of an alert. Manually created incidents, along with incidents originating from the Email Endpoint or the REST API integrations, will remain logo free.
14+
All incidents derived from integrated monitoring tools in the incident table include their respective logos to help you rapidly identify the source of an alert. Manually created incidents, along with incidents originating from the Email Endpoint or the REST API integrations, will remain logo free.
1515

1616
Information Alerts can still be found on the Timeline Page.
1717

1818
.. image:: /_images/spoc/team-dashboard.png
1919
:width: 100%
20-
:alt: An image of the . On-Call individuals listed on the left; Team incidents are shown in the main pane.
20+
:alt: An image of the team dashboard On-Call individuals listed on the left; Team incidents are shown in the main pane.
2121

2222

2323
Filters
@@ -44,12 +44,12 @@ Quickly identify responsible parties during a firefight by easily seeing which p
4444
Manual Incident Creation
4545
----------------------------
4646

47-
You can create a manual incident from the by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
47+
You can create a manual incident from the team dashboard by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
4848

4949
Incident War Rooms
5050
----------------------------
5151

52-
Access Incident Details directly from the by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
52+
Access Incident Details directly from the team dashboard by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
5353

5454
People Table
5555
==================

sp-oncall/admin/sso/sp-sso-adfs.rst

Lines changed: 6 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -7,45 +7,28 @@ Configure Active Directory Federation Services Single Sign-On for Splunk On-Call
77
.. meta::
88
:description: Enable Splunk On-Call SSO for Active Directory Federation Services (ADFS) your organization.
99

10-
11-
12-
1310
Requirements
1411
==================
1512

1613
This integration is compatible with the following versions of Splunk On-Call:
1714

1815
- Full-Stack
1916

20-
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are
21-
interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
22-
23-
17+
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
2418

25-
Configure Single Sign On (SSO) between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
19+
Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
2620
complete the setup on the back-end and respond with confirmation.
2721

2822
If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see :ref:`spoc-support`.
2923

30-
31-
Administrator Setup
32-
==========================
33-
34-
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
35-
36-
- :ref:`sso-okta-spoc`
37-
- :ref:`sso-google-spoc`
38-
- :ref:`sso-onelogin-spoc`
39-
- :ref:`sso-adfs-ac-spoc`
40-
41-
4224
.. _sso-adfs-ac-spoc:
4325

26+
Configure SSO for Active Directory Federation Services (ADFS)
27+
==============================================================
4428

45-
Active Directory Federation Services (ADFS)
46-
===========================================================
29+
To configure SSO for Splunk On-Call using ADFS complete the following steps.
4730

48-
Once you have sent over your Metadata file, and the Splunk On-Call Support team has completed the configuration, you will receive an updated metadata file to complete the configuration on your side.
31+
#. Once you have sent over your Metadata file and the Splunk On-Call Support team has completed the configuration, you will receive an updated metadata file to complete the configuration on your side.
4932

5033
#. In the ADFS Management console, navigate to :guilabel:`Trust Relationships`, then :guilabel:`Relying Party Trusts` and select :guilabel:`Add Relying Party Trust` in the :menuselection:`Actions` pane.
5134

sp-oncall/admin/sso/sp-sso-google.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Configure Single Sign-On for Splunk On-Call using Google Apps
77
.. meta::
88
:description: Enable Splunk On-Call SSO for your organization.
99

10-
To configure SSO for Splunk On-Call using Google Apps:
10+
To configure SSO for Splunk On-Call using Google Apps complete the following steps.
1111

1212
#. Access the Admin portal for Google Apps and navigate to :guilabel:`Apps` then :guilabel:`SAML Apps`.
1313

sp-oncall/admin/sso/sp-sso-okta.rst

Lines changed: 2 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,6 @@ Configure Single Sign-On for Okta and Splunk On-Call
77
.. meta::
88
:description: Enable Splunk On-Call SSO for your organization.
99

10-
11-
12-
1310
Requirements
1411
==================
1512

@@ -20,20 +17,10 @@ This integration is compatible with the following versions of Splunk On-Call:
2017
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are
2118
interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
2219

23-
24-
Administrator Setup
20+
Configure SSO for Okta
2521
==========================
2622

27-
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
28-
29-
- :ref:`sso-okta-spoc-setup`
30-
- :ref:`sso-google-spoc`
31-
-
32-
33-
.. _sso-okta-spoc-setup:
34-
35-
Okta
36-
==========
23+
To configure SSO for Okta complete the following steps.
3724

3825
#. From the Okta user homepage, select :guilabel:`Admin` to access the Okta Admin dashboard.
3926

sp-oncall/alerts/team-escalation-policy.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Escalation policies determine set who is actually on-call for a given team and a
1111

1212
Some things to note:
1313

14-
- Only Team and Global Admins are able to make changes to Escalation Policies
14+
- Only Team and Global Admins are able to make changes to Escalation Policies.
1515
- Only users specified in the first step of an Escalation Policy will receive Timeline and Push notifications that they are on-call and will log hours in the on-call report as being on-call. If you would like users in subsequent steps of an escalation policy to receive these notifications and log these hours, see :ref:`multi-escalation-policies`.
1616
- When an Escalation Policy is executed and a user is being notified, the user's personal paging policy determines how they will be contacted. See :ref:`custom-paging-policy`.
1717

sp-oncall/incidents/incident-pane.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Incident Pane
55
************************************************************************
66

77
.. meta::
8-
:description: About the Incident pane in Splunk On-Call which displays incoming alerts.
8+
:description: About the incident pane in Splunk On-Call which displays incoming alerts.
99

1010
.. toctree::
1111
:hidden:

sp-oncall/notifications/call-notification-numbers.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Splunk On-Call notification phone numbers
77
.. meta::
88
:description: Splunk On-Call contacts you for triggered incidents using the following phone numbers and short code.
99

10-
Splunk On-Call contacts you for triggered incidents using the following phone numbers and short code. To add these numbers to your contacts in the Splunk On-Call mobile app, go to :guilabel:`Settings` then :guilabel:`Help and Support` then :guilabel:`Add VictorOps to Your Contacts`. For more information about the Splunk On-Call mobile app, see :ref:`spoc-mobile-main`
10+
Splunk On-Call contacts you for triggered incidents using the following phone numbers and short code. To add these numbers to your contacts in the Splunk On-Call mobile app, go to :guilabel:`Settings` then :guilabel:`Help and Support` then :guilabel:`Add VictorOps to Your Contacts`. For more information about the Splunk On-Call mobile app, see :ref:`spoc-mobile-main`.
1111

1212
.. image:: /_images/spoc/Add-Contacts-Android-1.png
1313

sp-oncall/reports/post-incident-review.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ To create a Post-Incident Review Report, access the Splunk On-Call web portal, a
1313

1414
Select the :guilabel:`Post-Incident Reviews` option and select :guilabel:`New Report`. Enter a title and select :guilabel:`Create Report`.
1515

16-
Configuring post-incident eeview reports
16+
Configuring post-incident review reports
1717
---------------------------------------------
1818

1919
Once you've created a New Report, you'll enter the main report configuration page where you'll be able to provide and define context

0 commit comments

Comments
 (0)