You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're excited to announce the general availability of AI-driven alerts for metrics anomalies, extending our AI-driven alerting capabilities to include metrics-based monitors. This new feature aims to reduce alert fatigue and accelerate incident resolution through the use of automated playbooks. [Learn more](/docs/alerts/monitors/create-monitor).
285
+
We're excited to announce the general availability of alerts for metrics anomalies, extending our alerting capabilities to include metrics-based monitors. This new feature aims to reduce alert fatigue and accelerate incident resolution through the use of automated playbooks. [Learn more](/docs/alerts/monitors/create-monitor).
286
286
287
287
##### Key features
288
288
@@ -373,9 +373,9 @@ We’ve added the **Convert to Anomaly** option, allowing you to convert outlier
373
373
374
374
### October 22, 2024 (Alerts)
375
375
376
-
#### AI-Driven Alerts for Metrics Anomalies
376
+
#### Alerts for Metrics Anomalies
377
377
378
-
We're excited to announce the preview of AI-driven alerts for metrics anomalies, extending our AI-driven alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
378
+
We're excited to announce the preview of alerts for metrics anomalies, extending our alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
379
379
380
380
##### Key Features
381
381
@@ -957,7 +957,7 @@ Learn more [here](/docs/integrations/amazon-aws/api-gateway/).
957
957
958
958
### March 12, 2024 (Alerts)
959
959
960
-
#### Monitor Enhancements - AI-Driven Alerting
960
+
#### Monitor Enhancements - Anomaly Alerting
961
961
962
962
We're happy to announce two new monitoring features that allow you to generate alerts that notify you of suspicious behavior and automatically run playbooks to address it.
Copy file name to clipboardExpand all lines: docs/alerts/monitors/create-monitor.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ import Iframe from 'react-iframe';
9
9
10
10
This guide will walk you through the steps of creating a monitor in Sumo Logic, from setting up trigger conditions to configuring advanced settings, notifications, and playbooks.
11
11
12
-
Our AI-driven alerts use machine learning to analyze historical data, establish baselines, detect significant deviations, and filter out irrelevant alerts to reduce alert fatigue and help teams focus on critical issues. These capabilities apply to both logs and metrics, providing a comprehensive monitoring solution. With seasonality detection and customizable anomaly clustering, false positives are minimized, enabling faster issue resolution.
12
+
Our alerts use machine learning to analyze historical data, establish baselines, detect significant deviations, and filter out irrelevant alerts to reduce alert fatigue and help teams focus on critical issues. These capabilities apply to both logs and metrics, providing a comprehensive monitoring solution. With seasonality detection and customizable anomaly clustering, false positives are minimized, enabling faster issue resolution.
13
13
14
14
Integrated playbooks automate incident response by gathering diagnostics, notifying teams, triggering recovery actions, and streamlining workflows to improve response times. You can link playbooks to monitors to automate tasks such as restarting services or scaling infrastructure, ensuring swift and efficient anomaly resolution.
15
15
@@ -88,7 +88,7 @@ Set specific threshold conditions for well-defined KPIs with constant thresholds
88
88
89
89
#### Anomaly
90
90
91
-
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This *AI-driven alerting* system uses historical data to minimize false positives and alerts you to deviations.
91
+
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This alerting system uses historical data to minimize false positives and alerts you to deviations.
92
92
93
93
***Model-driven detection**. Machine learning models create accurate baselines, eliminating guesswork and noise.
94
94
***AutoML**. The system self-tunes with seasonality detection, minimizing user intervention and adjusting for recurring patterns to reduce false positives.
@@ -98,7 +98,7 @@ Leverage machine learning to identify unusual behavior and suspicious patterns b
98
98
***Customizable detection**. Use advanced rules like "Cluster anomalies" to detect multiple data points exceeding thresholds within a set timeframe.
99
99
100
100
:::sumo Micro Lesson
101
-
Learn about AI-driven alerting.
101
+
Watch this micro lesson to learn about anomaly monitors.
Copy file name to clipboardExpand all lines: docs/get-started/ai-machine-learning.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ LogReduce® utilizes AI-driven algorithms to cluster log messages based on st
55
55
56
56
LogCompare simplifies log analysis by enabling easy comparison of log data from different time periods to detect changes or anomalies, facilitating troubleshooting and root cause discovery. By automatically running delta analysis, LogCompare streamlines the process, allowing users to identify significant alterations in log patterns efficiently. Utilizing baseline and target queries, LogCompare clusters logs into patterns and compares them based on the significance of change, providing insights into deviations over time. With intuitive actions like promoting, demoting, and splitting signatures, users can refine their analysis and focus on relevant patterns, ultimately enhancing decision-making and threat detection capabilities. Additionally, LogCompare supports alerts and scheduled searches to notify users of new signatures or significant changes, ensuring proactive monitoring and response to evolving log data. [Learn more](/docs/search/behavior-insights/logcompare).
Copy file name to clipboardExpand all lines: docs/search/copilot.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ If you prefer not to use Copilot, you can opt out by contacting [Support](https:
20
20
21
21
Sumo Logic Copilot is our AI-powered assistant that accelerates investigations and troubleshooting in logs by allowing you to ask questions in plain English and get contextual suggestions, helping first responders get to answers faster.
22
22
23
-
With its intuitive interface, Copilot automatically generates log searches from natural language queries, helping you quickly investigate performance issues, anomalies, and security threats. It also guides you through investigations step-by-step with AI-driven suggestions to refine your results for faster, more accurate resolutions. Overall, Copilot enhances incident resolution with expert level insights.
23
+
With its intuitive interface, Copilot automatically generates log searches from natural language queries, helping you quickly investigate performance issues, anomalies, and security threats. It also guides you through investigations step-by-step with AI-derived suggestions to refine your results for faster, more accurate resolutions. Overall, Copilot enhances incident resolution with expert level insights.
24
24
25
25
:::sumo Micro Lesson: Introduction to Copilot
26
26
This short video introduces Copilot and how it can help you with log search and analysis—perfect for getting a quick overview before diving in.
@@ -262,7 +262,7 @@ There are two ways to do this:
262
262
263
263
In the video, Copilot is used to investigate a security issue involving the potential leak of AWS CloudTrail access keys outside the organization.
264
264
265
-
The video demonstrates how to use Copilot to analyze AWS CloudTrail data, review AI-curated suggestions, refine searches using natural language prompts, and generate an AI-driven dashboard for root cause analysis and sharing.
265
+
The video demonstrates how to use Copilot to analyze AWS CloudTrail data, review AI-curated suggestions, refine searches using natural language prompts, and generate a dashboard for root cause analysis and sharing.
@@ -376,7 +376,7 @@ No, customer data or PII is not used for training AI models. Copilot operates us
376
376
377
377
Certain features may rely on query history stored on a rolling basis for performance optimization. Data is systematically expired to maintain privacy.
378
378
379
-
For example, our AI-driven alerts feature log anomaly detection and build ML models from 60 days of logs. To accomplish this, we retrain the model once a week. In this example, each week, we add one week of new data while expiring the oldest week of data. Rolling data windows are done to avoid fetching 60 days of data for every training run.
379
+
For example, our alerts feature log anomaly detection and build ML models from 60 days of logs. To accomplish this, we retrain the model once a week. In this example, each week, we add one week of new data while expiring the oldest week of data. Rolling data windows are done to avoid fetching 60 days of data for every training run.
380
380
</details>
381
381
382
382
<details>
@@ -388,7 +388,7 @@ For Generative AI, Copilot uses a foundation model served by Amazon Bedrock. Cla
388
388
<details>
389
389
<summary>What is the type of AI being used?</summary>
390
390
391
-
Sumo Logic Copilot is an ensemble of Generative AI (GenAI) and classical machine learning (ML) techniques. For example, classical ML is used for anomaly detection in AI-driven alerts.
391
+
Sumo Logic Copilot is an ensemble of Generative AI (GenAI) and classical machine learning (ML) techniques. For example, classical ML is used for anomaly detection in alerts.
Copy file name to clipboardExpand all lines: docs/security/additional-security-features/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ We provide built-in threat intelligence correlations on logs for cloud services.
27
27
28
28
### Suspicious activity
29
29
30
-
We surface suspicious user/IAM/network activity using AI-driven anomaly detection. While threat detection capabilities from cloud services may only identify known threats, monitoring suspicious activity helps detect potential threats early.
30
+
We surface suspicious user/IAM/network activity using anomaly detection. While threat detection capabilities from cloud services may only identify known threats, monitoring suspicious activity helps detect potential threats early.
@@ -39,7 +39,7 @@ The apps offer curated saved searches developed by subject matter experts, such
39
39
40
40
### Monitors
41
41
42
-
The apps provide monitors crafted by subject matter experts such as the Sumo Logic SOC team. Some monitors use our AI-driven alerting capabilities, which apply next-generation anomaly detection capabilities, and some have playbooks. Many of these monitors use the Sumo Logic Alert Grouping feature, where a single monitor will trigger separate alerts based on different criteria.
42
+
The apps provide monitors crafted by subject matter experts such as the Sumo Logic SOC team. Some monitors use our anomaly detection capabilities, and some have playbooks. Many of these monitors use the Sumo Logic Alert Grouping feature, where a single monitor will trigger separate alerts based on different criteria.
0 commit comments