Skip to content

Commit 8bfc73f

Browse files
committed
round 1 - reverts
1 parent ffdbc75 commit 8bfc73f

File tree

11 files changed

+18
-13
lines changed

11 files changed

+18
-13
lines changed

docs/alerts/monitors/alert-response-faq.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ Overall, yes. Alert response is available in all the Sumo Logic packages. Howeve
1212

1313
| Package | Related Alerts | Monitor History | Playbooks |
1414
|:--|:--|:--|:--|
15+
| Free | Yes | Yes | Yes |
1516
| Essentials | Yes | Yes | Yes |
1617
| Enterprise Security | Yes | Yes | Yes |
1718
| Enterprise Operations | Yes | Yes | Yes |
@@ -21,6 +22,7 @@ Overall, yes. Alert response is available in all the Sumo Logic packages. Howeve
2122

2223
| Package | Log Fluctuations | Dimensional Explanation | Anomaly | Benchmark |
2324
|:--|:--|:--|:--|:--|
25+
| Free | Yes | Yes | Yes |
2426
| Essentials | Yes | Yes | No | No |
2527
| Enterprise Security | Yes | Yes | No | Yes |
2628
| Enterprise Operations | Yes | Yes | Yes | Yes |

docs/alerts/monitors/overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ See [Trigger Type (Logs)](/docs/alerts/monitors/create-monitor/#trigger-type-log
3333
* Log monitors delay execution by two minutes. This means it won't evaluate data from the current time, but evaluate data from two minutes ago. This ensures that any delays in ingestion are factored in and won't generate false positive or false negative alerts.
3434
* Enterprise and Trial plan customers can have up to 1,000 log monitors.
3535
* Essentials and Professional plan customers can have up to 300 log monitors.
36+
* Free Trial customers can have up to 50 log monitors.
3637

3738
#### Auto-resolving notifications
3839

@@ -48,6 +49,7 @@ Log monitors in a triggered state can auto-resolve.
4849
* Metrics monitors delay execution by one minute.
4950
* Enterprise and Trial plan customers can have up to 1,500 Metrics monitors.
5051
* Essentials and Professional plan customers can have up to 500 Metrics monitors.
52+
* Free Trial customers can have up to 50 log monitors.
5153

5254
## Notifications
5355

docs/alerts/webhook-connections/opsgenie-legacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To add a Sumo Logic integration in Opsgenie, do the following:
2222
* Add the team who will be notified of Sumo Logic Alerts.
2323
* Copy the Integration URL, to be used in Sumo Logic while setting up the Webhook Connection.
2424
:::note
25-
For **Essentials** plans, you can only add the integration from the Team Dashboard. Use the alternative instructions. To add an integration directly to a team, navigate to the Team Dashboard and open the Integrations tab. Click **Add Integration** and search for Sumo Logic and click **add**.
25+
For **Free** and **Essentials** plans, you can only add the integration from the Team Dashboard. Use the alternative instructions. To add an integration directly to a team, navigate to the Team Dashboard and open the Integrations tab. Click **Add Integration** and search for Sumo Logic and click **add**.
2626
:::
2727
1. Click **Save Integration**.
2828

@@ -47,7 +47,7 @@ This section demonstrates how to create a webhook connection from Sumo Logic to
4747

4848
To create a webhook:
4949

50-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Monitoring > Connections**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Monitoring** select **Connections**. You can also click the **Go To...** menu at the top of the screen and select **Connections**.
50+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Monitoring > Connections**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Monitoring** select **Connections**. You can also click the **Go To...** menu at the top of the screen and select **Connections**.
5151
1. Click **+ Add** and choose **Webhook** as connection type.
5252
1. For the name, enter **Sumo Logic Opsgenie** and give an optional description to the connection.
5353
1. Paste the URL (used in [step 2](#configure-a-scheduled-search)) into the **URL** field.

docs/alerts/webhook-connections/opsgenie.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ To add a Sumo Logic integration in Opsgenie, do the following:
2424
* Add the team who will be notified of Sumo Logic Alerts.
2525
* Copy the **Integration Url**, it is used in Sumo Logic while setting up the Webhook Connection.
2626
:::note
27-
For **Essentials** plans, you can only add the integration from the Team Dashboard. Use the alternative instructions. To add an integration directly to a team, navigate to the Team Dashboard and open the Integrations tab. Click **Add Integration** and search for Sumo Logic and click **add**.
27+
For **Free** and **Essentials** plans, you can only add the integration from the Team Dashboard. Use the alternative instructions. To add an integration directly to a team, navigate to the Team Dashboard and open the Integrations tab. Click **Add Integration** and search for Sumo Logic and click **add**.
2828
:::
2929
1. Click **Save Integration**.
3030

@@ -45,7 +45,7 @@ You need the **Manage connections** [role capability](/docs/manage/users-roles
4545

4646
This section demonstrates how to create a webhook connection from Sumo Logic to Opsgenie.
4747

48-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Monitoring > Connections**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Monitoring** select **Connections**. You can also click the **Go To...** menu at the top of the screen and select **Connections**.
48+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Monitoring > Connections**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Monitoring** select **Connections**. You can also click the **Go To...** menu at the top of the screen and select **Connections**.
4949
1. Click **+ Add** and choose **Opsgenie** as the connection type.<br/> ![Opsgenie webhook button.png](/img/connection-and-integration/opsgenie-webhook-button.png)
5050
1. Enter a **Name** and give an optional **Description** to the connection.
5151
1. Paste the **Integration Url** from Opsgenie into the **URL** field.

docs/api/troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ When running an API query for the Sumo Logic [Search Job API](/docs/api/search-j
8686

8787
#### Answer
8888

89-
The API- 403 error occurs when you do not have access to the Search Job API, which is only available for Enterprise-level accounts. If you're currently on a Sumo Logic Professional account, you'll receive this error message if you try to access these APIs.
89+
The API- 403 error occurs when you do not have access to the Search Job API, which is only available for Enterprise-level accounts. If you're currently on a Sumo Logic Free or Professional account, you'll receive this error message if you try to access these APIs.
9090

9191
If you need access to these APIs, reach out to your Sumo Logic sales representative or [contact us](https://www.sumologic.com/contact-us/) for more information on upgrading your existing account.
9292

docs/dashboards/panels/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ Text can clarify what you are showing on dashboards or act as a note to your v
132132

133133
Titles are displayed in the same size and font. Text is styled using Markdown syntax, meaning that you can control the size and weight of the text. Not all Markdown syntax options are supported; see [Markdown Syntax](markdown-syntax.md).
134134

135-
There is no limit to the number of Text Panels you can add to Dashboards.
135+
There is no limit to the number of Text Panels you can add to Dashboards. These types of Panels do not count against the quota in Sumo Logic Free accounts.
136136

137137
To add a Text Panel:
138138

docs/get-started/apps-integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ These apps have gone through code and functional review with the Sumo Logic app
4141
Certain apps have specific installation requirements. Be sure to check the instructions for your application for specific instructions.
4242

4343
:::important
44-
Applications can be installed only by users with a Sumo Logic Professional or a Sumo Logic Enterprise account.
44+
Applications can be installed only by users with a Sumo Logic Professional or a Sumo Logic Enterprise account. Organizations with a Sumo Logic Free account currently cannot use Sumo Logic apps.
4545
:::
4646

4747
## Next-Gen apps

docs/integrations/amazon-aws/threat-intel.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,14 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1010

1111
The Threat Intel for AWS App correlates Sumo Logic [threat intelligence](/docs/security/threat-intelligence/) data with your AWS log data, allowing for real-time security analytics to help detect threats in your environment and protect against cyber-attacks. The Threat Intel for AWS App scans your AWS CloudTrail, AWS ELB and AWS VPC Flow logs for threats based on IP address.
1212

13-
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period.
13+
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period. The Threat Intel lookup database is not available for Sumo Logic Free accounts.
1414

1515

1616
## Collect Logs for the Threat Intel for AWS App
1717

1818
The Threat Intel for AWS App utilizes AWS logs and VPC Flow Logs.
1919

20-
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period.
20+
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period. The Threat Intel lookup database is not available for Sumo Logic Free accounts.
2121

2222

2323
### Configure Collectors and Sources
@@ -33,7 +33,7 @@ VPC Flow Logs can be published to Amazon CloudWatch Logs and Amazon S3. Each met
3333

3434
## Installing the Threat Intel for AWS App
3535

36-
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period.
36+
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period. The Threat Intel lookup database is not available for Sumo Logic Free accounts.
3737

3838
Now that you have set up collection, install the Sumo Logic App for Threat Intel for AWS to use the preconfigured searches and [Dashboards](/docs/integrations/amazon-aws/threat-intel#viewing-threat-intel-dashboards) that provide insight into your data.
3939

docs/integrations/app-development/jfrog-artifactory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ For complete instructions, see [Local File Source](/docs/send-data/installed-col
149149
150150
The JFrog Artifactory Sumo Logic integration provides the ability to access preconfigured Sumo Logic Dashboards directly from Artifactory that will allow you to analyze data from your Artifactory logs.
151151
152-
**If you do not have an existing Sumo Logic account**, enable the JFrog Artifactory Sumo Logic integration directly from Artifactory. When you enable the integration, a Sumo Logic Connector and Source get automatically configured, and the Sumo Logic App for Artifactory gets installed automatically.
152+
**If you do not have an existing Sumo Logic account**, enable the JFrog Artifactory Sumo Logic integration directly from Artifactory. When you enable the integration, a Sumo Logic Connector and Source get automatically configured, and the Sumo Logic App for Artifactory gets installed automatically. The JFrog Artifactory Sumo Logic integration provides a new Sumo Logic Free account with a daily data volume limit of 500MB per day, with 30 users and 14 days of data retention.
153153
154154
**If you have an existing Sumo Logic account**, you can configure Artifactory Online to send data (described below) to an existing Sumo Logic [HTTP Logs and Metrics](/docs/send-data/hosted-collectors/http-source/logs-metrics) source.
155155

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ Sumo Logic has expanded its security offerings by allowing customers to analyze
150150
* Sumo Logic maintains an up-to-date copy of CrowdStrike’s threat database.
151151
* Sumo customers can now use the CrowdStrike database in threat analysis queries over their logs (through a new lookup operator).
152152
153-
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period.
153+
The Sumo Logic Threat Intel lookup database is only available with Sumo Logic Enterprise and Professional accounts, or during a 30-day trial period. The Threat Intel lookup database is not available for Sumo Logic Free accounts.
154154
155155
156156
#### What does the Threat Intel Quick Analysis App do?

0 commit comments

Comments
 (0)