Docs » Splunk On-Call integrations » Grafana integration for Splunk On-Call

Grafana integration for Splunk On-Call πŸ”—

Use the Splunk On-Call Grafana integration to forward Grafana alerts and dashboards into Splunk On-Call to notify the correct on-call users. Create on-call schedules, rotations, and escalation policies in Splunk On-Call, then route Grafana alerts and charts based on those parameters. Monitor and visualize logs, metrics and traces in Grafana and set thresholds to optimize alerts, create charts and surface actionable system insights.

When events meet predetermined monitoring criteria, Grafana sends an alert notification. Then, in the Splunk On-Call timeline, users can route and escalate critical alert data to the correct people. With the Splunk On-Call and Grafana integration, on-call responders can collaborate in real time around system data to reduce mean time to acknowledge (MTTA) and mean time to repair (MTTR) and resolve incidents faster.

With the Splunk On-Call Grafama integration, teams are able to:

  • Track system performance over time, visualize service health and alert on-call teams when applicable monitoring thresholds are met

  • Surface alert context in the form of metrics, logs, graphs and links to runbooks

  • Automatically route and escalate Grafana alert data through Splunk On-Call software and collaborate in a single-pane-of-glass to drive incident workflows forward

  • Chat in-line with incident context to improve collaboration and quickly share critical infrastructure information and dashboards, reducing MTTA and MTTR

Activate Grafana in Splunk On-Call πŸ”—

  1. From the main timeline go to Integrations then Grafana.

  2. Select the Grafana integration and copy the Service API Endpoint for later use.

Copy service api endpoint for Grafana - VictorOps

Connect Splunk On-Call in Grafana πŸ”—

  1. From the main dashboard, select the options menu then Alerting then Notification Channels.

    Connect VictorOps in Grafana dash
  2. Add a new channel.

    Add a new channel in Grafana dash
  3. Give the notification a name select the VictorOps type.

  4. In the VictorOps settings paste in your Service API Endpoint. Replace the $routing_key with the routing key you intend to use. For more information on routing keys, see Create Routing Keys in Splunk On-Call.

  5. Save the integration.

    test and save integration in grafana dash

The resulting test alert in Splunk On-Call looks similar to this:

test alert in VictorOps - from Grafana

Connect the notification channel to your alert πŸ”—

  1. Locate the Grafana Dashboard panel you want to send alerts to Splunk On-Call and select Edit under dropdown arrow next to the panel name.

  2. Go to the Alert section.

  3. Define your alert conditions.

  4. Under Notifications, select the plus button to select the notification channel you configured.

  5. Save your changes.

You have completed the standard configuration. Repeat these steps as necessary, creating separate notification channels for each routing key.

Include an image on the alert πŸ”—

For those with Enterprise Splunk On-Call features, you can include the Grafana image of the alert in the notification.

  1. When configuring the notification channel in Grafana, select Include image.

    include grafana image of alert in victorops
  2. In Splunk On-Call, go to Settings then Alert Rules Engine and add the following Rules Engine rule to surface the image_url as an annotation to the incident. Ensure that the image is hosted in a publicly accessible location so that Splunk On-Call can display it. For further information, see Use images in notifications in Grafana documentation.

Your resulting Splunk On-Call incident now includes the image as an annotation:

grafana example image annotation successful test - save notification in grafana

This page was last updated on Aug 05, 2024.