Lightstep Incident Response August 31, 2021 release notes

The Lightstep Incident Response application provides reliable notifications, on-call scheduling, automatic escalations, and other functionalities.

Incident Response highlights for this release

Access Support

To find solutions to common problems, or to get help from a support agent, see Access Support.

New in this release

Sign-on, authentication, and passwords
Learn about configuring SSO, changing your password, and signing in or out. All your security settings are in one place with more on the way.
  • Set up multi-factor authentication
  • Configure single sign-on (SSO)
Get Started
Understand how you can create an Incident Response account and what are the different sections on the interface.
  • Set up account
  • On-boarding
  • Guided setup
  • UI interfaces
Command Line Interface (CLI)
Build code as configuration using a Command Line Interface that is both powerful and extensible. Manage most of incident response right from your terminal.
  • Install CLI
  • Configure and manage CLI profiles
  • View commands, command options, and examples
  • Generate logging output
Manage your profile to view your contact, team, and other information and to fine-tune your preferences.
  • Profile photo, basic info, contacts
  • Notification preferences
  • On-call schedules
  • Set up time zone
  • Change profile password
Find out about all the people you have added to your organization.
  • Invite users
  • Add user to on-call
  • Unlock user account
  • Activate or deactivate user account
  • Remove user
Learn how to build teams that can effectively monitor and understand the systems for which they are responsible. Create a relationship with services, build on-call schedules, and create escalation policies that automate response.
  • Set up team
    • Add users
    • Add schedules
    • Add escalation policies
    • Add services
    • Add integration to services
  • Invite users
  • Remove team member
  • Create a team from existing team
  • Delete team
On-call schedules and escalations
Find out who is on call at a given time. Use the on-call schedule to manage shifts, create time offs, and coverage for any gaps. Use escalation policies so you know that someone is always going to respond.
  • Add, edit, or delete a shift
  • Rotate members in a shift
  • Create, edit, or delete time off
  • Add coveragern
  • Add shift coverage
  • Edit or delete coverage
  • Create 24/7 coverage
  • Save schedule as template
  • Add, edit, or delete an escalation policy
  • Save an escalation policy as a template
Define a service by combining technologies to deliver customer-facing or business capabilities. Add one or multiple tool integrations to each technical service to receive events from those tools.
  • Create, edit, or delete service
  • Add integrations to service
Find out how easy it is to integrate Incident Response with the tools your teams use to monitor systems, collaborate, and track progress. Most modern tools are a simple one-click or two-click integration.
  • Edit integration
  • Disable integration
  • Delete installed integration
  • Specific integrations:
    • Amazon CloudWatch
    • Azure Monitor
    • Datadog
    • Dynatrace
    • Email
    • Generic REST API
    • Google Monitor
    • Grafana
    • Lightstep Observability
    • Nagios
    • New Relic
    • Splunk
    • Zabbix
    • Slack
    • Zoom
Incident Response homepage
Home page gives you everything you need to manage your day. You can see:
  • Your name and the team for which you are currently on-call. Details such as whether you are primary or secondary for your on-call shift, anytime off, or who takes the next shift.
  • High-level counts on your alerts, incidents, impacted services, P1 alerts, and incidents and upcoming shifts.
  • Your top four active alerts.
  • Your top four active incidents.
  • Your team's impacted services.
  • Your teams.
  • All active P1 incidents.
From creation to resolution, Incident Response enables you to manage your alerts through the entire alert life cycle.
  • View imported alerts from third-party integrations.
  • Create rules to automatically triage alerts according to selected criteria.
  • Add attachments and collaborate with responders using Slack and Zoom applications.
  • Promote alerts to incidents.
Automatic Alert Grouping
Alerts are automatically grouped during import. Grouping lets you focus on the primary alerts in your queue.
If an alert comes in against the same service as an existing open alert or the system detects a pattern between alerts that come in against a service & metric name:
  • If more than 10 minutes go by between grouped alerts, a group is created.
  • If more than 30 minutes, a new group is created for any new alerts.
Contains response rules that are conditional triggers that execute response actions automatically, based on the contents of the alert.
Plan ahead of service disruptions. Distractions are minimized and teams stay focused on remediation.
  • View incidents in your tenant.
  • Move states, resolve, and close incidents.
  • Add attachments and collaborate with responders and stakeholders using Slack and Zoom applications.
  • Manually create incidents.
With our mobile app, you can respond from anywhere. Everything you do on your mobile is just like doing it from your desktop.
  • Configure and log in
  • Mobile interface
  • Home Page
  • Profile management
  • Users management
  • Alerts management
  • Incidents management
  • Schedules management
  • Teams management
  • Services management
  • Notifications management

Browser requirement

The Incident Response web application requires a web browser that has JavaScript enabled.