The post Deprecation of Splunk On-Call Phone Notifications to China (+86) appeared first on Knowledge Base.
]]>As you may know, we are all experiencing increased restrictions and regulations between the U.S. and China. As a company, Splunk has decided to no longer provide voice call notifications to responders in the +86 country code (China), effective September 29th, 2023.
In response, affected end-users are encouraged to configure personal paging policies to diversify their Splunk On-Call notification methods (i.e., SMS, Push, and Email notification methods). Please note that the Splunk On-Call product continues to be supported globally, and all functionality will be available to customers with responders outside of the +86 country code (China). Again, please be advised that we will be deprecating Splunk On-Call voice call notification service for +86 country code (China) effective on September 29th, 2023. We sincerely apologize for any inconvenience this may cause.
The post Deprecation of Splunk On-Call Phone Notifications to China (+86) appeared first on Knowledge Base.
]]>The post Big Panda Integration Guide appeared first on Knowledge Base.
]]>
To start, navigate to the integrations tab in On-Call and select the Big Panda Integration. Next click “Enable Integration” and a new REST endpoint will be generated for your org.
Follow this guide to create a notification webhook for the alert you’d like to send to On-Call in Big Panda: https://docs.bigpanda.io/reference/webhook
When you get to the point where you need to put in an endpoint that Big Panda will send the payload to, put in the endpoint from the On-Call Big Panda integration page with your desired routing_key filled in.
Once this is saved you should now receive incidents in On-Call from the webhook notification that was just configured in Big Panda!
The post Big Panda Integration Guide appeared first on Knowledge Base.
]]>The post How to Contact Splunk On-Call Support appeared first on Knowledge Base.
]]>There are three different ways to contact Splunk On-Call (formerly VictorOps) Support:
HOW TO CREATE A SPLUNK SUPPORT PORTAL LOGIN: When accessing the Splunk Support Portal for the first time, you will need to create a new Splunk login. It’s an easy process, and you can take that action now:
CREATING A SUPPORT CASE IN THE SUPPORT PORTAL: You must log in to the Splunk Support Portal to create a Splunk On-Call Support Case.
The post How to Contact Splunk On-Call Support appeared first on Knowledge Base.
]]>The post Webex Teams Integration Guide appeared first on Knowledge Base.
]]>
To start, navigate to the Incoming Webhooks app on the Webex App Hub and click the green Connect button. Authenticate as required, then click Accept.
Occasionally, this opens a new Webex tab that spins incessantly. Disregard this, navigate back to the Incoming Webhooks app tab, and refresh. The green Connect button should be replaced with a Disconnect button and towards the bottom of the screen, you’ll be prompted to provide a Webhook name and to select a Space for the webhook.
After providing these, click the Add button and copy the Webhook URL to your clipboard.
Navigate to Integrations >> Outgoing Webhooks and click the blue Add Webhook button to create a new one.
Below are our suggested values for the webhook:
Event: Incident-Triggered
Method: POST
Content Type: application/json
Custom Headers: none
To: <your Webhook URL copied from Webex>
Payload:
{ "markdown": "${{ALERT.entity_display_name}}<br>${{ALERT.state_message}}" }
Lastly, click Save. An Outgoing Webhook will now be sent to your Webex Teams space when an incident is triggered in Splunk On-Call.
With some configuration adjustments, it’s possible to reduce the scope of the Outgoing Webhook so that it only successfully posts a message in Webex Teams when your specified routing key is present in the Splunk On-Call incident.
To start, navigate back to the Outgoing Webhook you created under Integrations >> Outgoing Webhooks and edit the webhook. Navigate to the To field and highlight the portion following
https://webexapis.com/v1/webhooks/incoming/
It should be a random string looking something like Y2lzY29zcGFyazovL3VybjpURUFNOnVzLXdlc3QtMl9yL1dFQkhPT0svNTZhZDEzZmMtNWQyNi00YTA3LWI5OTgtNjJiNmQwZTc2NWNm.
Copy this random string to your clipboard and replace it with ${{ALERT.webexteams-field}}. The full URL should now look like
https://webexapis.com/v1/webhooks/incoming/${{ALERT.webexteams-field}}
Save your changes.
Next, navigate to the Alert Rules Engine under Settings >> Alert Rules Engine and click the blue Add Rule button.
In the top line, specify the routing_key you’d like to have trigger the message in Webex Teams. Next, skip down to the Transform these alert fields section and set the webexteams-field to the portion of the URL you copied earlier. The resulting rule should look similar to the below screenshot.
Click the blue Save button to save the rule. This optional configuration is now complete.
When the routing key you’ve specified is present on an alert, this alert rule will apply and create a field called webexteams-field with a value of the URL portion you pasted in. This webexteams-field value is then dynamically pulled in on the Outgoing Webhook, completing the URL and giving it a valid destination to send to. For all alerts that don’t contain this routing key, the webhook will be attempted and will fail as it will be directed to a URL of literally https://webexapis.com/v1/webhooks/incoming/${{ALERT.webexteams-field}}.
This largely builds off of the previous “[Optional] Only send a notification to Webex for alerts directed to a specific routing key” section. This takes it a step further and walks through the creation of multiple Incoming Webhooks in Webex Teams that direct to different spaces.
To start, navigate back to the Incoming Webhooks page on the Webex App Hub. Provide a new webhook name, specify the space you want this to sent to, and click Add. Copy the resulting Webhook URL to your clipboard.
You can now scroll back up to the In Splunk On-Call section and resume following the instructions from there. You will complete both that and the [Optional] Only send a notification to Webex for alerts directed to a specific routing key section again, specifying the different routing key you’d like to send your Webex Space. Repeat these steps as necessary for all of the routing keys and spaces you’d like to integrate with.
The post Webex Teams Integration Guide appeared first on Knowledge Base.
]]>The post Auto-Pause & High Alert Lag appeared first on Knowledge Base.
]]>Auto-Pause is an On-Call security event that occurs when your On-Call instance has reached a total of 5,000 or more active incidents, defined as incidents that are in a Triggered or Acknowledged state. When Auto-Pause is triggered, all alert processing is halted and we begin to queue all incoming alerts to the instance. Alert Lag may soon follow due to this backlog. If your instance exceeds the 5,000 active incident threshold and Auto-Pause is triggered, communication with On-Call Support will be required to re-enable your account.
High Alert Lag occurs when alerts are sent from a monitoring tool to your On-Call instance at a rate faster than our system can process them. This can happen without an organization being paused and can be caused by alerts that don’t create incidents, like a mass of INFO or RESOLVED alerts. Our alert processing limit is 150 alerts per minute (2 alerts per second).
Both Auto-Pause and Alert Lag are often a symptom of a repeating loop sending alerts from the monitoring tool upstream of Splunk On-Call, and we ask for you to investigate that tool as a potential cause of the issue. Auto-Pause specifically can also be triggered because too many alerts have piled up without being resolved, independent of an alert storm. Following best practices for incident management can help you avoid reaching these states.
As soon as your organization reaches a state of Auto-Pause, you’ll receive an email from the Splunk On-Call Support team letting you know about the event. If you’ve been contacted about this, it is likely because you are a Global Admin of the respective instance, a Team Admin of the team with most of the incidents coming in, or are currently on-call.
The first step for you will be to identify the reason for the high amount of active incidents and resolve it. After that, all or most of the active incidents will need to be resolved within the organization, which can be done by either the Support team or on your own. Once we can confirm that an alert storm is no longer occurring, and all active incidents are resolved, there are two options to re-enable alerting:
After deciding which option will be right for your organization, please let the Support Engineer that contacted you know what you’d like to do. They will take the appropriate actions (clear backlog with permission, resolve all incidents with permission, etc.), and notify you when your alerting has been re-enabled.
The post Auto-Pause & High Alert Lag appeared first on Knowledge Base.
]]>The post IMPORTANT – HOW TO CONTACT SPLUNK ON-CALL SUPPORT appeared first on Knowledge Base.
]]>Thank you for being a valued Splunk customer. We are excited to share some enhancements to the Support Experience.
The Splunk On-Call (formerly VictorOps) Support contact page is moving to join the Splunk Support Portal. You’ll receive the same world-class support from your Splunk On-Call Support Engineers.
PLEASE NOTE: This migration will NOT affect your login and access to your Splunk On-Call (formerly VictorOps) instance. On November 11th, end-users may contact Splunk On-Call Support via the following methods:
1. Live Chat: If you are logged into your Splunk On-Call instance, you will have the ability to Live Chat with the Splunk On-Call Support team.
2. Splunk Support Portal: You can open a Splunk On-Call support case in the Splunk Support Portal:https://login.splunk.com/
IMPORTANT CHANGES:
1. CREATE A SPLUNK LOGIN: When accessing Splunk Support Portal for the first time, you will need to create a new Splunk login. It’s an easy process, and you can take that action now:
The post IMPORTANT – HOW TO CONTACT SPLUNK ON-CALL SUPPORT appeared first on Knowledge Base.
]]>The post Rapid7 Integration Guide appeared first on Knowledge Base.
]]>Splunk On-Call Version Required: Starter, Growth, or Enterprise
Rapid7 is here to help you reduce risk across your entire connected environment so your company can focus on what matters most. Whether you need to easily manage vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, or automate your operations — Rapid7 has solutions and guidance for you.
From the main timeline select Integrations >> 3rd Party Integrations >> Rapid7
If the integration has not yet been enabled, click the “Enable Integration” button. Copy the “URL to notify” to your clipboard.
Once you have copied the URL to notify to your clipboard, click on Settings >> Routing Keys page to find your routing key configuration. Decide which routing_key will be used with this integration and make sure it is associated to the correct escalation policy/policies. For more information on routing keys or instructions on creating a new one, please see this article.
The Data Exporter is now configured and will send two types of messages. The first is a test
event to confirm the URL is working. This message will be sent whenever the webhook data exporter is started or if the configuration is changed. The second type is an idr_alert
event. This type of message will be sent whenever an alert triggers in InsightIDR and contains information about the alert in the event. More details about each type of event can be found in Rapid7’s documentation here.
The post Rapid7 Integration Guide appeared first on Knowledge Base.
]]>The post Protected: Scout APM Integration Guide – DRAFT appeared first on Knowledge Base.
]]>This content is password protected. To view it please enter your password below:
The post Protected: Scout APM Integration Guide – DRAFT appeared first on Knowledge Base.
]]>The post Splunk Synthetic Monitoring Integration Guide appeared first on Knowledge Base.
]]>You must be an administrator in Splunk Synthetic Monitoring and a Global or Alert Admin in Splunk On-Call to establish this integration.
In Splunk On-Call, select Integrations >> Splunk Synthetic Monitoring
If the integration has not yet been enabled, click the “Enable Integration” button to generate your endpoint URL. Copy this URL to your clipboard.
From the Rigor Monitoring web portal, select the 3 dot menu next to your profile icon in the upper righthand corner and select Alert Webhooks.
Click the + New button to create a new webhook and select Splunk On-Call as the type.
Give the webhook a name and specify your trigger or triggers. In the “send request to” box for each trigger, replace the default https://alert.victorops.com/integrations/<<YOUR_VICTOROPS_REST_ENDPOINT>> with the URL you’d previously copied.
On each trigger, also replace the trailing $routing_key value with the Splunk On-Call routing key you’d like this webhook to hit. For more information on routing keys, see this article.
You’re welcome to leave the payloads at their default values, or if you find it more appropriate, replace the default variables with ones more catered towards your use case.
Once finished, click the Test button to test the integration out. This will send and alert with your specified payloads into the Splunk On-Call timeline.
Lastly, hit the Create button at the bottom of the screen to save your Alert Webhook. Splunk Synthetic Monitoring will now send a notification to Splunk On-Call whenever the trigger conditions are met.
The post Splunk Synthetic Monitoring Integration Guide appeared first on Knowledge Base.
]]>The post Twilio SMS Integration Guide appeared first on Knowledge Base.
]]>Navigate to the Integrations Tab and under 3rd Party Integrations enable the Twilio Integration. Copy the API key to your clipboard for late.
Next, click on the API tab and make sure the API ID and KEY have been enabled.
First, you will need to purchase a Twilio phone number.
Once a number has been purchased in Twilio, the next step is to set up the SMS function.
Under Functions > Functions (Classic) > List, click “Add a New Function”. Name the Function Splunk-On-Call-SMS and name the path SpOC-SMS.
Under Configuration, the Event should be “Incoming Messages” and the code should be pasted from below:
NOTE: next to got.post be sure to replace the {VICTOROPS_TWILIO_SERVICE_API_KEY}/${ROUTING_KEY}
const qs = require('qs'); const got = require('got'); const _ = require('lodash'); exports.handler = function(context, event, callback) { const {ROUTING_KEY, VICTOROPS_TWILIO_SERVICE_API_KEY} = context; console.log(`${ROUTING_KEY} ${VICTOROPS_TWILIO_SERVICE_API_KEY}`); var got = require('got'); let twiml = new Twilio.twiml.MessagingResponse(); twiml.message({ to: event.From }, 'Incident Created'); var alert = { monitoring_tool: 'Twilio', message_type: 'critical', entity_display_name: `${event.Body}`, state_message: `From ${event.From} -- ${event.Body}`, entity_id: `${event.From}` }; console.log(alert); got.post(`https://alert.victorops.com/integrations/generic/20131114/alert/${VICTOROPS_TWILIO_SERVICE_API_KEY}/${ROUTING_KEY}`, { body: alert, headers: { 'accept': 'application/json', 'Content-Type': 'application/json' }, json: true }).then(function(response) { console.log(response.body); callback(null, twiml); }).catch(function(error) { console.log(error); callback(error); }); };
Save the Function.
Next, under Functions > Functions (Classic) > Configure check the box to Enable ACCOUNT_SID and AUTH_TOKEN. Then set up the Environment Variable and Dependencies.
NOTE: if you already have Live Call Routing set up with Environment Variables and Dependencies skip this step and keep your current configuration.
Environment Variables:
VICTOROPS_API_ID | ******** |
VICTOROPS_API_KEY | ********* |
VICTOROPS_TWILIO_SERVICE_API_KEY | **************** |
Dependencies:
xmldom | 0.1.27 |
lodash | 4.17.10 |
fs | 0.0.1-security |
twilio | 3.6.3 |
got | 9.6.0 |
util | 0.11.0 |
Save the configuration.
Next, set up your phone number to be able to receive SMS messages. Under Messages, under Configure with select “Webhooks, TwiML, …”, under A message comes in select “Function”, under Service select”default”, and under Function Path select “/SpOC-SMS”.
Save the properties.
Test by sending an SMS to your Twilio phone number. Make sure whoever might get paged for the test is aware they will receive a test Splunk On-Call incident.
The post Twilio SMS Integration Guide appeared first on Knowledge Base.
]]>