Integrating Temperstack as the incident management tool
Last updated
Last updated
To begin receiving notifications and responding to incidents, you'll need to configure Slack integration for your application service. Follow these steps:
Navigate to Temperstack Notification -> Application Service
Click on "Add Slack"
Upon clicking "Add Slack," you will be redirected to your Slack account. Here, you'll need to:
Select the appropriate workspace
Choose the desired channel
Ensure that you have already created the Slack channel you wish to use for notifications in application services within your Slack workspace.
In the channel selection field, enter the exact name of the Slack channel you created for the specific application service.
By completing these steps, you'll successfully link your Slack channel to the desired application service in Temperstack, enabling you to receive incident notifications and collaborate with your team efficiently.
Install the Temperstack App in Microsoft Teams
You can find the Temperstack App in the Microsoft Teams App Store.
Select the Microsoft Teams Channel to Install the App
Click on the Temperstack app in the Microsoft Teams App Store.
Select Add to a Team.
Choose the respective Team Channel where you want to receive Temperstack notifications.
Authorize Temperstack to Send Notifications to Microsoft Teams
On the welcome message by the Temperstack Bot in the integrated Team Channel, click Authorize Temperstack.
You will be redirected to Temperstack. Login and click Authorize.
This action will link your Microsoft Teams account with Temperstack.
Configure Notifications in Temperstack
Navigate to Temperstack Notification > Temperstack Services.
Edit the desired service.
Select the Team name where you want notifications to be sent.
Save the changes.
The Google Single Sign-On (SSO) setting in Temperstack provides administrators with the ability to control and secure user access by restricting which email domains can use Google SSO for logging in. This feature ensures that only users from specific, authorized domains are allowed to access Temperstack through Google SSO, thereby enhancing security and control over user access.
To set up Google Single Sign-On (SSO) in Temperstack and apply email domain restrictions, follow these steps:
Log in to the Dashboard
Navigate to Admin
Within the Admin section, select Manage Organization.
Scroll to Login Email Domain Restriction:
Enter Allowed Email Domains: In the provided field, enter the email domain(s) you want to allow for Google SSO login. Separate multiple domains with commas (e.g., yourcompany.com, partners.com).
Enable Domain Restriction: Check the option Only Allow SSO Login to enforce that only users from the specified email domains can log in using Google SSO.
Existing Users: Users from other email domains who are already part of Temperstack will not face any new restrictions. They can continue to log in using their existing methods.
Default Setting: If no email domains are entered, Google SSO will be open to all email domains by default.
Navigate to Admin -> Manage Organization -> User Management.
To invite users, fill in the mandatory details, including:
Name
Email ID
Role
Country code
Once the user accepts the invite, they will appear in the list below.
In the user list, you can:
Change the user’s role
Delete the user
Navigate to Admin -> Manage Organization -> Team Management.
Create a team by entering a name and clicking the creation button.
Once created, you can:
Add team members.
Map services to the team.
Delete the team if it is no longer needed, which helps in organizing and monitoring your organization effectively.
After creating a team, you can edit it at any time to:
Add more members.
Map additional services as needed.
To perform an organizational scan in TemperStack:
Navigate to Admin and select Manage Organization.
Within Manage Organization, locate and select Organization Scan.
In TemperStack, we provide a wide range of integrations with various AWS services such as EC2, SQS, RDS, ElastiCache, Lambda, and more.
When conducting an organizational scan, you can customize the scan according to your requirements by enabling or disabling specific integrations.
For example, if you wish to scan only AWS SQS resources, access "Manage Organization" in "Admin" and disable all other services except SQS.
This approach ensures that the scan focuses solely on fetching and displaying information pertaining to SQS resources.
Navigate to Admin -> Profile.
Click on the "Edit" icon next to your name to modify it, then click "Update" to save the changes.
Update your phone number by entering the new number in the designated field, then click "Update" to save.
To change your password, click on the "Change Password" option, enter your current password followed by the new password, then click "Update Password" to confirm the change.
For enhanced security, you can enable Two-Factor Authentication (2FA) by using the toggle button provided below. This feature adds an extra layer of protection to your account.
After inviting a new user, an invitation email is sent to the user's provided official email address.
The user receives the invitation email and accepts it.
Upon acceptance, the user is successfully added to the team.
Only Admins can send invites to new users.
To test, ensure you provide the channel name and keep slack checked for the application service where you intend to use the Slack channel.