Skip to content

Commit 4ec47fa

Browse files
committed
Merge branch 'main' into docs-684-add-new-tab-preference
2 parents 59e2781 + 6a3883b commit 4ec47fa

File tree

107 files changed

+1333
-472
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+1333
-472
lines changed

.clabot

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,9 @@
177177
"Apoorvkudesia-sumologic",
178178
"akesle",
179179
"ankitgoelcmu",
180-
"Deklin"
180+
"Deklin",
181+
"justrelax19",
182+
"dlindelof-sumologic"
181183
],
182184
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
183185
"label": "cla-signed",

blog-cse/2025-03-10-application.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: March 10, 2025 - Application Update
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- custom insights
6+
- insights
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
### Strict signal configuration
15+
16+
We're happy to announce that now when you create custom insights, you can select an option to generate insights only on those signals defined in your custom insight. Any additional signals related to the applicable entity are excluded. This allows you to generate insights for an immediate and targeted response.
17+
18+
[Learn more](/docs/cse/records-signals-entities-insights/configure-custom-insight/#for-only-signals-defined-in-the-custom-insight).
19+
20+
<img src={useBaseUrl('img/cse/strict-signal-configuration-checkbox.png')} alt="Strict Signal Configuration checkbox" style={{border: '1px solid gray'}} width="400"/>

blog-cse/2025-03-13-content.md

Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,87 @@
1+
---
2+
title: March 13, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
16+
This release includes:
17+
- New detection rules for Azure DevOps to identify suspicious or sensitive activity in CI/CD pipelines
18+
- New support for Barracuda WAF and CloudGen Firewall
19+
- Support for CyberArk Audit events
20+
- Updates to 1Password mappers to realign field mappings to reflect proper directionality
21+
- Fix for normalizedActions in AWS CloudTrail Policy Change mapper
22+
- Additions to CrowdStrike Audit and UserActivity log mappers to map additional fields and add alternate values
23+
- Support for additional events from Kubernetes and Linux OS logs
24+
25+
## Rules
26+
- [New] CHAIN-S00022 Azure DevOps - Agent Pool Created and Deleted within a Short Period
27+
- This detection monitors for the creation and deletion of Agent Pools within 5 days by the same user, with the intent of finding Agent Pools active for short durations.
28+
- [New] MATCH-S00997 Azure DevOps - Browser Observed in Personal Access Token (PAT) Use
29+
- This detection monitors for the use of a PAT for authentication from a User Agent String indicating a web browser.
30+
- [New] MATCH-S00995 Azure DevOps - Change Made to Administrator Group
31+
- This detection monitors for additions to the following groups: Project Administrators, Project Collection Administrators, Project Collection Service Accounts, Build Administrators, Project Collection Build Administrators
32+
- [New] FIRST-S00098 Azure DevOps - First Seen Pull Request Policy Bypassed
33+
- This detection monitors for when a user performs a pull request bypass for the first time.
34+
- [New] FIRST-S00099 Azure DevOps - First Seen User Creating Agent Pool
35+
- This detection monitors for new users creating an agent pool. This user has not been observed creating agent pools during the baseline period and may be a new admin or involved in suspicious account activity.
36+
- [New] FIRST-S00092 Azure DevOps - First Seen User Creating Release Pipeline
37+
- This detection monitors for users creating a release pipeline for the first time after the baseline period (by default, 90 days).
38+
- [New] FIRST-S00097 Azure DevOps - First Seen User Modifying Build Variables
39+
- This detection monitors for a user modifying a variable group for the first time.
40+
- [New] FIRST-S00096 Azure DevOps - First Seen User Modifying Release Pipeline
41+
- This detection monitors for users modifying a release pipeline for the first time after the baseline period (by default, 90 days).
42+
- [New] MATCH-S00998 Azure DevOps - Known Malicious Tooling Detected ADOKit
43+
- This is a simple detection matching on “ADOKit” at the start of the HTTP User Agent String (UAS). This detection effectively catches basic ADOKit use. It is brittle to attackers changing the User Agent String to another more innocuous browser to mask the traffic.
44+
- [New] MATCH-S00994 Azure DevOps - Member Added to Sensitive Group
45+
- This detection monitors for changes to the following groups: Project Administrators, Project Collection Administrators, Project Collection Service Accounts, Build Administrator
46+
- [New] FIRST-S00095 Azure DevOps - New Agent OS Added to Agent Pool
47+
- This detection monitors for the addition of an agent to an agent pool when the OS of the agent has not been observed in this pool during the baseline period.
48+
- [New] FIRST-S00094 Azure DevOps - New Extension Installed
49+
- This detection monitors for new extensions installed organization-wide after a 30-day baseline, based on the user installing the new extension.
50+
- [New] OUTLIER-S00030 Azure DevOps - Outlier in Pools Deleted Rapidly
51+
- This detection identifies statistical outliers in user behavior for the number of pools deleted in an hourly window.
52+
- [New] MATCH-S00996 Azure DevOps - Personal Access Token (PAT) Misuse Observed
53+
- This detection monitors for use of a Personal Access Token in conjunction with categories of action that aren’t normally associated with PAT authentication.
54+
- [New] CHAIN-S00021 Azure DevOps - Pipeline Created and Deleted within a Short Period
55+
- This detection monitors for the creation and deletion of the same pipeline within a short period (by default, a day).
56+
- [New] MATCH-S00993 Azure DevOps - Pipeline Retention Settings Reduced
57+
- This detection monitors for any reduction in the pipeline retention settings.
58+
59+
60+
## Log Mappers
61+
- [New] Barracuda Authentication
62+
- [New] Barracuda Catch All
63+
- [New] Barracuda CloudGen Auth Service dcclient and events
64+
- [New] Barracuda CloudGen Firewall Activity
65+
- [New] Barracuda CloudGen Settings DNS
66+
- [New] Barracuda Network Firewall Event|Web Firewall Event|Access Firewall Event
67+
- [New] Barracuda System Event
68+
- [New] CyberArk Audit Authentication
69+
- [New] CyberArk Audit Catch All
70+
- [Updated] 1Password Item Audit Actions
71+
- [Updated] 1Password Item Usage Actions
72+
- [Updated] 1Password Item Usage C2C
73+
- [Updated] 1Password Signin C2C
74+
- [Updated] CloudTrail - iam.amazonaws.com - Policy Change
75+
- [Updated] CrowdStrike Audit Logs
76+
- [Updated] CrowdStrike Falcon Host API DetectionSummaryEvent
77+
- [Updated] CrowdStrike Falcon Host API DetectionSummaryEvent (CNC)
78+
- [Updated] CrowdStrike UserActivity Logs
79+
- [Updated] Linux OS Syslog - Process sshd - SSH Auth Failure
80+
- [Updated] Linux OS Syslog - Process sshd - SSH Bind Listening and negotiate event
81+
82+
## Parsers
83+
- [New] /Parsers/System/Barracuda/Barracuda CloudGen
84+
- [New] /Parsers/System/Barracuda/Barracuda WAF
85+
- [New] /Parsers/System/Cyber-Ark/CyberArk Audit
86+
- [Updated] /Parsers/System/Kubernetes/Kubernetes
87+
- [Updated] /Parsers/System/Linux/Linux OS Syslog

blog-csoar/2024/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This release introduces new integrations, new playbooks, and several updates.
3535
#### Integrations
3636

3737
* [New] [Google Chat](/docs/platform-services/automation-service/app-central/integrations/google-chat)
38-
* [New] [Malwarebytes Oneview](/docs/platform-services/automation-service/app-central/integrations/malwarebytes-oneview)
38+
* [New] [Malwarebytes ThreatDown OneView](/docs/platform-services/automation-service/app-central/integrations/threatdown-oneview)
3939
* [New] [Silent Push](/docs/platform-services/automation-service/app-central/integrations/silent-push)
4040
* [New] [Sumo Logic Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools)
4141
* [New] [VirusTotal V3](/docs/platform-services/automation-service/app-central/integrations/virustotal-v3)

blog-service/2025-03-07-apps.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Netskope WebTx (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- netskope-webtx
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Netskope WebTx app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Netskope WebTx source to collect the web transaction logs from the Netskope WebTx platform. It provides security and IT teams the visibility and insights into web transactions, helping organizations monitor, analyze, and secure their web traffic. [Learn more](/docs/integrations/saas-cloud/netskope-webtx/).
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Sumo Collection Source (Collection)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- sumo-collection-source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to announce the release of our new cloud-to-cloud source for Sumo Collection. This source aims to collect the list of collectors and their sources using Sumo Logic Collector API and Source API and send them to Sumo Logic for streamlined analysis. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/sumo-collection-source).

blog-service/2025-03-07-manage.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: Content Management for Organizations - Beta (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- manage
6+
- organizations
7+
- mssps
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
We are excited to announce a new **Content Management** tab that allows MSSP administrators the ability to conveniently push updates to multiple child organizations at once. [Learn more](/docs/manage/manage-subscription/create-and-manage-orgs/manage-orgs-for-mssps/).
16+
17+
:::note
18+
This feature is in Beta. To participate, contact your Sumo Logic account executive or our Support Team.
19+
:::
20+
21+
<img src={useBaseUrl('img/manage/subscriptions/mssp-orgs-sync-selected-items.png')} alt="Content Management tab" style={{border: '1px solid gray'}} width="800"/>

cid-redirects.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,7 @@
8787
"/Start_Here/Customize_Your_Sumo_Logic_Experience": "/docs/get-started",
8888
"/Start_Here/Getting_Started": "/docs/get-started",
8989
"/Start_Here/Getting_Started/Analyst_or_Administrator": "/docs/get-started/onboarding-checklists",
90+
"/Start_Here/Quick_Start_Tutorial": "/docs/get-started/quickstart",
9091
"/Start-Here/09Customize-Your-Sumo-Logic-Experience/Preferences-Page": "/docs/get-started/account-settings-preferences",
9192
"/Start-Here/02Getting-Started/Glossary": "/docs/contributing/glossary",
9293
"/docs/contributing/create-document": "/docs/contributing/create-edit-doc",
@@ -741,6 +742,7 @@
741742
"/07Sumo-Logic-Apps/01Amazon_and_AWS/AWS_Network_Firewall/Install_the_AWS_Network_Firewall_App_and_View_the_Dashboards": "/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-network-firewall",
742743
"/07Sumo-Logic-Apps/01Amazon_and_AWS/AWS_Security_Hub": "/docs/integrations/amazon-aws/security-hub",
743744
"/07Sumo-Logic-Apps/01Amazon_and_AWS/AWS_Security_Hub/1-Ingest-findings-into-AWS-Security_Hub": "/docs/integrations/amazon-aws/security-hub",
745+
"/07Sumo-Logic-Apps/01Amazon_and_AWS/AWS_Security_Hub/2-Collect-findings-for-the-AWS-Security-Hub-App": "/docs/integrations/amazon-aws/security-hub",
744746
"/07Sumo-Logic-Apps/01Amazon_and_AWS/AWS_Security_Hub/2-Collect-Findings-for-the-AWS-Security-Hub-App": "/docs/integrations/amazon-aws/security-hub",
745747
"/07Sumo-Logic-Apps/01Amazon_and_AWS/AWS_Security_Hub/3-Install_the_AWS_Security_Hub_App_and_view_the_Dashboards": "/docs/integrations/amazon-aws/security-hub",
746748
"/07Sumo-Logic-Apps/01Amazon_and_AWS/AWS_WAF": "/docs/integrations/amazon-aws/waf",
@@ -1667,6 +1669,7 @@
16671669
"/cid/10147": "/docs/cse/integrations",
16681670
"/cid/10148": "/docs/cse/rules",
16691671
"/cid/101481": "/docs/cse/rules/about-cse-rules",
1672+
"/cid/101482": "/docs/cse/rules/rules-status",
16701673
"/cid/10149": "/docs/cse/rules/write-match-rule",
16711674
"/cid/1015": "/docs/send-data/reference-information/use-wildcards-paths",
16721675
"/cid/10150": "/docs/cse/rules/write-threshold-rule",
@@ -1870,6 +1873,7 @@
18701873
"/cid/1962": "/docs/integrations/saas-cloud/cloudflare",
18711874
"/cid/1995": "/docs/integrations/saas-cloud/code42-incydr",
18721875
"/cid/1971": "/docs/integrations/saas-cloud/trust-login",
1876+
"/cid/1910": "/docs/integrations/saas-cloud/netskope-webtx",
18731877
"/cid/1963": "/docs/integrations/sumo-apps/enterprise-audit",
18741878
"/cid/1964": "/docs/integrations/security-threat-detection/f5-big-ip-ltm",
18751879
"/cid/1965": "/docs/integrations/security-threat-detection/netskope",
@@ -1878,6 +1882,7 @@
18781882
"/cid/1966": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source",
18791883
"/cid/1987": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source",
18801884
"/cid/1996": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/sysdig-secure-source",
1885+
"/cid/1258": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/sumo-collection-source",
18811886
"/cid/1257": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source",
18821887
"/cid/1967": "/docs/integrations/web-servers/iis-10",
18831888
"/cid/1968": "/docs/integrations/partner-ecosystem-apps/",
@@ -2994,6 +2999,7 @@
29942999
"/Cloud_SIEM_Enterprise/Records%2C_Signals%2C_Entities%2C_and_Insights": "/docs/cse/records-signals-entities-insights",
29953000
"/Cloud_SIEM_Enterprise/Records%2C_Signals%2C_Entities%2C_and_Insights/00Insight_Generation_Process": "/docs/cse/get-started-with-cloud-siem/insight-generation-process",
29963001
"/Cloud_SIEM_Enterprise/Records%2C_Signals%2C_Entities%2C_and_Insights/05Set_Insight_Generation_Window_and_Threshold": "/docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold",
3002+
"/docs/cse/records-signals-entities-insights/signal-index-migration-faq": "/docs/cse/records-signals-entities-insights/search-cse-records-in-sumo",
29973003
"/Cloud_SIEM_Enterprise/Records%2C_Signals%2C_Entities%2C_and_Insights/07Entity_Criticality": "/docs/cse/records-signals-entities-insights/entity-criticality",
29983004
"/Cloud_SIEM_Enterprise/Records%2C_Signals%2C_Entities%2C_and_Insights/11Create_a_Custom_Entity_Type": "/docs/cse/records-signals-entities-insights/create-custom-entity-type",
29993005
"/Cloud_SIEM_Enterprise/Records%2C_Signals%2C_Entities%2C_and_Insights/13Using_Tags_with_Insights%2C_Signals%2C_Entities%2C_and_Rules": "/docs/cse/records-signals-entities-insights/tags-insights-signals-entities-rules",
@@ -3479,6 +3485,7 @@
34793485
"/Observability_Solution/Kubernetes_Solution/07Global_Intelligence_for_Kubernetes_DevOps_App": "/docs/integrations/global-intelligence/kubernetes-devops",
34803486
"/Observability_Solution/Kubernetes_Solution/06Kubernetes_Alerts": "/docs/observability/kubernetes/alerts",
34813487
"/Observability_Solution/Kubernetes_Solution/08Next_Steps": "/docs/observability/kubernetes",
3488+
"/Observability_Solution/Kubernetes_Solution/09Create_a_New_Dashboard_(New)": "/docs/observability/kubernetes",
34823489
"/Observability_Solution/Kubernetes_Solution/18Install_the_Kubernetes_Alerts,_App_and_view_the_Dashboards": "/docs/observability/kubernetes/apps",
34833490
"/Observability_Solution/Kubernetes_Solution/17Next_Steps": "/docs/observability/kubernetes",
34843491
"/Observability_Solution/Kubernetes_Solution/zDrill_down_to_discover_root_causes": "/docs/observability/kubernetes",
@@ -3539,6 +3546,7 @@
35393546
"/Send_Data/Sources/Source_timestamp_and_time_zone_options/Timestamp_conventions": "/docs/send-data/reference-information/time-reference",
35403547
"/Send_Data/Sources/AWS_S3_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
35413548
"/Send_Data/01_Design_Your_Deployment/Best_Practices:_Good_Source_Category,_Bad_Source_Category": "/docs/send-data/best-practices",
3549+
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon_Web_Services": "/docs/send-data/hosted-collectors/amazon-aws",
35423550
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon_Web_Services/AWS_S3_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
35433551
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon_Web_Services/Amazon_CloudWatch_Source_for_Metrics": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs",
35443552
"/Send-Data/Sources": "/docs/send-data",
@@ -3785,6 +3793,7 @@
37853793
"/Apps/Installing_Apps_from_the_Library": "/docs/get-started/apps-integrations",
37863794
"/Apps/Linux_App/Linux_App_Dashboards": "/docs/integrations/hosts-operating-systems/linux",
37873795
"/Apps/Linux_Performance_App/Collect_Logs_for_the_Linux_Performance_App": "/docs/integrations/hosts-operating-systems/linux",
3796+
"/Apps/Preview_Apps": "/docs/integrations",
37883797
"/Apps/Preview_Apps/Cylance": "/docs/integrations/security-threat-detection/cylance",
37893798
"/Apps/Preview_Apps/Cylance_App": "/docs/integrations/security-threat-detection/cylance",
37903799
"/Apps/Preview_Apps/AWS_Lambda/AWS_Lambda_App_Dashboards": "/docs/integrations/amazon-aws/lambda",
@@ -3823,6 +3832,7 @@
38233832
"/Beta/Installation_Tokens": "/docs/manage/security/installation-tokens",
38243833
"/Beta/Metadata_Ingest_Budgets": "/docs/manage/ingestion-volume/ingest-budgets/daily-volume",
38253834
"/Beta/Metrics-Rules": "/docs/metrics/metric-rules-editor",
3835+
"/Beta/Saved_beta_content/Beta---Library/Apps_in_Sumo_Logic/01_Sumo_Logic_Apps": "/docs/integrations",
38263836
"/Beta/SLO_Reliability_Management": "/docs/observability/reliability-management-slo",
38273837
"/Beta/SLO_Reliability_Management/Access_and_Create_SLOs": "/docs/observability/reliability-management-slo",
38283838
"/Beta/Workday/Collect_Logs_for_the_Workday_App": "/docs/integrations/saas-cloud/workday",
@@ -3831,6 +3841,7 @@
38313841
"/Cloud_SIEM_Enterprise/Entities_and_Insights/Insight_Generation_Process": "/docs/cse/records-signals-entities-insights",
38323842
"/Cloud_SIEM_Enterprise/Entities_and_Insights/Global_Intelligence_for_Security_Insights": "/docs/cse/records-signals-entities-insights/global-intelligence-security-insights",
38333843
"/Dashboards-and-Alerts": "/docs/alerts",
3844+
"/Dashboards_and_Alerts": "/docs/alerts",
38343845
"/Dashboards_and_Alerts/Alerts/01_Scheduled_Searches": "/docs/alerts/scheduled-searches/schedule-search",
38353846
"/Dashboards_and_Alerts/Alerts/Create_a_Real_Time_Alert": "/docs/alerts/scheduled-searches/create-real-time-alert",
38363847
"/Dashboards_and_Alerts/Alerts/Save_to_Index": "/docs/alerts/scheduled-searches/save-to-index",
@@ -3847,6 +3858,7 @@
38473858
"/Manage/Connections_and_Integrations/Webhook_Connections/Webhook_Connection_for_Slack": "/docs/alerts/webhook-connections/slack",
38483859
"/Manage/Connections-and-Integrations/Webhook-Connections/Webhook-Connection-for-Slack": "/docs/alerts/webhook-connections/slack",
38493860
"/Manage/Connections-and-Integrations/Webhook-Connections/Webhook-Connection-for-PagerDuty": "/docs/alerts/webhook-connections/pagerduty",
3861+
"/Manage/Kubernetes_Solution": "/docs/observability/kubernetes",
38503862
"/Manage/Logs-to-Metrics": "/docs/metrics/logs-to-metrics",
38513863
"/Metrics/Metric-Queries-and-Alerts/01Metrics_Explorer": "/docs/metrics/metrics-queries/metrics-explorer",
38523864
"/Metrics/Metric-Queries-and-Alerts/Metrics_Monitors_and_Alerts": "/docs/alerts/monitors",

0 commit comments

Comments
 (0)