Skip to content

Commit 5ee402f

Browse files
Merge pull request #1722 from splunk/repo-sync
Pulling refs/heads/main into main
2 parents aa38e56 + 5c5ea33 commit 5ee402f

File tree

4 files changed

+92
-103
lines changed

4 files changed

+92
-103
lines changed

Diff for: apm/apm-spans-traces/trace-analyzer.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following table presents what each APM tool is best suited for:
5757
Explore your trace data
5858
=========================
5959

60-
To open Trace Analyzer, select :guilabel:`Traces` in Splunk APM and select :guilabel:`Switch to Trace Analyzer`. To switch back to the classic Traces page, select :guilabel:`Switch to Classic View`. See :ref:`trace-search` for more info about the classic traces view.
60+
To open Trace Analyzer, select :guilabel:`Traces` in Splunk APM and select :guilabel:`Switch to Trace Analyzer`.
6161

6262
To explore your trace data, use the following controls, which are numbered as callouts in the image. Additional details for each callout follow the image:
6363

Diff for: gdi/opentelemetry/collector-addon/collector-addon-release-notes.rst

+17-2
Original file line numberDiff line numberDiff line change
@@ -12,24 +12,39 @@ Release Notes for the Splunk Add-On for the OpenTelemetry Collector
1212
:hidden:
1313

1414
.. list-table::
15-
:widths: 30 35 35
15+
:widths: 20 20 20 40
1616
:header-rows: 1
1717
:width: 100%
1818

1919
* - Splunk Add-on version
2020
- Release date
2121
- Collector version
22+
- Details
23+
24+
* - 1.4.1
25+
- April 2, 2025
26+
- :new-page:`version 0.120 <https://github.com/signalfx/splunk-otel-collector/releases/tag/v0.120.0>`
27+
-
28+
29+
* - 1.4.0
30+
- February 27, 2025
31+
- :new-page:`version 0.118 <https://github.com/signalfx/splunk-otel-collector/releases/tag/v0.118.0>`
32+
- * Linux: Adds support for discovery mode flags
33+
* Linux: Fixes an issue affecting the setting of the gomemlimit environment variable
34+
* Windows: Fixes an issue affecting the setting of the gateway environment variable
2235

2336
* - 1.3.3
2437
- November 7, 2024
2538
- :new-page:`version 0.111 <https://github.com/signalfx/splunk-otel-collector/releases/tag/v0.111.0>`
39+
-
2640

2741
* - 1.3.2
2842
- September 20, 2024
2943
- :new-page:`version 0.104 <https://github.com/signalfx/splunk-otel-collector/releases/tag/v0.104.0>`
44+
-
3045

3146
* - 1.3.1
3247
- August 6, 2024
3348
- :new-page:`version 0.104 <https://github.com/signalfx/splunk-otel-collector/releases/tag/v0.104.0>`
34-
49+
-
3550

Original file line numberDiff line numberDiff line change
@@ -1,127 +1,90 @@
1-
Jira integration for Splunk On-Call
1+
Jira App integration for Splunk On-Call
22
**********************************************************
33

4-
[ht_toggle title=“Requirements” id=“” class=“” style=“” ]
4+
Requirements
5+
================
56

6-
**Jira Version Required**: Jira Server 7.7.0 - 8.22.6, Jira Cloud
7-
(versionless)
7+
* Jira Version Required: Jira Server 7.7.0 - 8.22.6, Jira Cloud
8+
* Splunk On-Call Version Required: Starter, Growth, or Enterprise
9+
* Global Admin privileges are required for the Splunk On-Call configuration.
810

9-
**Splunk On-Call Version Required:** Starter, Growth, or Enterprise
11+
Configure in Splunk On-Call
12+
=====================================
1013

11-
[/ht_toggle]
14+
#. In Splunk On-Call, go to :guilabel:`Integrations` then :guilabel:`API`.
15+
#. Select :guilabel:`New Key`.
16+
#. Give the key a description and copy the resulting API key and API ID.
1217

13-
**Configuration in Splunk On-Call**
14-
-----------------------------------
18+
Install the Splunk On-Call Add-On in Jira
19+
==========================================
1520

16-
**NOTE**\ *: Global Admin privileges are required for the Splunk On-Call
17-
portion of the configuration.*
21+
#. Log in as a Jira administrator, then select the Jira administration gear icon then select :guilabel:`Manage apps` to go to the Atlassian Marketplace.
22+
#. In the sidebar, select :guilabel:`Find new apps` under the Atlassian Marketplace header.
23+
#. If you are on Jira Server, search for the app "Splunk On-Call for Jira Server". If you are on Jira Cloud, search for "VictorOps for Jira Cloud". After you've located the right app, select :guilabel:`Install`.
24+
#. After installation completes, select :guilabel:`Configure`.
1825

19-
In Splunk On-Call, navigate to **Integrations >> API**.
20-
21-
Click the **New Key** button. Give the key a description. Note the
22-
resulting **API key** and existing **API ID**.
23-
24-
**Installing the Splunk On-Call Add-On**
25-
----------------------------------------
26+
Configuring application settings
27+
--------------------------------
2628

27-
1. Log in as a Jira administrator, then navigate to the Atlassian
28-
Marketplace by clicking on **Jira administration gear** **icon >
29-
Manage apps**.
30-
2. In the left-hand sidebar, click **Find new apps** under the Atlassian
31-
Marketplace header.
32-
3. If on Jira Server, search for the app \_Splunk On-Call for Jira
33-
Server\_\_.\_ If on Jira Cloud, search for the app *VictorOps for
34-
Jira Cloud*.  Once you've located the right app, click *Install*.
29+
#. Enter the API key you generated in VictorOps in the :guilabel:`API Key` field under :guilabel:`Connect to your VictorOps Organization` on the VictorOps for Jira Server Configuration page.
30+
#. In the :guilabel:`API ID` field in the same section, insert the API ID you coped in the preceding Configure Splunk On-Call step.
31+
#. Copy the Splunk On-Call org ID displayed in your VictorOps URL. The org ID is at the end of the URL you use to log in: ``https://portal.victorops.com/client/<Org_ID>``. Paste the org ID in Jira's :guilabel:`Organization ID` field.
32+
#. Select :guilabel:`Connect`.
3533

36-
Once installation completes, click on **Configure**.
34+
A new entry appears in the Connected VictorOps Organizations section with a green VALID flag.
3735

38-
Configuring Application Settings
39-
--------------------------------
36+
.. image:: /_images/spoc/1jira.png
4037

41-
1. Insert the API key you generated in VictorOps into the **API Key**
42-
field under the *Connect to your VictorOps Organization* section of
43-
Jira's *VictorOps for Jira Server Configuration* page.
44-
2. In the **API ID** field in the same section, insert the API ID you
45-
noted in the Splunk On-Call step above.
46-
3. Copy the Splunk On-Call Org ID displayed in your VictorOps URL
47-
(for example :samp:`https://portal.victorops.com/client/%7BOrg_ID`) and paste it in
48-
Jira's **Organization ID** field. This is appended to the incident
49-
link within Jira tickets.
50-
4. Once all three fields have been populated, click **Connect**.  On
51-
success, a new entry will appear in the *Connected VictorOps
52-
Organizations* section, and display a green “VALID” flag.
53-
54-
/_images/spoc/1jira.png
55-
56-
**Configuring Jira Project Settings**
38+
Configure Jira project settings
5739
-------------------------------------
5840

59-
The Splunk On-Call add-on must be enabled and configured for each Jira
60-
project you wish to associate.  Note that while multiple projects can
61-
connect to the same Splunk On-Call organization, projects cannot share
62-
the same *Default Team Escalation Policy*.
41+
The Splunk On-Call add-on must be activated and configured for each Jira project you want to associate. While multiple projects can
42+
connect to the same Splunk On-Call organization, projects cannot share the same Default Team Escalation Policy.
6343

64-
1. In Jira, click **Projects**
65-
2. Navigate to **Project settings** of the project **you wish to enable
66-
for the Splunk On-Call add-on**, then click **VictorOps Settings**.
67-
3. Click **Enable VictorOps for this Project**.  This will expand the
68-
page to display a list of configurable fields.
44+
#. In Jira, select :guilabel:`Projects`.
45+
#. Go to :guilabel:`Project settings` of the project you want to activate for the Splunk On-Call add-on.
46+
#. Select :guilabel:`VictorOps Settings`.
47+
#. Select :guilabel:`Enable VictorOps for this Project`.
6948

70-
Default Incident Settings
49+
The page displays a list of configurable fields.
50+
51+
Default incident settings
7152
~~~~~~~~~~~~~~~~~~~~~~~~~
7253

73-
1. Under *VictorOps Instance*, select the Splunk On-Call organization
74-
you wish to associate with this project.
75-
2. Under *Default Team Escalation Policy*, select the Splunk On-Call
76-
Escalation Policy you would like to page when Jira issues create
77-
incidents in Splunk On-Call.  NOTE:  Incoming VictorOps incidents
78-
assigned to this Escalation Policy will be the only ones allowed to
79-
create issues in your Jira project.
80-
3. Under *Default User*, select the Jira user you wish to designate as
81-
Reporter for issues generated by incoming Splunk On-Call incidents.
82-
83-
Incoming Issue Settings
54+
#. Under :guilabel:`VictorOps Instance`, select the Splunk On-Call organization you want to associate with this project.
55+
#. Under :guilabel:`Default Team Escalation Policy`, select the Splunk On-Call Escalation Policy you want to page when Jira issues create incidents in Splunk On-Call. Incoming VictorOps incidents assigned to this Escalation Policy are the only incidents allowed to create issues in your Jira project.
56+
#. Under :guilabel:`Default User`, select the Jira user you want to designate as reporter for issues generated by incoming Splunk On-Call incidents.
57+
58+
Incoming issue settings
8459
~~~~~~~~~~~~~~~~~~~~~~~
8560

86-
Splunk On-Call incidents created for a project's *Default Team
87-
Escalation Policy* will automatically generate Jira issues.  The default
88-
type for such issues (Bug, Epic, Story, or Task) is set by selecting the
89-
desired option from the **Issue type to use for incoming VictorOps
90-
incidents** dropdown.
61+
Splunk On-Call incidents created for a project's Default Team Escalation Policy automatically generate Jira issues. The default type for such issues (Bug, Epic, Story, or Task) is set by selecting the desired option from the :guilabel:`Issue type to use for incoming VictorOps incidents` dropdown menu.
9162

92-
If you wish to disable such issue creation, deselect the **Allow issues
93-
to be created from incidents via the REST API** checkbox.
63+
If you want to disable such issue creation, deselect the :guilabel:`Allow issues to be created from incidents via the REST API` checkbox.
9464

95-
/_images/spoc/2jira.png
65+
.. image:: /_images/spoc/2jira.png
66+
:width: 50%
9667

97-
Jira State Configuration
68+
Jira state configuration
9869
~~~~~~~~~~~~~~~~~~~~~~~~
9970

100-
Defining state mapping allows Jira issues to remain synchronized as
101-
incidents move through their life cycle in VictorOps.
71+
Define state mapping to allows Jira issues to remain synchronized as incidents move through their life cycle in VictorOps.
10272

103-
/_images/spoc/3jira.png
73+
.. image:: /_images/spoc/3jira.png
74+
:alt:
75+
:width: 50%
10476

105-
**Creating a Splunk On-Call Incident Within Jira**
77+
Create a Splunk On-Call incident in Jira
10678
--------------------------------------------------
10779

108-
Currently, Splunk On-Call incidents can only be created from the Jira
109-
issue view.
110-
111-
1. Click **More** > **Create VictorOps Incident**.  A preview of the
112-
Splunk On-Call incident card will display, using the project's
113-
*Default Team Escalation Policy*. Note: For Jira Cloud, the More
114-
button is an ellipsis button.
115-
2. You may select a different escalation policy from the *VictorOps Team
116-
Escalation Policy* dropdown.  You may also use the *Additional Users*
117-
dropdown to optionally include additional users for response.  Note
118-
that adding users to an incident will *not* create a “Multi-Responder
119-
incident” in Splunk On-Call. 
120-
3. Click **Create Incident** to generate a Splunk On-Call incident. 
121-
This will then display a *Triggered* Splunk On-Call incident card
122-
under the *VictorOps* section in the lower right frame of the issue
123-
view.
124-
4. Click the incident card's **Incident Details** link to display the
125-
incident in Splunk On-Call in a new browser tab.
126-
127-
/_images/spoc/4jira.png
80+
Splunk On-Call incidents can only be created from the Jira issue view.
81+
82+
#. Select :guilabel:`More` then :guilabel:`Create VictorOps Incident`.
83+
#. A preview of the Splunk On-Call incident card displays using the project's Default Team Escalation Policy.
84+
#. (Optional) Select a different escalation policy from the :guilabel:`VictorOps Team Escalation Policy` dropdown menu.
85+
#. (Optional) Use the :guilabel:`Additional Users` dropdown menu to include additional users for response. Adding users to an incident does not create a multi-responder incident in Splunk On-Call.
86+
#. Select :guilabel:`Create Incident` to generate a Splunk On-Call incident. A triggered Splunk On-Call incident card displays under the VictorOps section in the issue view.
87+
#. Select the :guilabel:`Incident Details` in the incident card in Splunk On-Call to display the incident in a new browser tab.
88+
89+
.. image:: /_images/spoc/4jira.png
90+
:alt:

Diff for: sp-oncall/spoc-integrations/jira-integration-guide.rst

+13-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.. _Jira-spoc:
22

3-
Jira integration for Splunk On-Call
4-
***************************************************
3+
Jira webhook, service desk, and URL integrations for Splunk On-Call
4+
**********************************************************************
55

66
.. meta::
77
:description: Configure the Jira integration for Splunk On-Call.
@@ -36,23 +36,27 @@ From the main web interface, select the cog in the upper right hand corner and t
3636

3737
.. image:: /_images/spoc/Jnew1.png
3838
:alt: Select webhooks in Jira
39+
:width: 35%
3940

4041
In the left side bar under “Advanced” select :guilabel:`WebHooks`.
4142

4243
.. image:: /_images/spoc/jnew2.png
4344
:alt: Select webhooks in Jira
45+
:width: 20%
4446

4547
Select :guilabel:`+ Create a Webhook`. Give the WebHook a name, set the status to :guilabel:`Enabled`, and paste in the Splunk On-Call Jira URL.
4648

4749
.. image:: /_images/spoc/jnew3.png
4850
:alt: Select + Create a Webhook
51+
:width: 75%
4952

5053
You have the options to use specific JQL queries to send only certain issues.
5154

5255
Next select the events you want to send to Splunk On-Call for. The example sends a webhook whenever an issue is created, updated or deleted.
5356

5457
.. image:: /_images/spoc/jnew4.png
5558
:alt: Select the events you would like to have a webhook sent to SPoC
59+
:width: 85%
5660

5761
Deselect :guilabel:`Exclude body` so that Jira sends JSON, then select :guilabel:`Create`.
5862

@@ -68,6 +72,7 @@ For example you might want to adjust the severity level of an alert based on the
6872

6973
.. image:: /_images/spoc/Screen-Shot-2019-08-14-at-11.00.20-AM.png
7074
:alt: Sample rule
75+
:width: 75%
7176

7277
To send information based on actions in Splunk On-Call back into Jira you need to configure outbound webhooks. You can do things such as update the status of a ticket when the incident is acknowledged in Splunk On-Call, or add a
7378
comment or assignee to the Jira ticket. The following example walks you through how to add a comment to a Jira ticket when someone writes in the associated incident timeline in Splunk On-Call.
@@ -91,6 +96,7 @@ The final result looks like so:
9196

9297
.. image:: /_images/spoc/Jira-Webhook-Example2.png
9398
:alt: Jira webhook example
99+
:width: 85%
94100

95101
Now every time a chat is entered into the timeline a comment is added to the issue in Jira.
96102

@@ -118,26 +124,31 @@ Set up an incoming mail handler for the project you want to receive issues from
118124

119125
.. image:: /_images/spoc/Jira1.png
120126
:alt: Set up an Incoming mail handler
127+
:width: 35%
121128

122129
In the sidebar select :guilabel:`Incoming Mail`.
123130

124131
.. image:: /_images/spoc/Jira2.png
125132
:alt: Select Incoming Mail
133+
:width: 25%
126134

127135
Select :guilabel:`Add Incoming mail handler`.
128136

129137
.. image:: /_images/spoc/Jira3.png
130138
:alt: Add incoming mail handler
139+
:width: 75%
131140

132141
Give it a name and select the appropriate handler you want to use for this integration, like :guilabel:`Create a new issue or add a comment to an existing issue`. Then select :guilabel:`Next`.
133142

134143
.. image:: /_images/spoc/Jira4.png
135144
:alt: Create a new issue or add a comment to an existing issue
145+
:width: 75%
136146

137147
Select the project you want to associate this integration with, then select :guilabel:`Add`. In this example you select the :guilabel:`Splunk On-Call Critical Incidents`.
138148

139149
.. image:: /_images/spoc/Jira5.png
140150
:alt: Adding VictorOps Critical Incidents project
151+
:width: 75%
141152

142153
Retrieve the email address associated to the project. To do this go into your projects administration page and select :guilabel:`Email requests`. Copy the email you want to use to your clipboard.
143154

0 commit comments

Comments
 (0)