Skip to content

Commit fbbcfa1

Browse files
kimsaucejpipkin1
andauthored
Fixes to Sched Searches and Alerts to prep for AI/ML hub (#4092)
* Fixes to Sched Searches and Alerts to prep for AI/ML hub * Update docs/alerts/scheduled-searches/create-email-alert.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/alerts/scheduled-searches/create-email-alert.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/alerts/scheduled-searches/create-email-alert.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * More edits * Update docs/alerts/scheduled-searches/schedule-search.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]>
1 parent a8568ee commit fbbcfa1

File tree

35 files changed

+307
-348
lines changed

35 files changed

+307
-348
lines changed

blog-service/2016/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ Downloading the configuration allows you to create scripts to configure multiple
178178

179179
### September 1, 2016
180180

181-
**Scheduled Search Email Alert Template Improvements. **The Scheduled Search Email Alert template is now easier to read and includes more pertinent information, including the title of the saved search, description, search query string, time range, run frequency, notification threshold, time that the scheduled search was run, and the name and email of the person who scheduled the search. For complete details, see [Receive Email Alerts from Scheduled Searches](/docs/alerts/scheduled-searches/receive-email-alerts).
181+
**Scheduled Search Email Alert Template Improvements. **The Scheduled Search Email Alert template is now easier to read and includes more pertinent information, including the title of the saved search, description, search query string, time range, run frequency, notification threshold, time that the scheduled search was run, and the name and email of the person who scheduled the search. For complete details, see [Receive Email Alerts from Scheduled Searches](/docs/alerts/scheduled-searches/create-email-alert/#scheduled-search-email-alert-template).
182182

183183

184184
### August 29, 2016

blog-service/2020/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ As it relates to **monitoring**, the Observability solution now includes:
272272
<!---
273273
![image3.png /files/3734/image3.png?revision=4&size=bestfit&width=612&height=249)
274274
-->
275-
- [Re-vamped Metrics Explorer](/docs/metrics/metrics-queries/metrics-explorer) that decreases the complexity of finding and visualizing your metrics data with a new structured query builder, and an extended range of visualizations for ad-hoc analysis. Mimicking the Dashboard workflow, you now have the same unified experience in the main metrics tab.
275+
- [Re-vamped Metrics Explorer](/docs/metrics/metrics-queries/metrics-explorer) that decreases the complexity of finding and visualizing your metrics data with a new structured query builder, and an extended range of visualizations for ad hoc analysis. Mimicking the Dashboard workflow, you now have the same unified experience in the main metrics tab.
276276
- [Global Intelligence for AWS CloudTrail DevOps](/docs/integrations/amazon-aws/global-intelligence-cloudtrail-devops) that helps on-call staff isolate or eliminate AWS errors (availability, throttling, out of stock) as probable cause for their incidents. Available for Enterprise accounts. 
277277

278278
**Troubleshooting** incidents can now be streamlined thanks to:

cid-redirects.json

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -572,7 +572,8 @@
572572
"/05Search/Search-Query-Language/Search-Operators/urlencode": "/docs/search/search-query-language/search-operators/urlencode",
573573
"/05Search/Search-Query-Language/Search-Operators/where": "/docs/search/search-query-language/search-operators/where",
574574
"/05Search/Search-Query-Language/Sumo-Logic-Search-Query-Language-Cheat-Sheet": "/docs/search/search-cheat-sheets",
575-
"/05Search/Search-Query-Language/Threshold-Alerts": "/docs/alerts/scheduled-searches/receive-email-alerts",
575+
"/05Search/Search-Query-Language/Threshold-Alerts": "/docs/alerts/scheduled-searches/create-email-alert",
576+
"/docs/alerts/scheduled-searches/receive-email-alerts": "/docs/alerts/scheduled-searches/create-email-alert",
576577
"/05Search/Search-Query-Language/Transaction-Analytics": "/docs/search/search-query-language/transaction-analytics",
577578
"/05Search/Search-Query-Language/Transaction-Analytics/Transaction-Operator": "/docs/search/search-query-language/transaction-analytics/transaction-operator",
578579
"/05Search/Search-Query-Language/Transaction-Analytics/Merge-Operator": "/docs/search/search-query-language/transaction-analytics/merge-operator",
@@ -1819,7 +1820,7 @@
18191820
"/cid/2049": "/docs/send-data/installed-collectors/sources/remote-file-source/prerequisites-windows-remote-file-collection",
18201821
"/cid/2050": "/docs/get-started",
18211822
"/cid/2057": "/docs/search/logcompare",
1822-
"/cid/2058": "/docs/alerts/scheduled-searches/run-search-from-alert-email",
1823+
"/cid/2058": "/docs/alerts/scheduled-searches/create-email-alert",
18231824
"/cid/2059": "/docs/search/get-started-with-search/search-basics/save-search",
18241825
"/cid/2060": "/docs/search/logcompare",
18251826
"/cid/2064": "/docs/search/search-cheat-sheets/general-search-examples",
@@ -3318,8 +3319,9 @@
33183319
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Create_a_Real_Time_Alert": "/docs/alerts/scheduled-searches/create-real-time-alert",
33193320
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Edit_or_Cancel_the_Schedule_for_a_Search": "/docs/alerts/scheduled-searches/edit-cancel",
33203321
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Generate_CSE_Signals_With_a_Scheduled_Search": "/docs/alerts/scheduled-searches/generate-cse-signals",
3321-
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Receive_Email_Alerts_from_Scheduled_Searches": "/docs/alerts/scheduled-searches/receive-email-alerts",
3322-
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Run_a_Search_from_an_Alert_Email": "/docs/alerts/scheduled-searches/run-search-from-alert-email",
3322+
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Receive_Email_Alerts_from_Scheduled_Searches": "/docs/alerts/scheduled-searches/create-email-alert",
3323+
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Run_a_Search_from_an_Alert_Email": "/docs/alerts/scheduled-searches/create-email-alert",
3324+
"/docs/alerts/scheduled-searches/run-search-from-alert-email": "/docs/alerts/scheduled-searches/create-email-alert",
33233325
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Save_to_Index": "/docs/alerts/scheduled-searches/save-to-index",
33243326
"/Visualizations-and-Alerts/Alerts/Scheduled-Searches/Schedule_a_Search": "/docs/alerts/scheduled-searches/schedule-search",
33253327
"/Visualizations-and-Alerts/Dashboard_(New)": "/docs/dashboards",

docs/alerts/monitors/create-monitor.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,17 @@ The first step when you create a new monitor is to set the trigger conditions.
6565
### Select monitor type and detection method
6666

6767
1. Select a **Monitor Type**: <br/><img src={useBaseUrl('img/monitors/trigger-conditions-monitor.png')} alt="Monitor types" width="250"/>
68-
* **Logs**. Creates alerts based on a [log search](/docs/search/).
68+
* **Logs**. Creates alerts based on a [log search](/docs/search/).
6969
* **Metrics**. Creates alerts based on [metrics queries](/docs/metrics/metrics-queries/).
7070
* **SLO**. Creates alerts based on a [Service Level Objectives (SLO)](/docs/observability/reliability-management-slo/).
71-
1. Select a **Detection Method**. The methods available depend on whether you choose **Logs** or **Metrics** as the monitor type (there is no detection type for **SLO**): <br/><img src={useBaseUrl('img/monitors/monitor-detection-methods-for-logs.png')} alt="Logs detection methods" width="425"/> <br/><img src={useBaseUrl('img/monitors/monitor-detection-methods-for-metrics.png')} alt="Logs detection methods" width="425"/>
71+
1. Select a **Detection Method**. The methods available depend on whether you choose **Logs** or **Metrics** as the monitor type (there is no detection type for **SLO**): <br/><img src={useBaseUrl('img/monitors/monitor-detection-methods-for-logs.png')} alt="Logs detection methods" width="425"/> <br/><img src={useBaseUrl('img/monitors/monitor-detection-methods-for-metrics.png')} alt="Logs detection methods" width="425"/>
7272
* **Static** allows you to set specific threshold conditions. Use this detection method when you are alerting on KPIs that have well defined and constant thresholds for what's good and bad. For example, infrastructure metrics like CPU utilization, and memory.
73-
* **Anomaly** lets you uncover unusual behavior identified by anomaly detection. Sumo Logic applies machine learning techniques to detect anomalies and identify suspicious patterns of activity. It establishes baselines for normal behavior so you can receive alerts when deviations or unusual activities are detected. To automatically respond when an anomaly alert is triggered, see [Create an anomaly monitor that runs an automated playbook](/docs/alerts/monitors/use-playbooks-with-monitors/#create-an-anomaly-monitor-that-runs-an-automated-playbook).
73+
* **Anomaly** lets you uncover unusual behavior identified by anomaly detection, which applies machine learning techniques to detect anomalies and identifies suspicious patterns of activity. It works by establishing baselines for normal behavior so you can receive alerts when deviations or unusual activities are detected. When you create a monitor using this method, it establishes a baseline for normal signal behavior, leveraging historical data to minimize false positives. AI-driven alerting overcomes monitoring limitations through:
74+
* **Model-driven anomaly detection**. Utilizing historical data, ML models establish accurate baselines, eliminating guesswork and noise in alerts.
75+
* **AutoML**. The system self-tunes, including seasonality detection, minimizing user intervention for a simpler experience.
76+
* **User context**. Users set alert sensitivity and incident thresholds, adding context to anomaly detection to mitigate noise.
77+
* **One-click playbook assignment**. Monitors seamlessly [link to Automation Service playbooks](/docs/alerts/monitors/use-playbooks-with-monitors/#create-an-anomaly-monitor-that-runs-an-automated-playbook), expediting response without manual intervention.
78+
* **Auto-diagnosis and recovery**. Sumo Logic Automation Service automates diagnosis and resolution, closing the loop from alert to recovery.
7479
* **Outlier** lets you detect an unusual change or a spike in a time series of a key indicator. Use this detection method when you are alerting on KPIs that don't have well-defined constant thresholds for what's good and bad. You want the Monitor to automatically detect and alert on unusual changes or spikes on the alerting query. For example, application KPIs like page request, throughput, and latency. 
7580
1. If you chose the **Anomaly** detection method, choose **Use Outlier** if you want to trigger alerts on outlier direction rather than anomaly direction: <br/><img src={useBaseUrl('img/monitors/monitor-detector-types-for-anamoly.png')} alt="Use Outlier" width="600"/>
7681

@@ -95,7 +100,7 @@ Specify the **Trigger Type**. A Monitor can have one critical, warning, and mis
95100

96101
#### Logs Trigger Types
97102

98-
<img src={useBaseUrl('img/monitors/logs-monitors.png')} alt="icon" style={{border: '1px solid gray'}} width="600"/>
103+
<img src={useBaseUrl('img/monitors/logs-monitors.png')} alt="icon" style={{border: '1px solid gray'}} width="600"/>
99104

100105
Trigger alerts on:<br/>![trigger alerts on field.png](/img/monitors/trigger-alerts-field.png)
101106

@@ -145,14 +150,14 @@ For Metrics monitors, you can choose to recover based on a single data point bel
145150

146151
##### Anomaly detection method
147152

148-
**Logs Trigger Type: Critical**
153+
**Logs Trigger Type: Critical**
149154

150155
<img src={useBaseUrl('img/monitors/monitor-anomaly-logs.png')} alt="Monitor anomaly logs" style={{border: '1px solid gray'}} width="800" />
151156

152157
| Parameter | Description |
153158
|:--|:--|
154159
| Alert when anomaly count is at least ___ (max. ##) at any time within ___ | Enter the minimum number of anomalies to detect during the detection window before triggering an alert, and the duration of time to watch for anomalies (from 5 minutes to 24 hours). Ensure that the time period window is 5-10 times longer than the timeslice used in the log query. This setting helps you add context to anomaly detection. For example, if you know a particular signal is noisy, you may want to wait for a number of anomalous data points in the detection window before triggering an alert. If the time period is set to 5 minutes, and the minimum anomaly count is set to 1, then an alert is triggered if 1 anomaly appears within a 5-minute time period. |
155-
| Show me fewer alerts --- more alerts | Tune the number of anomalous data points detected per day compared to the predicted baseline for the detection window. Select more alerts if you do not want to miss out on most anomalies. |
160+
| Show me fewer alerts --- more alerts | Tune the number of anomalous data points detected per day compared to the predicted baseline for the detection window. Select more alerts if you do not want to miss out on most anomalies. |
156161

157162
##### Use Outlier with Anomaly detection
158163

@@ -324,12 +329,12 @@ The fourth step when you create a new monitor is to add playbooks.
324329

325330
<img src={useBaseUrl('img/monitors/new-monitor-playbook.png')} alt="Playbook" style={{border: '1px solid gray'}} width="800"/>
326331

327-
In this step, you can add a **Playbook** to run in response to an alert.
332+
In this step, you can add a **Playbook** to run in response to an alert.
328333

329334
1. **Text Playbook**. Enter instructions for how to handle the alerts resulting from the monitor. This allows admins to codify tribal knowledge for an on-call so that they know what to do upon receiving an alert. Markdown is supported. For an example, see [Alert details](/docs/alerts/monitors/alert-response/#alert-details).
330335
1. **Automated Playbooks**. Select an existing playbook from the Automation Service to run when an alert is fired. For more information, see [Automated Playbooks in Monitors](/docs/alerts/monitors/use-playbooks-with-monitors/).
331336
1. **Add Playbook**. If desired, you can add more automated playbooks to run sequentially.
332-
1. Click **Manage Playbooks** to manage the automated playbooks in the Automation Service.
337+
1. Click **Manage Playbooks** to manage the automated playbooks in the Automation Service.
333338

334339
## Step 5: Monitor details
335340

@@ -341,7 +346,7 @@ Monitor details" style={{border: '1px solid gray'}} width="800"/>
341346
1. Enter a **Monitor Name** and the **Location** where you want to save it.
342347
1. (Optional) Add one or more **Tags**. [Learn more here](/docs/alerts/monitors/settings#tags).
343348
1. (Optional) Add a **Description**.
344-
1. When you're done creating the monitor, click **Save**.
349+
1. When you're done creating the monitor, click **Save**.
345350

346351
## Other Configurations
347352

docs/alerts/monitors/overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ import Tabs from '@theme/Tabs';
99
import TabItem from '@theme/TabItem';
1010
import useBaseUrl from '@docusaurus/useBaseUrl';
1111

12-
<img src={useBaseUrl('img/icons/operations/monitor-and-visualize.png')} alt="icon" width="45"/>
13-
1412
Monitors track your metrics and logs data in real time and send notifications when noteworthy changes happen in your production applications.
1513

1614
:::note

0 commit comments

Comments
 (0)