Skip to content

Commit d18ae3d

Browse files
authored
Remove instances of 'AI-driven alerting' (#5571)
1 parent cc4b639 commit d18ae3d

File tree

7 files changed

+17
-17
lines changed

7 files changed

+17
-17
lines changed

blog-service/2024/12-31.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -280,9 +280,9 @@ Explore our technical documentation [here](/docs/integrations/saas-cloud/kandji/
280280

281281
### November 05, 2024 (Alerts)
282282

283-
#### AI-Driven Alerts for Metrics Anomalies
283+
#### Alerts for Metrics Anomalies
284284

285-
We're excited to announce the general availability of AI-driven alerts for metrics anomalies, extending our AI-driven alerting capabilities to include metrics-based monitors. This new feature aims to reduce alert fatigue and accelerate incident resolution through the use of automated playbooks. [Learn more](/docs/alerts/monitors/create-monitor).
285+
We're excited to announce the general availability of alerts for metrics anomalies, extending our alerting capabilities to include metrics-based monitors. This new feature aims to reduce alert fatigue and accelerate incident resolution through the use of automated playbooks. [Learn more](/docs/alerts/monitors/create-monitor).
286286

287287
##### Key features
288288

@@ -373,9 +373,9 @@ We’ve added the **Convert to Anomaly** option, allowing you to convert outlier
373373

374374
### October 22, 2024 (Alerts)
375375

376-
#### AI-Driven Alerts for Metrics Anomalies
376+
#### Alerts for Metrics Anomalies
377377

378-
We're excited to announce the preview of AI-driven alerts for metrics anomalies, extending our AI-driven alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
378+
We're excited to announce the preview of alerts for metrics anomalies, extending our alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
379379

380380
##### Key Features
381381

@@ -957,7 +957,7 @@ Learn more [here](/docs/integrations/amazon-aws/api-gateway/).
957957

958958
### March 12, 2024 (Alerts)
959959

960-
#### Monitor Enhancements - AI-Driven Alerting
960+
#### Monitor Enhancements - Anomaly Alerting
961961

962962
We're happy to announce two new monitoring features that allow you to generate alerts that notify you of suspicious behavior and automatically run playbooks to address it.
963963

docs/alerts/monitors/create-monitor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import Iframe from 'react-iframe';
99

1010
This guide will walk you through the steps of creating a monitor in Sumo Logic, from setting up trigger conditions to configuring advanced settings, notifications, and playbooks.
1111

12-
Our AI-driven alerts use machine learning to analyze historical data, establish baselines, detect significant deviations, and filter out irrelevant alerts to reduce alert fatigue and help teams focus on critical issues. These capabilities apply to both logs and metrics, providing a comprehensive monitoring solution. With seasonality detection and customizable anomaly clustering, false positives are minimized, enabling faster issue resolution.
12+
Our alerts use machine learning to analyze historical data, establish baselines, detect significant deviations, and filter out irrelevant alerts to reduce alert fatigue and help teams focus on critical issues. These capabilities apply to both logs and metrics, providing a comprehensive monitoring solution. With seasonality detection and customizable anomaly clustering, false positives are minimized, enabling faster issue resolution.
1313

1414
Integrated playbooks automate incident response by gathering diagnostics, notifying teams, triggering recovery actions, and streamlining workflows to improve response times. You can link playbooks to monitors to automate tasks such as restarting services or scaling infrastructure, ensuring swift and efficient anomaly resolution.
1515

@@ -88,7 +88,7 @@ Set specific threshold conditions for well-defined KPIs with constant thresholds
8888

8989
#### Anomaly
9090

91-
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This *AI-driven alerting* system uses historical data to minimize false positives and alerts you to deviations.
91+
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This alerting system uses historical data to minimize false positives and alerts you to deviations.
9292

9393
* **Model-driven detection**. Machine learning models create accurate baselines, eliminating guesswork and noise.
9494
* **AutoML**. The system self-tunes with seasonality detection, minimizing user intervention and adjusting for recurring patterns to reduce false positives.
@@ -98,7 +98,7 @@ Leverage machine learning to identify unusual behavior and suspicious patterns b
9898
* **Customizable detection**. Use advanced rules like "Cluster anomalies" to detect multiple data points exceeding thresholds within a set timeframe.
9999

100100
:::sumo Micro Lesson
101-
Learn about AI-driven alerting.
101+
Watch this micro lesson to learn about anomaly monitors.
102102

103103
<Iframe url="https://fast.wistia.net/embed/iframe/8z9b2zqtc3?web_component=true&seo=true&videoFoam=false"
104104
width="854px"

docs/alerts/scheduled-searches/create-real-time-alert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Monitors offer significant improvements over Real-Time Scheduled Searches, inclu
2929
* [Multiple trigger conditions](/docs/alerts/monitors/create-monitor/#step-1-set-trigger-conditions) (Critical, Warning, Missing Data)
3030
* [Alert grouping](/docs/alerts/monitors/alert-grouping/)
3131
* [Playbook support](/docs/alerts/monitors/alert-response/#alert-details)
32-
* [AI-driven alerting](/release-notes-service/2024/12/31/#march-12-2024-alerts)
32+
* [Anomaly alerting](/release-notes-service/2024/12/31/#march-12-2024-alerts)
3333
* [Integration with the Alert Response page](/docs/alerts/monitors/alert-response/)
3434

3535
Monitors are the strategic focus for our future alerting development and enhancements.

docs/get-started/ai-machine-learning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ LogReduce&reg; utilizes AI-driven algorithms to cluster log messages based on st
5555

5656
LogCompare simplifies log analysis by enabling easy comparison of log data from different time periods to detect changes or anomalies, facilitating troubleshooting and root cause discovery. By automatically running delta analysis, LogCompare streamlines the process, allowing users to identify significant alterations in log patterns efficiently. Utilizing baseline and target queries, LogCompare clusters logs into patterns and compares them based on the significance of change, providing insights into deviations over time. With intuitive actions like promoting, demoting, and splitting signatures, users can refine their analysis and focus on relevant patterns, ultimately enhancing decision-making and threat detection capabilities. Additionally, LogCompare supports alerts and scheduled searches to notify users of new signatures or significant changes, ensuring proactive monitoring and response to evolving log data. [Learn more](/docs/search/behavior-insights/logcompare).
5757

58-
### AI-driven Alerts
58+
### AI in alerting
5959

6060
#### Anomaly Detection
6161

docs/manage/manage-subscription/sumo-logic-flex-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The following table provides a summary list of key features by Flex package acco
6565
| Feature | Free | Trial | Essentials | Enterprise Suite Flex |
6666
|:------- | :--- | :---- | :------------- | :------------- |
6767
| Advanced Span Analytics | | ![check](/img/reuse/check.png) | |![check](/img/reuse/check.png) |
68-
| AI-driven Alerting | | ![check](/img/reuse/check.png) | | ![check](/img/reuse/check.png) |
68+
| Anomaly Alerting | | ![check](/img/reuse/check.png) | | ![check](/img/reuse/check.png) |
6969
| Alerting Integrations (Slack, PagerDuty, ServiceNow, etc.) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | | ![check](/img/reuse/check.png) |
7070
| Alert Response | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | | ![check](/img/reuse/check.png) |
7171
| Anomaly Detection | | ![check](/img/reuse/check.png) | |![check](/img/reuse/check.png) |

docs/search/copilot.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ If you prefer not to use Copilot, you can opt out by contacting [Support](https:
2020

2121
Sumo Logic Copilot is our AI-powered assistant that accelerates investigations and troubleshooting in logs by allowing you to ask questions in plain English and get contextual suggestions, helping first responders get to answers faster.
2222

23-
With its intuitive interface, Copilot automatically generates log searches from natural language queries, helping you quickly investigate performance issues, anomalies, and security threats. It also guides you through investigations step-by-step with AI-driven suggestions to refine your results for faster, more accurate resolutions. Overall, Copilot enhances incident resolution with expert level insights.
23+
With its intuitive interface, Copilot automatically generates log searches from natural language queries, helping you quickly investigate performance issues, anomalies, and security threats. It also guides you through investigations step-by-step with AI-derived suggestions to refine your results for faster, more accurate resolutions. Overall, Copilot enhances incident resolution with expert level insights.
2424

2525
:::sumo Micro Lesson: Introduction to Copilot
2626
This short video introduces Copilot and how it can help you with log search and analysis—perfect for getting a quick overview before diving in.
@@ -262,7 +262,7 @@ There are two ways to do this:
262262

263263
In the video, Copilot is used to investigate a security issue involving the potential leak of AWS CloudTrail access keys outside the organization.
264264

265-
The video demonstrates how to use Copilot to analyze AWS CloudTrail data, review AI-curated suggestions, refine searches using natural language prompts, and generate an AI-driven dashboard for root cause analysis and sharing.
265+
The video demonstrates how to use Copilot to analyze AWS CloudTrail data, review AI-curated suggestions, refine searches using natural language prompts, and generate a dashboard for root cause analysis and sharing.
266266

267267
<Iframe url="https://www.youtube.com/embed/QrRvN2Bg4NY?si=FTbUeCI-xaJrglmm?rel=0"
268268
width="854px"
@@ -376,7 +376,7 @@ No, customer data or PII is not used for training AI models. Copilot operates us
376376

377377
Certain features may rely on query history stored on a rolling basis for performance optimization. Data is systematically expired to maintain privacy.
378378

379-
For example, our AI-driven alerts feature log anomaly detection and build ML models from 60 days of logs. To accomplish this, we retrain the model once a week. In this example, each week, we add one week of new data while expiring the oldest week of data. Rolling data windows are done to avoid fetching 60 days of data for every training run.
379+
For example, our alerts feature log anomaly detection and build ML models from 60 days of logs. To accomplish this, we retrain the model once a week. In this example, each week, we add one week of new data while expiring the oldest week of data. Rolling data windows are done to avoid fetching 60 days of data for every training run.
380380
</details>
381381

382382
<details>
@@ -388,7 +388,7 @@ For Generative AI, Copilot uses a foundation model served by Amazon Bedrock. Cla
388388
<details>
389389
<summary>What is the type of AI being used?</summary>
390390

391-
Sumo Logic Copilot is an ensemble of Generative AI (GenAI) and classical machine learning (ML) techniques. For example, classical ML is used for anomaly detection in AI-driven alerts.
391+
Sumo Logic Copilot is an ensemble of Generative AI (GenAI) and classical machine learning (ML) techniques. For example, classical ML is used for anomaly detection in alerts.
392392
</details>
393393

394394
<details>

docs/security/additional-security-features/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ We provide built-in threat intelligence correlations on logs for cloud services.
2727

2828
### Suspicious activity
2929

30-
We surface suspicious user/IAM/network activity using AI-driven anomaly detection. While threat detection capabilities from cloud services may only identify known threats, monitoring suspicious activity helps detect potential threats early.
30+
We surface suspicious user/IAM/network activity using anomaly detection. While threat detection capabilities from cloud services may only identify known threats, monitoring suspicious activity helps detect potential threats early.
3131

3232
<img src={useBaseUrl('img/integrations/amazon-aws/cis-for-aws-suspicious-network-activity.png')} alt="Suspicious Network Activity dashboard" style={{border: '1px solid gray'}} width="700"/>
3333

@@ -39,7 +39,7 @@ The apps offer curated saved searches developed by subject matter experts, such
3939

4040
### Monitors
4141

42-
The apps provide monitors crafted by subject matter experts such as the Sumo Logic SOC team. Some monitors use our AI-driven alerting capabilities, which apply next-generation anomaly detection capabilities, and some have playbooks. Many of these monitors use the Sumo Logic Alert Grouping feature, where a single monitor will trigger separate alerts based on different criteria.
42+
The apps provide monitors crafted by subject matter experts such as the Sumo Logic SOC team. Some monitors use our anomaly detection capabilities, and some have playbooks. Many of these monitors use the Sumo Logic Alert Grouping feature, where a single monitor will trigger separate alerts based on different criteria.
4343

4444
<img src={useBaseUrl('img/security/cis-for-aws-monitors.png')} alt="Example monitors" style={{border: '1px solid gray'}} width="400"/>
4545

0 commit comments

Comments
 (0)