Lightstep Incident Response August 31, 2021 release notes
The Lightstep Incident Response application provides reliable notifications, on-call scheduling, automatic escalations, and other functionalities.
Incident Response highlights for this release
To find solutions to common problems, or to get help from a support agent, see Access Support.
New in this release
- Sign-on, authentication, and passwords
- Learn about configuring SSO, changing your password, and signing in or out. All your
security settings are in one place with more on the way.
- Set up multi-factor authentication
- Configure single sign-on (SSO)
- Get Started
- Understand how you can create an Incident Response account and what
are the different sections on the interface.
- Set up account
- Guided setup
- UI interfaces
- Command Line Interface (CLI)
- Build code as configuration using a Command Line Interface that is both powerful and
extensible. Manage most of incident response right from your terminal.
- Install CLI
- Configure and manage CLI profiles
- View commands, command options, and examples
- Generate logging output
- Manage your profile to view your contact, team, and other information and to
fine-tune your preferences.
- Profile photo, basic info, contacts
- Notification preferences
- On-call schedules
- Set up time zone
- Change profile password
- Find out about all the people you have added to your organization.
- Invite users
- Add user to on-call
- Unlock user account
- Activate or deactivate user account
- Remove user
- Learn how to build teams that can effectively monitor and understand the systems for
which they are responsible. Create a relationship with services, build on-call
schedules, and create escalation policies that automate response.
- Set up team
- Add users
- Add schedules
- Add escalation policies
- Add services
- Add integration to services
- Invite users
- Remove team member
- Create a team from existing team
- Delete team
- Set up team
- On-call schedules and escalations
- Find out who is on call at a given time. Use the on-call schedule to manage shifts,
create time offs, and coverage for any gaps. Use escalation policies so you know that
someone is always going to respond.
- Add, edit, or delete a shift
- Rotate members in a shift
- Create, edit, or delete time off
- Add coveragern
- Add shift coverage
- Edit or delete coverage
- Create 24/7 coverage
- Save schedule as template
- Add, edit, or delete an escalation policy
- Save an escalation policy as a template
- Define a service by combining technologies to deliver customer-facing or business
capabilities. Add one or multiple tool integrations to each technical service to
receive events from those tools.
- Create, edit, or delete service
- Add integrations to service
- Find out how easy it is to integrate Incident Response with the tools your teams use
to monitor systems, collaborate, and track progress. Most modern tools are a simple
one-click or two-click integration.
- Edit integration
- Disable integration
- Delete installed integration
- Specific integrations:
- Amazon CloudWatch
- Azure Monitor
- Generic REST API
- Google Monitor
- Lightstep Observability
- New Relic
- Incident Response homepage
- Home page gives you everything you need to manage your day. You can see:
- Your name and the team for which you are currently on-call. Details such as whether you are primary or secondary for your on-call shift, anytime off, or who takes the next shift.
- High-level counts on your alerts, incidents, impacted services, P1 alerts, and incidents and upcoming shifts.
- Your top four active alerts.
- Your top four active incidents.
- Your team's impacted services.
- Your teams.
- All active P1 incidents.
- From creation to resolution, Incident Response enables you to manage
your alerts through the entire alert life cycle.
- View imported alerts from third-party integrations.
- Create rules to automatically triage alerts according to selected criteria.
- Add attachments and collaborate with responders using Slack and Zoom applications.
- Promote alerts to incidents.
- Automatic Alert Grouping
- Alerts are automatically grouped during import. Grouping lets you focus on the
primary alerts in your queue.If an alert comes in against the same service as an existing open alert or the system detects a pattern between alerts that come in against a service & metric name:
- If more than 10 minutes go by between grouped alerts, a group is created.
- If more than 30 minutes, a new group is created for any new alerts.
- Contains response rules that are conditional triggers that execute response actions automatically, based on the contents of the alert.
- Plan ahead of service disruptions. Distractions are minimized and teams stay focused
- View incidents in your tenant.
- Move states, resolve, and close incidents.
- Add attachments and collaborate with responders and stakeholders using Slack and Zoom applications.
- Manually create incidents.
- With our mobile app, you can respond from anywhere. Everything you do on your mobile
is just like doing it from your desktop.
- Configure and log in
- Mobile interface
- Home Page
- Profile management
- Users management
- Alerts management
- Incidents management
- Schedules management
- Teams management
- Services management
- Notifications management