Skip to content

Commit 5d2c437

Browse files
authored
Update create-monitor.md
1 parent 477f848 commit 5d2c437

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

docs/alerts/monitors/create-monitor.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ To create a monitor from the [Metrics Explorer](/docs/metrics/metrics-queries/me
6161
1. The same threshold will also be applied to the histogram chart.
6262

6363
:::note
64-
The same threshold translating functionality supports [opening the alert response page in the Metrics Explorer](/docs/alerts/monitors/alert-response/#translating-thresholds) and [opening a monitor in the Metrics Explorer](/docs/alerts/monitors/settings/#view-in-metrics-explorer).
64+
The same threshold translating functionality supports [opening the Alerts Response Page in the Metrics Explorer](/docs/alerts/monitors/alert-response/#translating-thresholds) and [opening a monitor in the Metrics Explorer](/docs/alerts/monitors/settings/#view-in-metrics-explorer).
6565
:::
6666

6767
## Step 1. Set trigger conditions
@@ -74,28 +74,26 @@ Select a **Monitor Type**, which will create alerts based on [Logs](/docs/search
7474

7575
### Detection Method
7676

77-
Next, select a **Detection Method**. This is not applicable to SLO monitors.
78-
79-
<img src={useBaseUrl('img/monitors/monitor-detection-methods.png')} alt="monitor detection methods" width="200"/>
77+
Next, select a **Detection Method** (not applicable to SLO monitors).
8078

8179
#### Logs
8280

8381
<img src={useBaseUrl('img/alerts/monitors/monitor-detection-methods-for-logs.png')} alt="Logs detection methods" width="200"/>
8482

8583
**Static**
8684

87-
Allows you to set specific threshold conditions. Use this detection method when you are alerting on KPIs that have well defined and constant thresholds for what's good and bad. For example, infrastructure metrics like CPU utilization and memory.
85+
Set specific threshold conditions for well-defined KPIs with constant thresholds (for example, infrastructure metrics like CPU utilization and memory).
8886

8987
**Anomaly**
9088

91-
Anomaly detection leverages machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This [*AI-driven alerting*](https://www.youtube.com/watch?v=nMRoYb1YCfg) system uses historical data to minimize false positives and alerts you to deviations.
89+
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This [*AI-driven alerting*](https://www.youtube.com/watch?v=nMRoYb1YCfg) system uses historical data to minimize false positives and alerts you to deviations.
9290

9391
* **Model-driven detection**. Machine learning models create accurate baselines, eliminating guesswork and noise.
9492
* **AutoML**. The system self-tunes with seasonality detection, minimizing user intervention and adjusting for recurring patterns to reduce false positives.
9593
* **User-defined sensitivity**. Users set alert sensitivity and thresholds, providing context to filter out noise.
9694
* **One-click playbook assignment**. Monitors automatically link to [Sumo Logic Automation Service playbooks](#automated-playbooks), expediting incident response.
9795
* **Auto-diagnosis and recovery**. The Automation Service handles diagnosis and resolution, closing the loop from alert to recovery.
98-
* **Customizable detection**. Advanced rules, like "Cluster anomalies," allow detection based on multiple data points exceeding thresholds within a set time frame.
96+
* **Customizable detection**. Use advanced rules like "Cluster anomalies" to detect multiple data points exceeding thresholds within a set timeframe.
9997

10098
If you want to trigger alerts on outlier direction rather than anomaly detection, select **Anomaly** and enable **Use Outlier**.<br/><img src={useBaseUrl('img/alerts/monitors/monitor-detector-types-for-anomaly.png')} alt="Screenshot of the Monitor Type and Detection Method options in Sumo Logic's 'New Monitor' setup page. Logs is selected as the Monitor Type, and Anomaly is selected as the Detection Method. There is an option to use Outlier detection, which is currently toggled off." width="300"/>
10199

@@ -105,11 +103,11 @@ If you want to trigger alerts on outlier direction rather than anomaly detection
105103

106104
**Static**
107105

108-
Allows you to set specific threshold conditions. Use this detection method when you are alerting on KPIs that have well defined and constant thresholds for what's good and bad. For example, infrastructure metrics like CPU utilization, and memory.
106+
Set threshold conditions for KPIs with defined, constant thresholds (for example, infrastructure metrics like CPU utilization and memory).
109107

110108
**Outlier**
111109

112-
Lets you detect an unusual change or a spike in a time series of a key indicator. Use this detection method when you are alerting on KPIs that don't have well-defined constant thresholds for what's good and bad. You want the Monitor to automatically detect and alert on unusual changes or spikes on the alerting query. For example, application KPIs like page request, throughput, and latency. 
110+
Detect unusual changes or spikes in a time series of a key indicator. Use this detection method when you are alerting on KPIs that don't have well-defined constant thresholds for what's good and bad. You want the monitor to automatically detect and alert on unusual changes or spikes on the alerting query. For example, application KPIs like page request, throughput, and latency. 
113111

114112
### Query
115113

0 commit comments

Comments
 (0)