Skip to content

Commit 0707cae

Browse files
committed
Merge branch 'main' of github.com:SumoLogic/sumologic-documentation into det-1326-correct-custom-rule-article
2 parents 2c2ddec + 622f5e5 commit 0707cae

File tree

32 files changed

+159
-683
lines changed

32 files changed

+159
-683
lines changed

blog-service/2021/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -649,7 +649,7 @@ Update - We have updated our [Enterprise Audit - Security Management App](/docs
649649
---
650650
## March 4, 2021 (Observability)
651651

652-
Update - We're delighted to announce several enhancements to [Root Cause Explorer](/docs/observability/root-cause-explorer "Root Cause Explorer"). Root Cause Explorer now supports two additional AWS namespaces, as well as Events of Interest detection on Kubernetes and Trace metrics. Cause-impact analysis is now informed by Sumo Logic Tracing's Service Map, AWS X-ray, Kubernetes entities, and AWS inventory relationships. You'll also notice new filters and search builders at the top of the page to correlate Events of Interests at the service, orchestrator, AWS infrastructure, and host levels to speed up the identification of  root causes. You can use the Infrastructure tab for an Event of Interest to pivot to dashboards, logs, metrics and, trace searches to take the next steps in root cause analysis. 
652+
Update - We're delighted to announce several enhancements to Root Cause Explorer. Root Cause Explorer now supports two additional AWS namespaces, as well as Events of Interest detection on Kubernetes and Trace metrics. Cause-impact analysis is now informed by Sumo Logic Tracing's Service Map, AWS X-ray, Kubernetes entities, and AWS inventory relationships. You'll also notice new filters and search builders at the top of the page to correlate Events of Interests at the service, orchestrator, AWS infrastructure, and host levels to speed up the identification of  root causes. You can use the Infrastructure tab for an Event of Interest to pivot to dashboards, logs, metrics and, trace searches to take the next steps in root cause analysis. 
653653

654654
---
655655
## March 1, 2021 (Metrics)

blog-service/2024/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ We're excited to announce the general availability of AI-driven alerts for metri
294294

295295
#### Deprecation Notice - Root Cause Explorer
296296

297-
As part of our ongoing evaluation of the Sumo Logic service, our product team is deprecating [Root Cause Explorer](/docs/observability/root-cause-explorer), and it will no longer be available as of 30 April 2025.
297+
As part of our ongoing evaluation of the Sumo Logic service, our product team is deprecating Root Cause Explorer, and it will no longer be available as of 3 June 2025.
298298

299299
Learn more [here](/docs/observability/root-cause-explorer-deprecation).
300300

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: End-of-Life Notice - Root Cause Explorer (Observability)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- sumo-collection
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
Previously, we announced that Root Cause Explorer [was deprecated](/release-notes-service/2024/12/31/#november-01-2024-observability). As of 3 June 2025, Root Cause Explorer has reached its end of life and is no longer available.
13+
14+
Learn more [here](/docs/observability/root-cause-explorer-deprecation/).

cid-redirects.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1642,7 +1642,7 @@
16421642
"/cid/6029": "/docs/integrations/saas-cloud/kaltura",
16431643
"/cid/6030": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source",
16441644
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
1645-
"/cid/10113": "/docs/observability/root-cause-explorer",
1645+
"/cid/10113": "/docs/observability/root-cause-explorer-deprecation",
16461646
"/cid/10116": "/docs/manage/fields",
16471647
"/cid/10117": "/docs/metrics/metrics-transformation-rules",
16481648
"/cid/10118": "/docs/metrics/metric-rules-editor",
@@ -3535,7 +3535,7 @@
35353535
"/Observability_Solution/Reliability_Management/Creating_SLOs_and_Monitors": "/docs/observability/reliability-management-slo",
35363536
"/Observability_Solution/Reliability_Management/SLO_Dashboards": "/docs/observability/reliability-management-slo",
35373537
"/docs/observability/reliability-management-slo/use-cases": "/docs/observability/reliability-management-slo",
3538-
"/Observability_Solution/Root_Cause_Explorer": "/docs/observability/root-cause-explorer",
3538+
"/Observability_Solution/Root_Cause_Explorer": "/docs/observability/root-cause-explorer-deprecation",
35393539
"/Other_Solutions": "/docs/observability",
35403540
"/Other_Solutions/Software_Development_Optimization_Solution/01_About_the_Software_Development_Optimization_Solution": "/docs/observability/sdo/about-sdo",
35413541
"/Other_Solutions/Software_Development_Optimization_Solution/02_Supported_Tools_and_Schema": "/docs/observability/sdo/supported-tools-schema",
@@ -3920,8 +3920,8 @@
39203920
"/Metrics/Metrics-Sources/03Graphite-Source-for-Metrics": "/docs/send-data/installed-collectors/sources/host-metrics-source",
39213921
"/Metrics/Working-with-Metrics/03-Create-a-Metrics-Visualization": "/docs/metrics/metrics-queries/metrics-explorer",
39223922
"/Observability_Solution/AWS_Observability_Solution/01_Deploy_and_Use_AWS_Observability/11Configure_Alerts": "/docs/observability/aws/deploy-use-aws-observability",
3923-
"/Observability_Solution/AWS_Observability_Solution/01_Deploy_and_Use_AWS_Observability/12Root_Cause_Explorer": "/docs/observability/root-cause-explorer",
3924-
"/Observability_Solution/AWS_Observability_Solution/01_Deploy_and_Use_AWS_Observability/Root_Cause_Explorer": "/docs/observability/root-cause-explorer",
3923+
"/Observability_Solution/AWS_Observability_Solution/01_Deploy_and_Use_AWS_Observability/12Root_Cause_Explorer": "/docs/observability/root-cause-explorer-deprecation",
3924+
"/Observability_Solution/AWS_Observability_Solution/01_Deploy_and_Use_AWS_Observability/Root_Cause_Explorer": "/docs/observability/root-cause-explorer-deprecation",
39253925
"/Observability_Solution/Kubernetes_Solution/01Set_up_collection_for_Kubernetes": "/docs/observability/kubernetes/collection-setup",
39263926
"/Observability_Solution/Kubernetes_Solution/Global_Intelligence_for_Kubernetes_DevOps_App": "/docs/integrations/global-intelligence/kubernetes-devops",
39273927
"/Observability_Solution/Kubernetes_Solution/Navigate_your_Kubernetes_environment": "/docs/observability/kubernetes",
@@ -4140,7 +4140,7 @@
41404140
"/Solutions/AWS_Observability_Solution/05_Monitor_Control_Tower-Managed_Accounts": "/docs/observability/aws/other-configurations-tools/integrate-control-tower-accounts",
41414141
"/Solutions/AWS_Observability_Solution/AWS_Observability_Application_Load_Balancer": "/docs/observability/aws/integrations/aws-application-load-balancer",
41424142
"/Solutions/AWS_Observability_Solution/View_AWS_Observability_Solution_Dashboards": "/docs/observability/aws/deploy-use-aws-observability/view-dashboards",
4143-
"/Solutions/AWS_Observability_Solution/Root_Cause_Explorer": "/docs/observability/root-cause-explorer",
4143+
"/Solutions/AWS_Observability_Solution/Root_Cause_Explorer": "/docs/observability/root-cause-explorer-deprecation",
41444144
"/Solutions/AWS_Observability_Solution/03_Set_Up_the_AWS_Observability_Solution": "/docs/observability/aws/about",
41454145
"/Solutions/AWS_Observability_Solution/About_the_AWS_Observability_Solution": "/docs/observability/aws/about",
41464146
"/Solutions/AWS_Observability_Solution/Set_Up_the_AWS_Observability_Solution": "/docs/observability/aws",

docs/alerts/monitors/alert-response-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Anomaly cards only work if we are able to infer an entity from the alerting quer
107107

108108
## Where are Anomaly cards for metrics-based alerts?
109109

110-
Alert response anomaly detection only detects anomalies for metrics data coming from Kubernetes or specific sources within AWS ([learn more](../../observability/root-cause-explorer.md)). If you are setting up alerts on metrics that don’t belong to either one of these categories, anomalies will not be detected.
110+
Alert response anomaly detection only detects anomalies for metrics data coming from Kubernetes or specific sources within AWS. If you are setting up alerts on metrics that don’t belong to either one of these categories, anomalies will not be detected.
111111

112112
Use the [Sumo Logic Kubernetes collection](https://github.com/SumoLogic/sumologic-kubernetes-collection#sumologic-kubernetes-collection) or the [Sumo Logic AWS observability collection](/docs/observability/aws) for this to work properly. 
113113

docs/alerts/monitors/alert-response.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,14 +202,14 @@ The **Log Fluctuations** context card, available for logs monitors, detects diff
202202

203203
### Anomalies
204204

205-
This card detects time series anomalies for entities related to the alert. These insights are powered by the [Root Cause Explorer](../../observability/root-cause-explorer.md).
205+
This card detects time series anomalies for entities related to the alert.
206206

207207
Anomalies are grouped into [golden signals](https://sre.google/sre-book/monitoring-distributed-systems/). Anomalies are also presented on a timeline; the length of the anomaly represents its duration. <br/> ![anomalies .png](/img/alerts/monitors/anomalies.png)
208208

209209
* **A**. Name and description of the context card.
210210
* **B**. Count of anomalies belonging to each golden signal type.
211211
* **C**. A timeline view of anomalies with their start time and duration, the domain (e.g. AWS, Kubernetes), and the entity on which it was detected. Anomalies may be grouped based on connections between entities and similarity of metrics. For example, anomalies on EC2 instances that are members of an AutoScaling group may be grouped together. The count shown in each anomaly refers to the number of grouped anomalies.
212-
* **D**. A link to view the anomalies in the **Root Cause Explorer**.
212+
* **D**. A link to view the anomalies.
213213

214214
:::note
215215
Only anomalies with a start time around 30 minutes before or after the alert was created show up in the card.

docs/apm/index.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,3 @@ Monitor user activity, span analytics, service maps, and transaction traces betw
5050

5151
<br/>
5252

53-
:::tip
54-
Use our [Root Cause Explorer](/docs/observability/root-cause-explorer) to investigate usage and issues.
55-
:::

docs/contributing/style-guide.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -439,6 +439,39 @@ _sourceCategory=reinvent/travel/checkout
439439
440440
For a full list of options, see [Docusaurus Code Blocks](https://docusaurus.io/docs/markdown-features/code-blocks).
441441
442+
### Import GitHub repo file
443+
444+
To embed a code sample from a file in a GitHub repository, use `reference` in the code block with a link to the file. The code sample is embedded using the language with a link to the original file.
445+
446+
This code references a json script file:
447+
448+
<Tabs
449+
className="unique-tabs"
450+
defaultValue="Markdown"
451+
values={[
452+
{label: 'Markdown', value: 'Markdown'},
453+
{label: 'Result', value: 'Result'},
454+
]}>
455+
456+
<TabItem value="Markdown">
457+
458+
<img src={useBaseUrl('img/contributing/json-ref-codeblock.png')} alt="JSON code snippet from GitHub" style={{border: '1px solid gray'}} width="700"/>
459+
460+
</TabItem>
461+
<TabItem value="Result">
462+
463+
```json reference
464+
https://github.com/SumoLogic/sumologic-documentation/blob/main/static/files/c2c/1password/example.json
465+
```
466+
467+
</TabItem>
468+
</Tabs>
469+
470+
Optionally, you can:
471+
* Reference a specific range of code lines by appending `#L` with the line number or numbers at the end of the URL. For example, `https://github.com/SumoLogic/sumologic-documentation/blob/main/static/files/c2c/1password/example.json#L4-L5`.
472+
* Add a title to the code block, such as `json reference title="Hello"`.
473+
474+
You'll see this used in our [C2C source docs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework).
442475
443476
## Collapsible text blocks
444477

docs/cse/administration/inventory-sources-and-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Some of the inventory sources are strictly for collecting inventory data—such
3434
Some inventory sources provide user inventory information, some provide computer inventory information, and some provide both. The table below lists currently available inventory sources.
3535

3636
:::note
37-
The AWS Inventory Source collects the inventory of AWS resources in your AWS account, but is usable only by the Root Cause Explorer. See [AWS Inventory Source](/docs/observability/root-cause-explorer/#aws-inventory-source).
37+
The AWS Inventory Source collects the inventory of AWS resources in your AWS account.
3838
:::
3939

4040
| Inventory source | Type of source | Inventory data collected |

docs/cse/records-signals-entities-insights/entity-criticality.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ If the formula you specify results in a number that isn’t whole, the value is
1919

2020
## About criticality and insight generation
2121

22-
The maximum severity that can be assigned to a Cloud SIEM rule is 10, so normally, signal severity is also limited to 1. Note however that Cloud SIEM doesn’t impose a maximum value on the severity that results from a criticality, although the minimum value will always be 0. 
22+
The maximum severity that can be assigned to a Cloud SIEM rule is 10, so normally, signal severity is also limited to 10. Note however that Cloud SIEM doesn’t impose a maximum value on the severity that results from a criticality, although the minimum value will always be 0. 
2323

2424
As described in the [insight generation](/docs/cse/get-started-with-cloud-siem/insight-generation-process/) topic, an insight is generated on an entity based on the cumulative severity of the unique signals that have fired on it over the previous two weeks, unless a different period is configured. The cumulative
2525
severity is referred to as the entity’s activity score. Keep in mind that higher signal severities will increase an entity’s activity score and result in insight’s being generated sooner. 

0 commit comments

Comments
 (0)