Skip to content

Commit 685109f

Browse files
Updated AWSO v2.12 in docs (#5103)
* Updated AWSO v2.12 in docs * Removed root-cause-explorer from AWSO * Updated doc for default scope * Resized image Default-Scope.png * Corrected Sumo Logic Access ID and Key section * Updated mapping image * Updated Doc for RCE * Update about.md * Updated release date and removed minor references * Update index.md --------- Co-authored-by: Amee Lepcha <[email protected]>
1 parent 5c4909e commit 685109f

File tree

15 files changed

+46
-201
lines changed

15 files changed

+46
-201
lines changed

docs/observability/aws/about.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ AWS provides over 150 discrete services including compute, network, storage, dat
1111

1212
Despite all of these services being a part of AWS, troubleshooting across different services can be problematic when you use separate AWS accounts to manage costs and give teams independent administrative control. Different AWS accounts often have different settings across Availability Zones or Regions, which makes it difficult to get a clear picture of overall application health.
1313

14-
The Sumo Logic AWS Observability solution and Root Cause Explorer pull and analyze data across key AWS services and accounts, establish activity baselines, and determine causes for application incidents and high deviation events.
14+
The Sumo Logic AWS Observability solution analyze data across key AWS services and accounts, establish activity baselines, and determine causes for application incidents and high deviation events.
1515

1616
:::sumo Micro Lesson
1717
Watch the following micro lesson to learn about our AWS Observability solution.
@@ -50,7 +50,6 @@ The **AWS Observability Solution** can be deployed across multiple accounts and
5050
* Minimize the time it takes to get operational insights across your AWS infrastructure.
5151
* Identify elements that are subject to specific operational issues across your AWS infrastructure.
5252
* Minimize the time it takes to assign operational to the correct business units and functional teams in your AWS infrastructure.
53-
* Expedite troubleshooting and root cause isolation for incidents in their apps and microservices running on AWS infrastructure using the Root Cause Explorer.
5453

5554
The unified platform collects and provides logs, metrics, traces, and metadata for the Application, Microservices, Cloud, Orchestrator, and Container layers. The solution understands how the different datasets and services are connected, and stitches those relationships into an entity workflow that makes it more intuitive for users to get a holistic view of their service.
5655

docs/observability/aws/deploy-use-aws-observability/before-you-deploy.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,11 @@ If you are already collecting AWS metrics, logs, and/or events, we recommend tha
3030
* View Monitors
3131
* Manage Entity Type Configs
3232
* Create access keys
33-
* **Sumo Logic Access ID and Key**. When you deploy the solution, you’ll need to supply a Sumo Logic Access ID and Access Key, which enable you to use Sumo Logic APIs. Make sure you have the role capabilities listed above before generating the Access ID and Key.
33+
* **Sumo Logic Access ID and Key**. When you deploy the solution, you’ll need to supply a Sumo Logic Access ID and Access Key, which enable you to use Sumo Logic APIs. Make sure you select default scope and have the role capabilities listed above before generating the Access ID and Key.
34+
![Default-Scope.png](/img/observability/Default-Scope.png)
35+
:::note
36+
For the AWS Observability Solution, you must use the default scope when generating the Access ID and Key; custom scopes are not supported.
37+
:::
3438
* **AWS credentials**. To deploy the solution, you will need to log onto the AWS Console. For the CloudFormation template deployment option, your AWS role must have the permissions described by this [JSON file](https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/AWSObservabilityCFTemplatePermissions.json). As necessary, you may add JSON text to an existing or a new policy associated with an AWS IAM role as described in the [AWS documentation](https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-create-and-attach-iam-policy.html). For Terraform deployment options, see the \*.tmpl files in this folder [aws-observability-terraform/source-module/templates/](https://github.com/SumoLogic/sumologic-solution-templates/tree/master/aws-observability-terraform/source-module/templates).
3539
* Set up the [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-install.html) and configure the AWS CLI as described in the [AWS documentation](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html) if you would like to use an AWS profile for Terraform script based deployment.
3640
* The AWS Observability solution comes with pre-packaged alerts in the form of Sumo Logic Monitors. To understand more about their capabilities please visit the Monitors page.
@@ -185,7 +189,7 @@ Here’s a sample `sources.json` file that you can include in your AMI.
185189

186190
Before setting up the AWS Observability solution we recommend testing permissions for both AWS and Sumo Logic by using a test AWS CloudFormation template. To execute this template:
187191

188-
1. Invoke the AWS CloudFormation template at this [URL](https://console.aws.amazon.com/cloudformation/home#/stacks/quickcreate?templateURL=https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.11.0/permissionchecker/permissioncheck.template.yaml).
192+
1. Invoke the AWS CloudFormation template at this [URL](https://console.aws.amazon.com/cloudformation/home#/stacks/quickcreate?templateURL=https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.12.0/permissionchecker/permissioncheck.template.yaml).
189193
1. Select the desired AWS region to test.
190194
1. Enter a Stack Name, Sumo Logic Deployment, and Sumo Logic Access ID and Access Key.<br/> ![Testing_sumo_Permission_1.png](/img/observability/Testing_sumo_Permission_1.png)
191195
1. Click **Create Stack.**

docs/observability/aws/deploy-use-aws-observability/changelog.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,18 @@ This section provides details on the available versions of the AWS Observability
99

1010
To install or upgrade to the required version of the CloudFormation template, use the URL of the YAML file corresponding to the right version number as the Amazon S3 URL in the AWS CloudFormation section of the AWS Management Console. See [Selecting a stack template](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-using-console-create-stack-template.html) for more information.
1111

12+
## v2.12.0, 01-Apr-2025
13+
AWS Observability Solution (S3 Link for CloudFormation template): `https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.12.0/sumologic_observability.master.template.yaml`
14+
15+
AWS Observability Solution (Terraform-based) repo: [sumologic-solution-templates](https://github.com/SumoLogic/sumologic-solution-templates).
16+
17+
Updates:
18+
* Updated the SAM Lambda runtime from Node.js v20.x to v22.x.
19+
* Updated the Lambda runtime to Node.js v22.x in the CloudFormation template for `AWS CloudWatch Logs with Dead Letter Queue Support`.
20+
* Updated the SecurityHub SAM Lambda runtime from Python v3.11 to v3.13.
21+
* Updated Lambda runtime to Python v3.13 in the CloudFormation template for `Kinesis Metric Collection`
22+
* Discontinued support for Mumbai deployment.
23+
1224
## v2.11.0, 24-Jan-2025
1325
AWS Observability Solution (S3 Link for CloudFormation template): `https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.11.0/sumologic_observability.master.template.yaml`
1426

docs/observability/aws/deploy-use-aws-observability/deploy-with-aws-cloudformation/automatic-installation-script.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,6 @@ chmod +x DeployAWSOPosix.sh
8888
| Existing Sumo Logic Lambda CloudWatch Logs Source API URL | empty |
8989
| Subscribe log groups to Sumo Logic Lambda Forwarder | Both |
9090
| Regex for AWS Lambda Log Groups | lambda |
91-
| Select the Sumo Logic Root Cause Explorer Source | Both |
9291
| Enable ELB Classic Access logging | Both |
9392
| Create Sumo Logic ELB Logs Source | Yes |
9493
| Existing Sumo Logic ELB Classic Logs Source API URL | empty |

docs/observability/aws/deploy-use-aws-observability/deploy-with-aws-cloudformation/deploy-multiple-accounts-regions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ Given that we use an account alias, we recommend you use StackSets to automati
1919

2020
1. Sign in to the AWS Management console.
2121
1. Choose an option to invoke AWS CloudFormation Template:
22-
* Click [this URL](https://console.aws.amazon.com/cloudformation/home#/stacks/quickcreate?templateURL=https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.11.0/sumologic_observability.master.template.yaml) to invoke the latest Sumo Logic AWS CloudFormation template.
23-
* Download the AWS Observability Solution template (S3 link for CloudFormation template): https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.11.0/sumologic_observability.master.template.yaml to invoke the latest Sumo Logic AWS CloudFormation template.
22+
* Click [this URL](https://console.aws.amazon.com/cloudformation/home#/stacks/quickcreate?templateURL=https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.12.0/sumologic_observability.master.template.yaml) to invoke the latest Sumo Logic AWS CloudFormation template.
23+
* Download the AWS Observability Solution template (S3 link for CloudFormation template): https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.12.0/sumologic_observability.master.template.yaml to invoke the latest Sumo Logic AWS CloudFormation template.
2424
:::note
2525
If you would like to download or inspect this or other versions of this template, see the [Changelog](../changelog.md).
2626
:::
@@ -87,7 +87,7 @@ In case you do not provide a CSV file or if we detect that it does not have the
8787
in your AWS account.
8888
1. Click **Create StackSet**.
8989
![CloudFormation_Stackset 1.png](/img/observability/ClodFormation_Stackset_1.png)
90-
1. Paste the URL `https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.11.0/sumologic_observability.master.template.yaml` in the Amazon S3 URL option and click **Next**. If you'd like to download or inspect this or other versions of this template, see the [Changelog](../changelog.md).<br/> ![multi-create-stack.png](/img/observability/multi-create-stack.png)
90+
1. Paste the URL `https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/aws-observability-versions/v2.12.0/sumologic_observability.master.template.yaml` in the Amazon S3 URL option and click **Next**. If you'd like to download or inspect this or other versions of this template, see the [Changelog](../changelog.md).<br/> ![multi-create-stack.png](/img/observability/multi-create-stack.png)
9191
1. Provide a StackSet Name and supply the values for each of the prompts listed as per instructions in the [Deploy the AWS Observability Solution](/docs/observability/aws/deploy-use-aws-observability) section with the following exception:
9292
* Leave the field “Alias for AWS Account Identification” blank. <br/> ![aws-field.png](/img/observability/aws-field.png)
9393
* Provide the S3 Object URL of a CSV file that maps AWS Account IDs to an Account Alias in Section 2 of the template “AWS Account Alias”. <br/> ![aws-url.png](/img/observability/aws-url.png)

0 commit comments

Comments
 (0)