diff --git a/blog-service/2023/12-31.md b/blog-service/2023/12-31.md
index 056ad3d3e3..7d919fc02f 100644
--- a/blog-service/2023/12-31.md
+++ b/blog-service/2023/12-31.md
@@ -758,7 +758,7 @@ We're excited to announce the release of our new cloud-to-cloud source for Trell
We’re happy to announce a new security option allowing administrators to set a custom policy for the number of days an API Access Key can go unused before being automatically deactivated. This setting allows administrators to tailor the feature to suit their organization’s specific security requirements. This enhances the security of your account by reducing the risk of unauthorized access through abandoned access keys. This ensures that only active access keys can be used to access your account and its resources.
-[Learn more](/docs/manage/security/access-keys#edit-deactivate-or-delete-an-access-key).
+[Learn more](/docs/manage/security/access-keys#access-keys-deactivation-policy).
---
diff --git a/blog-service/2025-01-16-manage.md b/blog-service/2025-01-16-manage.md
new file mode 100644
index 0000000000..3a5d7ed81e
--- /dev/null
+++ b/blog-service/2025-01-16-manage.md
@@ -0,0 +1,32 @@
+---
+title: Access Keys Enhancements (Manage)
+image: https://help.sumologic.com/img/sumo-square.png
+keywords:
+ - access keys
+ - manage
+hide_table_of_contents: true
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+
+We're excited to announce enhancements to how you create and manage access keys.
+
+### Personal Access Keys
+
+The **My Access Keys** section has been moved out of **Preferences** to its own tab and renamed **Personal Access Keys**.
+
+
+
+To open the Personal Access Keys tab:
+* [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select your username and then **Preferences > Personal Access Keys**.
+* [**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select your username, and then under **Preferences** select **Personal Access Keys**. You can also click the **Go To...** menu at the top of the screen and select **Personal Access Keys**.
+
+### Scopes
+
+You can now create permission scopes for access keys. Scopes limit the API endpoints an access key can be used to call. This allows you to specify only the permissions the access key needs to accomplish a specific task, making the key more secure.
+
+[Learn more](/docs/manage/security/access-keys).
+
+
diff --git a/docs/cse/integrations/insight-enrichment-server.md b/docs/cse/integrations/insight-enrichment-server.md
index f3136e811c..e3e9aa429f 100644
--- a/docs/cse/integrations/insight-enrichment-server.md
+++ b/docs/cse/integrations/insight-enrichment-server.md
@@ -151,7 +151,7 @@ The following parameters control general server behaviors, as opposed to enrichm
| Setting | Required? | Description |
|:--|:--|:--|
| `URL` | yes | The URL for your API endpoint. For more information, see [Sumo Logic API Authentication, Endpoints, and Security](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security). |
-| `api_id` | yes | Enter your Sumo Logic Access ID. For more information, see [Manage your access keys on Preferences page](/docs/manage/security/access-keys#from-the-preferences-page). |
+| `api_id` | yes | Enter your Sumo Logic Access ID. For more information, see [Access Keys](/docs/manage/security/access-keys). |
| `api_key` | yes | Enter your Sumo Logic Access Key.|
| `log_level` | no | Log level the server should use. The options are:
-`error`. Only display error messages.
-`info`. Display informational messages. This is the recommended value.
-`debug`. Displays debug (or trace) data. Recommended only when debugging.
Default: `info` |
| `poll_interval` | no | How often the Insight Enrichment Server should check for new insights. You can specify the interval in seconds (s), minutes (m), or hours (h).
Default: 10s |
diff --git a/docs/cse/integrations/security-incident-response-integration.md b/docs/cse/integrations/security-incident-response-integration.md
index 48cf61642e..c0b4491b71 100644
--- a/docs/cse/integrations/security-incident-response-integration.md
+++ b/docs/cse/integrations/security-incident-response-integration.md
@@ -36,7 +36,7 @@ Your Cloud SIEM role must allow you to use API keys and to retrieve and modify i
In this step, you make a copy of your API credentials, which you'll need to supply when you install the SIR-Cloud SIEM integration in [Step 5](#step-5-install-the-sir-cloud-siem-integration) below.
-You’ll need to supply a Sumo Logic Access ID and Access Key. If necessary, you can create those on your **Preferences** page in the Sumo Logic UI. For more information, see [Create an access key on Preferences page](/docs/manage/security/access-keys#from-the-preferences-page).
+You’ll need to supply a Sumo Logic Access ID and Access Key. If necessary, you can create those in the Sumo Logic UI. For more information, see [Access Keys](/docs/manage/security/access-keys).
## Step 2: Install ServiceNow plugins
diff --git a/docs/get-started/account-settings-preferences.md b/docs/get-started/account-settings-preferences.md
index 9695463169..ead23d4e83 100644
--- a/docs/get-started/account-settings-preferences.md
+++ b/docs/get-started/account-settings-preferences.md
@@ -66,10 +66,6 @@ To set up 2-Step Verification, you will need to install a Time-Based One-Time Pa
1. Scan the QR code displayed on your screen with your TOTP App.
1. After the TOTP App is configured, enter two consecutive authentication codes.
-## My Access Keys
-
-In Sumo Logic, you'll need an access key to register new Collectors and use Sumo Logic APIs. If you have a role that grants the **Create Access Keys** capability, you can create and manage your own Access Keys. For more information, see [Access Keys](/docs/manage/security/access-keys).
-
## My Preferences
Preference settings are only changed for your personal account; they do not affect any other users in your organization. Any changes you make to your preferences take effect the next time you sign in, not during the current session.
diff --git a/docs/get-started/index.md b/docs/get-started/index.md
index 4bfb917f3c..074a386150 100644
--- a/docs/get-started/index.md
+++ b/docs/get-started/index.md
@@ -44,7 +44,7 @@ Let's get started!
Account settings, access keys, and credentials.
+Account settings and credentials.
1. In the Preferences page, you can modify the following settings:
* **My Profile**. Username and password.
- * **My Access Keys**. Add, edit, and remove access keys.
* **My Preferences**. Your account session settings.
For more information, see [Account Preferences and Credentials](account-settings-preferences.md).
diff --git a/docs/integrations/amazon-aws/global-intelligence-guardduty.md b/docs/integrations/amazon-aws/global-intelligence-guardduty.md
index 2c41adcde3..f01eba8158 100644
--- a/docs/integrations/amazon-aws/global-intelligence-guardduty.md
+++ b/docs/integrations/amazon-aws/global-intelligence-guardduty.md
@@ -155,7 +155,7 @@ These tasks require the Manage Collectors and Manage Access Keys [role capabilit
In this step, you need to generate access key and access ID from the Sumo Logic console. To generate an access key and access ID, do the following:
-1. Follow the instructions as described in this [Sumo Logic Access Key](/docs/manage/security/access-keys#create-an-access-key)) document.
+1. Follow the instructions as described in [Access Keys](/docs/manage/security/access-keys).
2. Copy down both the values as you’ll need them to deploy the Sumo Logic GuardDuty Benchmark SAM App.
diff --git a/docs/integrations/amazon-aws/guardduty-benchmark.md b/docs/integrations/amazon-aws/guardduty-benchmark.md
index fe5bcc5e83..91def3c000 100644
--- a/docs/integrations/amazon-aws/guardduty-benchmark.md
+++ b/docs/integrations/amazon-aws/guardduty-benchmark.md
@@ -54,7 +54,7 @@ This section shows you how to generate an access key and access ID for log colle
In this step, you need to generate access key and access ID from the Sumo Logic console.
To generate an access key and access ID, do the following:
-1. Follow the instructions as described in this [Sumo Logic Access Key](/docs/manage/security/access-keys#create-an-access-key)) document.
+1. Follow the instructions as described in [Access Keys](/docs/manage/security/access-keys#create-an-access-key).
2. Copy down both the values as you’ll need them to deploy the Sumo Logic GuardDuty Benchmark SAM App.
diff --git a/docs/integrations/app-development/jfrog-xray.md b/docs/integrations/app-development/jfrog-xray.md
index 29b643146c..94e15270ae 100644
--- a/docs/integrations/app-development/jfrog-xray.md
+++ b/docs/integrations/app-development/jfrog-xray.md
@@ -129,7 +129,7 @@ When you configure the HTTP source, make sure to save the HTTP Source Address UR
To add a hosted collector and HTTP source:
1. Create a new Sumo Logic hosted collector by performing the steps in [Configure a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
-2. Create a new HTTP source on the hosted collector created above by following [these instructions](/docs/send-data/hosted-collectors/http-source/logs-metrics).
+2. Create a new HTTP source on the hosted collector created above by following instructions in [HTTP Logs and Metrics Source]](/docs/send-data/hosted-collectors/http-source/logs-metrics).
### Step 5: Set up a collection method for JFrog Xray
diff --git a/docs/integrations/containers-orchestration/activemq.md b/docs/integrations/containers-orchestration/activemq.md
index 873080fc8c..9e81898cc8 100644
--- a/docs/integrations/containers-orchestration/activemq.md
+++ b/docs/integrations/containers-orchestration/activemq.md
@@ -484,7 +484,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method 2: Install the alerts using a Terraform script
-1. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). To find out which deployment your Sumo Logic account is in, see [Sumo Logic endpoints](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). To find out which deployment your Sumo Logic account is in, see [Sumo Logic endpoints](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
3. Download the Sumo Logic Terraform package for ActiveMQ alerts: The alerts package is available in the Sumo Logic github[ repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/ActiveMQ). You can either download it through the “git clone” command or as a zip file.
4. Alert Configuration: After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/ActiveMQ/`.
@@ -555,10 +555,10 @@ Locate and install the app you need from the **App Catalog**. If you want to see
1. From the **App Catalog**, search for and select the app.
2. Select the version of the service you're using and click **Add to Library**.
3. To install the app, complete the following fields.
- 1. **App Name.** You can retain the existing name, or enter a name of your choice for the app.
+ 1. **App Name.** You can retain the existing name, or enter a name of your choice for the app.
2. **Data Source.** Choose **Enter a Custom Data Filter** and enter a custom ActiveMQ cluster filter. Examples:
* For all ActiveMQ clusters: `messaging_cluster=*`
- * For a specific cluster: `messaging_cluster=activemq.dev.01`.
+ * For a specific cluster: `messaging_cluster=activemq.dev.01`.
* Clusters within a specific environment: `messaging_cluster=activemq-1` and `environment=prod` (This assumes you have set the optional environment tag while configuring collection).
4. **Advanced**. Select the **Location in Library** (the default is the Personal folder in the library), or click **New Folder** to add a new folder.
5. Click **Add to Library**.
diff --git a/docs/integrations/containers-orchestration/docker-community-edition.md b/docs/integrations/containers-orchestration/docker-community-edition.md
index 6739771d99..be9e6ebfd1 100644
--- a/docs/integrations/containers-orchestration/docker-community-edition.md
+++ b/docs/integrations/containers-orchestration/docker-community-edition.md
@@ -307,8 +307,8 @@ In collector version 19.216-22 and later, when you configure the sourceCategory
You build templates for sourceCategory and sourceHost specifying component variables in this form: `{{NAMESPACE.VAR_NAME}}`.
Where:
-* `NAMESPACE` is a namespace that indicates the variable type.
-* `VAR_NAME` is the variable name.
These are case-sensitive.
+* `NAMESPACE` is a namespace that indicates the variable type.
+* `VAR_NAME` is the variable name. These are case-sensitive.
The table below defines the types of variables you can use.
diff --git a/docs/integrations/containers-orchestration/kafka.md b/docs/integrations/containers-orchestration/kafka.md
index 61ed4e3225..49aa1b000c 100644
--- a/docs/integrations/containers-orchestration/kafka.md
+++ b/docs/integrations/containers-orchestration/kafka.md
@@ -418,7 +418,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in using [this link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in using [this link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
3. Download the Sumo Logic Terraform package for Kafka alerts. The alerts package is available in the Sumo Logic [GitHub repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Kafka). You can either download it through the “git clone” command or as a zip file.
4. Alert Configuration. After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/Kafka`.
@@ -489,10 +489,10 @@ Locate and install the app you need from the **App Catalog**. If you want to see
Version selection is not available for all apps.
:::
3. To install the app, complete the following fields.
- * **App Name.** You can retain the existing name, or enter a name of your choice for the app.
+ * **App Name.** You can retain the existing name, or enter a name of your choice for the app.
* **Data Source.** Choose **Enter a Custom Data Filter**, and enter a custom Kafka cluster filter. Examples:
* For all Kafka clusters `messaging_cluster=*`
- * For a specific cluster: `messaging_cluster=Kafka.dev.01`.
+ * For a specific cluster: `messaging_cluster=Kafka.dev.01`.
* Clusters within a specific environment: `messaging_cluster=Kafka-1 and environment=prod`. This assumes you have set the optional environment tag while configuring collection.
4. **Advanced**. Select the **Location in Library** (the default is the Personal folder in the library), or click **New Folder** to add a new folder.
5. Click **Add to Library**.
diff --git a/docs/integrations/containers-orchestration/kubernetes.md b/docs/integrations/containers-orchestration/kubernetes.md
index 22c4234b09..da2af7a056 100644
--- a/docs/integrations/containers-orchestration/kubernetes.md
+++ b/docs/integrations/containers-orchestration/kubernetes.md
@@ -123,7 +123,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability in Sumo Logic using [these instructions](/docs/manage/security/access-keys). There, you'll need to identify which deployment your Sumo Logic account is in ([learn more](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security)).
+1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). There, you'll need to identify which deployment your Sumo Logic account is in ([learn more](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security)).
1. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
1. Download the Sumo Logic Terraform package for Kubernetes alerts. The alerts package is available in the [Sumo Logic GitHub repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/kubernetes). You can either download it through the `git clone` command or as a zip file.
1. **Alert Configuration**. After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/kubernetes/`.
diff --git a/docs/integrations/containers-orchestration/rabbitmq.md b/docs/integrations/containers-orchestration/rabbitmq.md
index 0b8d728b30..a53acbcc89 100644
--- a/docs/integrations/containers-orchestration/rabbitmq.md
+++ b/docs/integrations/containers-orchestration/rabbitmq.md
@@ -389,7 +389,7 @@ There are limits to how many alerts can be enabled. For more information, see [M
#### Method B: Install Monitors using a Terraform script
-1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later, and install it.
3. Download the Sumo Logic Terraform package for MySQL monitors: The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/mysql). You can either download it using the git clone command or as a zip file.
4. Alert Configuration: After extracting the package, navigate to the terraform-sumologic-sumo-logic-monitor/monitor_packages/RabbitMQ/ directory.
diff --git a/docs/integrations/databases/cassandra.md b/docs/integrations/databases/cassandra.md
index b940eb2fe8..1dd12df004 100644
--- a/docs/integrations/databases/cassandra.md
+++ b/docs/integrations/databases/cassandra.md
@@ -551,7 +551,7 @@ There are limits to how many alerts can be enabled. For more information, see [M
### Method B: Using a Terraform script
-1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later and install it.
3. Download the Sumo Logic Terraform package for Cassandra monitors. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Memcached). You can either download it using the git clone command or as a zip file.
4. Alert Configuration. After extracting the package, navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/Cassandra/` directory.
diff --git a/docs/integrations/databases/couchbase.md b/docs/integrations/databases/couchbase.md
index 8e1b832081..16a8ae1b30 100644
--- a/docs/integrations/databases/couchbase.md
+++ b/docs/integrations/databases/couchbase.md
@@ -233,7 +233,7 @@ The process to set up collection for Couchbase data is done through the followin
The Sumo Logic Couchbase app supports the audit log, query log, error log, access log. For details, [refer to Couchbase logging documentation](https://docs.couchbase.com/server/current/manage/manage-logging/manage-logging.html#changing-log-file-locations).
-1. **Configure logging in Couchbase**. By default, the Couchbase will write the log to the log directory that was configured during installation. For example, on Linux, the log directory would be `/opt/couchbase/var/lib/couchbase/logs`. By default, the Audit log is disabled, you must enable the audit log following these [instructions](https://docs.couchbase.com/server/current/manage/manage-security/manage-auditing.html). Query log, error log, the access log will be enabled by default.
+1. **Configure logging in Couchbase**. By default, the Couchbase will write the log to the log directory that was configured during installation. For example, on Linux, the log directory would be `/opt/couchbase/var/lib/couchbase/logs`. By default, the Audit log is disabled, you must enable the audit log following [these instructions](https://docs.couchbase.com/server/current/manage/manage-security/manage-auditing.html). Query log, error log, the access log will be enabled by default.
2. **Configure a Collector**. Use one of the following Sumo Logic Collector options:
1. To collect logs directly from the Couchbase machine, configure an [Installed Collector](/docs/send-data/installed-collectors).
2. If you're using a service like Fluentd, or you would like to upload your logs manually, configure a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
@@ -408,7 +408,7 @@ There are limits to how many alerts can be enabled - see the [Alerts FAQ](/docs/
### Method B: Using a Terraform script method
-1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using [these instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. **[Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later**.
3. **Download the Sumo Logic Terraform package for Couchbase alerts**. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/SquidProxy). You can either download it through the “git clone” command or as a zip file.
4. **Alert Configuration**. After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/Couchbase/`
diff --git a/docs/integrations/databases/elasticsearch.md b/docs/integrations/databases/elasticsearch.md
index ee9213ecf6..593dec59a2 100644
--- a/docs/integrations/databases/elasticsearch.md
+++ b/docs/integrations/databases/elasticsearch.md
@@ -389,7 +389,7 @@ To install these monitors, you must have the **Manage Monitors** role capability
### Method 2: Using a Terraform script
-1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later, and install it.
3. Download the Sumo Logic Terraform package for Elasticsearch monitors. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Elasticsearch). You can either download it using the git clone command or as a zip file.
4. Alert Configuration. After extracting the package, navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/Elasticsearch/` directory.
diff --git a/docs/integrations/databases/mariadb.md b/docs/integrations/databases/mariadb.md
index eb266c11a0..9abb1c08ff 100644
--- a/docs/integrations/databases/mariadb.md
+++ b/docs/integrations/databases/mariadb.md
@@ -455,7 +455,7 @@ Sumo Logic has provided out-of-the-box alerts available through [Sumo Logic moni
### Method B: Using a Terraform script
-1. **Generate a Sumo Logic access key and ID.** Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security)
+1. **Generate a Sumo Logic access key and ID.** Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security)
2. **[Download and install Terraform 0.13](https://www.terraform.io/downloads.html)** or later.
3. **Download the Sumo Logic Terraform package for MariaDB alerts.** The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/MariaDB). You can either download it through the “git clone” command or as a zip file.
4. **Alert Configuration.** After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/MariaDB/`. Edit the **MariaDB.auto.tfvars** file and add the Sumo Logic Access Key, Access Id, and Deployment from Step 1.
diff --git a/docs/integrations/databases/memcached.md b/docs/integrations/databases/memcached.md
index 8942032c21..f2c984678f 100644
--- a/docs/integrations/databases/memcached.md
+++ b/docs/integrations/databases/memcached.md
@@ -381,7 +381,7 @@ There are limits to how many alerts can be enabled. For more information, see [M
### Method B: Using a Terraform script
-1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later, and install.
3. Download the Sumo Logic Terraform package for Memcached monitors. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Memcached). You can either download it using the git clone command or as a zip file.
4. Alert Configuration. After extracting the package, navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/Memcached/` directory.
diff --git a/docs/integrations/databases/mongodb.md b/docs/integrations/databases/mongodb.md
index a05f932a58..233b3da29d 100644
--- a/docs/integrations/databases/mongodb.md
+++ b/docs/integrations/databases/mongodb.md
@@ -435,7 +435,7 @@ There are limits to how many alerts can be enabled. For more information, see [M
### Method B: Using a Terraform script
-1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later, and install it.
3. Download the Sumo Logic Terraform package for MongoDB monitors. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/MongoDB). You can either download it using the `git clone` command or as a zip file.
4. Alert Configuration. After extracting the package , navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/MongoDB/` directory. Edit the `MongoDB.auto.tfvars` file and add the Sumo Logic Access Key and Access ID from Step 1 and your Sumo Logic deployment. If you're not sure of your deployment, see [Sumo Logic Endpoints and Firewall Security](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
diff --git a/docs/integrations/databases/mysql.md b/docs/integrations/databases/mysql.md
index edfdadf2e6..9be203eb30 100644
--- a/docs/integrations/databases/mysql.md
+++ b/docs/integrations/databases/mysql.md
@@ -583,7 +583,7 @@ There are limits to how many alerts can be enabled. For more information, see [M
### Method B: Using a Terraform script
-1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later, and install it.
3. Download the Sumo Logic Terraform package for MySQL monitors. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/mysql). You can either download it using the `git clone` command or as a zip file.
4. Alert Configuration: After extracting the package, navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/mysql/` directory.
diff --git a/docs/integrations/databases/opentelemetry/couchbase-opentelemetry.md b/docs/integrations/databases/opentelemetry/couchbase-opentelemetry.md
index a4d27a7cf3..8d8e559810 100644
--- a/docs/integrations/databases/opentelemetry/couchbase-opentelemetry.md
+++ b/docs/integrations/databases/opentelemetry/couchbase-opentelemetry.md
@@ -32,7 +32,7 @@ Following are the [Fields](/docs/manage/fields/) which will be created as part o
## Prerequisite
-By default, the Couchbase will write the log to the log directory that was configured during installation. For example, on Linux, the log directory would be `/opt/couchbase/var/lib/couchbase/logs`. By default, the Audit log is disabled, you must enable the audit log following these [instructions](https://docs.couchbase.com/server/current/manage/manage-security/manage-auditing.html). Query log, error log, the access log will be enabled by default.
+By default, the Couchbase will write the log to the log directory that was configured during installation. For example, on Linux, the log directory would be `/opt/couchbase/var/lib/couchbase/logs`. By default, the Audit log is disabled, you must enable the audit log following [these instructions](https://docs.couchbase.com/server/current/manage/manage-security/manage-auditing.html). Query log, error log, the access log will be enabled by default.
import LogsCollectionPrereqisites from '../../../reuse/apps/logs-collection-prereqisites.md';
diff --git a/docs/integrations/databases/oracle.md b/docs/integrations/databases/oracle.md
index 79f50370eb..ee930d0487 100644
--- a/docs/integrations/databases/oracle.md
+++ b/docs/integrations/databases/oracle.md
@@ -499,7 +499,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. **[Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later**.
3. **Download the Sumo Logic Terraform package for Oracle alerts**. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Oracle). You can either download it through the “git clone” command or as a zip file.
4. **Alert Configuration**. After the package has been extracted, navigate to the package directory **terraform-sumologic-sumo-logic-monitor/monitor_packages/Oracle/**. Edit the **Oracle.auto.tfvars** file and add the Sumo Logic Access Key, Access Id and Deployment from Step 1.
diff --git a/docs/integrations/databases/postgresql.md b/docs/integrations/databases/postgresql.md
index 17f24e0723..d3b8a7001e 100644
--- a/docs/integrations/databases/postgresql.md
+++ b/docs/integrations/databases/postgresql.md
@@ -428,7 +428,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. Generate a Sumo Logic access key and ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Please identify which deployment your Sumo Logic account is in, using this [ link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate a Sumo Logic access key and ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Please identify which deployment your Sumo Logic account is in, using this [ link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
3. Download the Sumo Logic Terraform package for PostgreSQL alerts: The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/postgresql). You can either download it through the “git clone” command or as a zip file.
4. Alert Configuration: After the package has been extracted, navigate to the package directory terraform-sumologic-sumo-logic-monitor/monitor_packages/**postgresql**/
diff --git a/docs/integrations/databases/redis.md b/docs/integrations/databases/redis.md
index 3933ea3880..0384642472 100644
--- a/docs/integrations/databases/redis.md
+++ b/docs/integrations/databases/redis.md
@@ -464,9 +464,9 @@ Monitors are disabled by default. Once you have installed the alerts via this me
### Method B: Using a Terraform script
-1. Generate a Sumo Logic access key and ID for a user that has the Manage Monitors role capability in Sumo Logic using[ these](/docs/manage/security/access-keys#from-the-preferences-page) instructions. Please identify which deployment your Sumo Logic account is in,[ using](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security) this link.
+1. Generate a Sumo Logic access key and ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Please identify which deployment your Sumo Logic account is in, using [this link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
-3. Download the Sumo Logic Terraform package for Redis alerts. The alerts package is available in the Sumo Logic github[ repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/redis). You can either download it via the “git clone” command or as a zip file.
+3. Download the Sumo Logic Terraform package for Redis alerts. The alerts package is available in the Sumo Logic github [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/redis). You can either download it via the “git clone” command or as a zip file.
4. Monitor Configuration. After the package has been extracted, navigate to the package directory terraform-sumologic-sumo-logic-monitor/monitor_packages/**redis**/
Edit the redis.auto.tfvars file and add the Sumo Logic Access Key, Access Id and Deployment from Step 1.
diff --git a/docs/integrations/hosts-operating-systems/host-process-metrics.md b/docs/integrations/hosts-operating-systems/host-process-metrics.md
index 6c55a5a72b..7386b7b715 100644
--- a/docs/integrations/hosts-operating-systems/host-process-metrics.md
+++ b/docs/integrations/hosts-operating-systems/host-process-metrics.md
@@ -199,7 +199,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using [these instructions](/docs/manage/security/access-keys#from-the-preferences-page). Please identify which deployment your Sumo Logic account is in, using [this link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Please identify which deployment your Sumo Logic account is in, using [this link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
1. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
1. **Download the Sumo Logic Terraform package for Host and Process alerts**. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/postgresql). You can either download it through the “git clone” command or as a zip file.
1. **Alert Configuration**. After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/host_process_metrics/`. Edit the `host_and_processes.auto.tfvars` file and add the Sumo Logic Access Key, Access Id, and Deployment from Step 1.
diff --git a/docs/integrations/microsoft-azure/sql-server.md b/docs/integrations/microsoft-azure/sql-server.md
index ac8ea155ba..85c082de31 100644
--- a/docs/integrations/microsoft-azure/sql-server.md
+++ b/docs/integrations/microsoft-azure/sql-server.md
@@ -451,7 +451,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
**Step 1: Generate a Sumo Logic access key and ID**
-Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Please identify which deployment your Sumo Logic account is in, using this [ link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Please identify which deployment your Sumo Logic account is in, using this [ link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
**Step 2: [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later**
diff --git a/docs/integrations/web-servers/apache-tomcat.md b/docs/integrations/web-servers/apache-tomcat.md
index 86d5ec8f09..6802fb25a0 100644
--- a/docs/integrations/web-servers/apache-tomcat.md
+++ b/docs/integrations/web-servers/apache-tomcat.md
@@ -625,7 +625,7 @@ Custom filter examples:
Step 1: Generate a Sumo Logic access key and ID
-Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys).
Step 2: Download and install Terraform
@@ -737,11 +737,11 @@ Locate and install the app you need from the **App Catalog**. If you want to see
Version selection is not available for all apps.
:::
3. To install the app, complete the following fields.
- 1. **App Name.** You can retain the existing name, or enter a name of your choice for the app.
+ 1. **App Name.** You can retain the existing name, or enter a name of your choice for the app.
2. **Data Source.**
* Choose **Enter a Custom Data Filter**, and enter a custom filter for Apache Tomcat webserver farm. Examples:
* For all Apache Tomcat webserver farms webserver_farm=*
- * For a specific webserver farms: webserver_farm=tomcat.dev.01.
+ * For a specific webserver farms: webserver_farm=tomcat.dev.01.
* Clusters within a specific environment: `webserver_farm=tomcat-1 and environment=prod`. (This assumes you have set the optional environment tag while configuring collection)
4. **Advanced**. Select the **Location in Library** (the default is the Personal folder in the library), or click **New Folder** to add a new folder.
5. Click **Add to Library**.
diff --git a/docs/integrations/web-servers/apache.md b/docs/integrations/web-servers/apache.md
index 7915977f60..aa143f44dc 100644
--- a/docs/integrations/web-servers/apache.md
+++ b/docs/integrations/web-servers/apache.md
@@ -465,7 +465,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Please identify which deployment your Sumo Logic account is in, using this[ link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Please identify which deployment your Sumo Logic account is in, using this[ link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
3. Download the Sumo Logic Terraform package for Apache alerts. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/apache). You can either download it through the “git clone” command or as a zip file.
4. Alert Configuration. After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/apache/`.
diff --git a/docs/integrations/web-servers/haproxy.md b/docs/integrations/web-servers/haproxy.md
index 23b1555f19..f9042e3b41 100644
--- a/docs/integrations/web-servers/haproxy.md
+++ b/docs/integrations/web-servers/haproxy.md
@@ -455,7 +455,7 @@ However, if you would like to restrict these alerts to specific clusters or envi
### Method 2: Use a Terraform script
-1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate an access key and access ID for a user that has the **Manage Monitors** role capability. For instructions see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later, and install it.
3. Download the Sumo Logic Terraform package for HAProxy monitors. The alerts package is available in the [Sumo Logic GitHub repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages). You can either download it using the git clone command or as a zip file.
4. Alert Configuration. After extracting the package, navigate to the terraform-sumologic-sumo-logic-monitor/monitor_packages/haproxy/ directory. Edit the haproxy.auto.tfvars file and add the Sumo Logic Access Key and Access ID from Step 1 and your Sumo Logic deployment. If you're not sure of your deployment, see [Sumo Logic Endpoints and Firewall Security](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
diff --git a/docs/integrations/web-servers/iis-10.md b/docs/integrations/web-servers/iis-10.md
index 9705cacd33..7d8ed520d4 100644
--- a/docs/integrations/web-servers/iis-10.md
+++ b/docs/integrations/web-servers/iis-10.md
@@ -436,7 +436,7 @@ Monitors are disabled by default. Once you have installed the alerts using this
### Method B: Using a Terraform script
-1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. **Generate a Sumo Logic access key and ID**. Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. **Download and install Terraform**. You'll need to [download and install Terraform](https://www.terraform.io/downloads.html), version 0.13 or later.
3. **Download the Sumo Logic Terraform package for IIS Server alerts**. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/IIS). You can either download it through the “git clone” command or as a zip file.
4. **Alert Configuration**. After the package has been extracted, navigate to the package directory **terraform-sumologic-sumo-logic-monitor/monitor_packages/IIS/**.
diff --git a/docs/integrations/web-servers/nginx-ingress.md b/docs/integrations/web-servers/nginx-ingress.md
index 87c6e34104..527cb3ecf0 100644
--- a/docs/integrations/web-servers/nginx-ingress.md
+++ b/docs/integrations/web-servers/nginx-ingress.md
@@ -115,7 +115,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. Generate a Sumo Logic access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate a Sumo Logic access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
3. Download the Sumo Logic Terraform package for Nginx Ingress alerts: The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Nginx%20Ingress). You can either download it through the “git clone” command or as a zip file.
4. Alert Configuration: After the package has been extracted, navigate to the package directory terraform-sumologic-sumo-logic-monitor/monitor_packages/Nginx Ingress.
diff --git a/docs/integrations/web-servers/nginx-plus-ingress.md b/docs/integrations/web-servers/nginx-plus-ingress.md
index c6dd8fa3c3..e16f834ec5 100644
--- a/docs/integrations/web-servers/nginx-plus-ingress.md
+++ b/docs/integrations/web-servers/nginx-plus-ingress.md
@@ -133,7 +133,7 @@ The monitors are disabled by default. Once you have installed the alerts via thi
### Method B: Using a Terraform script
-1. Generate a Sumo Logic [access key](/docs/manage/security/access-keys#from-the-preferences-page) and access ID for a user that has the[ Manage Monitors](/docs/manage/users-roles/roles/role-capabilities) role capability in Sumo Logic using these instructions. Please identify your Sumo Logic[ deployment](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate a Sumo Logic [access key](/docs/manage/security/access-keys) and access ID for a user that has the[ Manage Monitors](/docs/manage/users-roles/roles/role-capabilities) role capability in Sumo Logic using these instructions. Please identify your Sumo Logic[ deployment](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
3. Download the Sumo Logic Terraform package for Nginx Ingress alerts: The alerts package is available in the [Sumo Logic GitHub repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/nginx-plus-ingress). You can either download it via the `git clone` command or as a zip file.
4. Alert Configuration: After the package has been extracted, navigate to the package directory **terraform-sumologic-sumo-logic-monitor/monitor_packages/nginx-plus-ingress/**. Edit the **nginxplusingress.auto.tfvars** file as per below instructions:
diff --git a/docs/integrations/web-servers/nginx-plus.md b/docs/integrations/web-servers/nginx-plus.md
index 7a8b198cef..f8ed279270 100644
--- a/docs/integrations/web-servers/nginx-plus.md
+++ b/docs/integrations/web-servers/nginx-plus.md
@@ -311,7 +311,7 @@ The monitors are disabled by default. Once you have installed the alerts via thi
### Method B: Using a Terraform script
-1. Generate a Sumo Logic [access key](/docs/manage/security/access-keys#from-the-preferences-page) and access ID for a user that has the [Manage Monitors](/docs/manage/users-roles/roles/role-capabilities) role capability in Sumo Logic using these instructions. Please identify your Sumo Logic [deployment](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate a Sumo Logic [access key](/docs/manage/security/access-keys) and access ID for a user that has the [Manage Monitors](/docs/manage/users-roles/roles/role-capabilities) role capability in Sumo Logic using these instructions. Please identify your Sumo Logic [deployment](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later
3. Download the Sumo Logic Terraform package for Nginx Plus alerts. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/nginx-plus). You can either download it via the “git clone” command or as a zip file.
4. Alert Configuration: After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/nginx-plus/`. Edit the **nginxplus.auto.tfvars** file as per the below instructions:
diff --git a/docs/integrations/web-servers/nginx.md b/docs/integrations/web-servers/nginx.md
index 6f9dc59059..fb3f092cc1 100644
--- a/docs/integrations/web-servers/nginx.md
+++ b/docs/integrations/web-servers/nginx.md
@@ -405,7 +405,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method B: Using a Terraform script
-1. **Generate a Sumo Logic access key and ID** Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these[ instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. **Generate a Sumo Logic access key and ID** Generate an access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. **[Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later**
3. **Download the Sumo Logic Terraform package for Nginx alerts** The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Nginx). You can either download it through the “git clone” command or as a zip file.
4. **Alert Configuration** After the package has been extracted, navigate to the package directory `terraform-sumologic-sumo-logic-monitor/monitor_packages/Nginx/`.
diff --git a/docs/integrations/web-servers/squid-proxy.md b/docs/integrations/web-servers/squid-proxy.md
index 184be9c9ab..a7ccdd5e28 100644
--- a/docs/integrations/web-servers/squid-proxy.md
+++ b/docs/integrations/web-servers/squid-proxy.md
@@ -359,7 +359,7 @@ The process to set up collection for Squid Proxy data is done through the follow
Squid Proxy app supports the default access logs and cache logs format.
-1. **Configure logging in Squid Proxy.** By default, the squid proxy will write the access log to the log directory that was configured during installation. For example, on Linux, the log directory would be `/var/log/squid/access.log`. If the access log is disabled then you must enable the access log following these [instructions](https://wiki.squid-cache.org/SquidFaq/SquidLogs).
+1. **Configure logging in Squid Proxy.** By default, the squid proxy will write the access log to the log directory that was configured during installation. For example, on Linux, the log directory would be `/var/log/squid/access.log`. If the access log is disabled then you must enable the access log following [these instructions](https://wiki.squid-cache.org/SquidFaq/SquidLogs).
2. **Configure an Installed Collector.** If you have not already done so, install and configure an installed collector for Windows by [following the documentation](/docs/send-data/installed-collectors/windows).
3. **Configure a Collector**. Use one of the following Sumo Logic Collector options:
1. To collect logs directly from the Squid Proxy machine, configure an [Installed Collector](/docs/send-data/installed-collectors).
@@ -687,7 +687,7 @@ The monitors are disabled by default. Once you have installed the alerts using t
### Method 2: Install the alerts using a Terraform script
-1. Generate a Sumo Logic access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using these [instructions](/docs/manage/security/access-keys#from-the-preferences-page). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
+1. Generate a Sumo Logic access key and access ID for a user that has the Manage Monitors role capability in Sumo Logic using instructions in [Access Keys](/docs/manage/security/access-keys). Identify which deployment your Sumo Logic account is in, using this [link](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
2. [Download and install Terraform 0.13](https://www.terraform.io/downloads.html) or later.
3. Download the Sumo Logic Terraform package for Squid Proxy alerts: The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/SquidProxy). You can either download it through the “git clone” command or as a zip file.
4. Alert Configuration: After the package has been extracted, navigate to the package directory terraform-sumologic-sumo-logic-monitor/monitor_packages/SquidProxy/.
@@ -759,7 +759,7 @@ Locate and install the app you need from the **App Catalog**. If you want to see
Version selection is not available for all apps.
:::
3. To install the app, complete the following fields.
- * **App Name.** You can retain the existing name, or enter a name of your choice for the app.
+ * **App Name.** You can retain the existing name, or enter a name of your choice for the app.
* **Data Source.** Choose **Enter a Custom Data Filter**, and enter a custom Squid Proxy cluster filter. Examples:
* For all Squid Proxy clusters: `proxy_cluster=*`
* For a specific farm; `proxy_cluster=squidproxy.dev.01`.
diff --git a/docs/integrations/web-servers/varnish.md b/docs/integrations/web-servers/varnish.md
index e9493bf8b9..35400aa597 100644
--- a/docs/integrations/web-servers/varnish.md
+++ b/docs/integrations/web-servers/varnish.md
@@ -352,7 +352,7 @@ You can install monitors by importing a JSON file or using a Terraform script.
### Method B: Using a Terraform script
-1. Generate an access key and access ID for a user with the **Manage Monitors** role capability; for instructions, see [Access Keys](/docs/manage/security/access-keys#from-the-preferences-page).
+1. Generate an access key and access ID for a user with the **Manage Monitors** role capability; for instructions, see [Access Keys](/docs/manage/security/access-keys).
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later and install it.
3. Download the Sumo Logic Terraform package for MySQL monitor. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages). You can either download it using the git clone command or as a zip file.
4. Alert Configuration. After extracting the package, navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/Varnish/` directory.
diff --git a/docs/manage/security/access-keys.md b/docs/manage/security/access-keys.md
index ed0b2ed973..519397d590 100644
--- a/docs/manage/security/access-keys.md
+++ b/docs/manage/security/access-keys.md
@@ -4,43 +4,13 @@ title: Access Keys
description: Access keys allow you to securely register new Collectors or access Sumo Logic APIs.
---
import useBaseUrl from '@docusaurus/useBaseUrl';
+import Iframe from 'react-iframe';
In Sumo Logic, you'll need an access key to:
* **Register new Collectors**. When you install a Collector, in addition to having a role that grants you the **Manage Collectors** capability, you must supply an access key. You can use a different access key for each Collector, or use the same access key for multiple Collectors. The only time a Collector uses the access key is at installation, so if a key is deleted after a Collector has been set up, the Collector isn't affected.
* **Use Sumo Logic APIs**. You must supply an access key to use the Sumo Logic APIs. See [API Authentication](/docs/api/getting-started#authentication) for details.
-import Iframe from 'react-iframe';
-
-:::sumo Micro Lesson
-
-
-
-
-
-:::
-
## Prerequisites
* You'll need the [**Create Access Keys** role capability](/docs/manage/users-roles/roles/role-capabilities#security) to create an access key.
@@ -49,82 +19,87 @@ import Iframe from 'react-iframe';
## Create an access key
-### From the Preferences page
+### From the Personal Access Keys page
-1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select your username and then **Preferences**.
-1. When the **Create an Access Key** window appears, enter a name for your access key. If you don’t want to create an allowlist of domains from which the access key can be used to access Sumo APIs, proceed to the step.
-1. Optionally, you can add [**Allowlisted CORS Domains**](#cors-support), which will allow you to use this newly created access key to access Sumo APIs.
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select your username and then **Preferences > Personal Access Keys**.})
+1. **Name**. Enter a name for your access key.
+1. **Allowed CORS Domains (optional)**. Create an allowlist of domains from which the access key can be used to access Sumo Logic APIs. For more information, see [CORS support](#cors-support).
:::note
Enter the domains in the [Origin format](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Origin) described in Mozilla help. The URL pattern must include the HTTPS protocol and a domain name. A port is optional.
:::
-1. Click **Create Key** to generate the key. Be sure to copy both the generated Access ID and Access Key before clicking **Done**.
+1. **Scopes**. For additional security, you can select scopes to give the key only the permissions you specify.
+ :::note
+ The user who will be utilizing the access key needs to have all the same [role capabilities](/docs/manage/users-roles/roles/role-capabilities) as the scopes on the access key. Otherwise, once the user views the access key details, the scopes will be displayed as red in the UI red with a message that the user does not have rights for those scopes.
+ :::
+ Select the scopes for the key:
+ * **Default**. The key has all permissions.
+ * **Custom**. The key has only the specified permissions. })
+1. Click **Save** to generate the key.
+1. **IMPORTANT**. Copy both the generated Access ID and Access Key before clicking **Done**. *This is the only time you will be able to copy the ID and key*.
:::warning
After you click **Done**, you will not be able to recover this Access ID and Access Key.
:::
+All personal access keys created in the organization are displayed in the **Access Keys** page, described next.
+
### From the Access Keys page
-Administrators can create access keys under **Access Keys** as an alternative to doing it from the [Preferences page](#from-the-preferences-page).
+Administrators can create access keys under **Access Keys** as an alternative to doing it [from the Personal Access Keys page](#from-the-personal-access-keys-page).
-1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Access Keys**.
-1. Follow the steps from [the previous section](#from-the-preferences-page), starting with step 3.
+1. Follow the steps in the [previous section](#from-the-personal-access-keys-page), starting with step 3.
#### CORS support
-Sumo supports cross-origin resource sharing (CORS), a mechanism that uses additional HTTP headers to tell a browser to let a web application running at one origin (domain) have permission to access selected resources from a server at a different origin.
-
-When you create an access key, you can optionally define an allowlist of domains that may access Sumo APIs using that access key.
-
-Whether Sumo accepts or rejects an API request depends on whether it contains an ORIGIN header and the entries in the allowlist.
+Sumo Logic supports cross-origin resource sharing (CORS), a mechanism that uses additional HTTP headers to tell a browser to let a web application running at one origin (domain) have permission to access selected resources from a server at a different origin. When you create an access key, you can optionally define an allowlist of domains that may access Sumo Logic APIs using that access key.
-Sumo rejects:
+Whether Sumo Logic accepts or rejects an API request depends on whether it contains an ORIGIN header and the entries in the allowlist. Sumo Logic rejects:
* Requests with an ORIGIN header but the allowlist is empty.
* Requests with an ORIGIN header that do not match any entry in the allowlist.
-When Sumo rejects a request, it issues an httpErrorCode 403 error. The error key is "forbidden" and the error message is: `The request origin is not allowlisted to use this access key`.
+When Sumo Logic rejects a request, it issues an httpErrorCode 403 error. The error key is "forbidden" and the error message is: `The request origin is not allowlisted to use this access key`.
-Sumo accepts:
+Sumo Logic accepts:
* Requests without an ORIGIN header.
* Requests with an ORIGIN header that matches an entry in the allowlist.
* All OPTIONS requests.
-When Sumo accepts a request, the response includes the ORIGIN header in
+When Sumo Logic accepts a request, the response includes the ORIGIN header in
an Access-Control-Allow-Origin header.
-## Edit, deactivate, or delete an access key
+## Edit, deactivate, or delete access keys
-Anyone, regardless of role, can edit, activate, deactivate, and delete access keys you've created.
+### Personal access keys
-1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select your username and then **Preferences**.
* **Edit**. Opens up a window where you can modify the allowlist for your access key.
- * **Deactivate/Reactivate**. Depending on the current status of your access key, you'll see either a **Deactivate** or **Reactivate** option. If you deactivate an access key, Sumo Logic will retain the key credentials, but render the key useless. By default, Sumo Logic will deactivate an access key if it has gone unused for more than 30 days, though the [Access Keys Deactivation policy](#access-keys-deactivation-policy) can be updated by a Sumo Logic administrator. You can reactivate a key at any time to begin using it again.
- :::note
- After an access key is deactivated, there can be a brief period of time during which a previous successful authentication remains cached and a subsequent API request using the deactivated key will succeed. This could occur if the access key was used to authenticate within 15 minutes prior to the key being deactivated.
- :::
- * **Delete**. Use the trash can icon to permanently remove the access key. The key will no longer be usable for API calls. However, deleting a key used to register a Collector does not affect the Collector, as the only time a Collector uses the access key is at installation.
+ * **Activate/Deactivate**. Depending on the current status of your access key, you'll see either an **Activate** or **Deactivate** option. If you deactivate an access key, Sumo Logic will retain the key credentials, but render the key useless. By default, Sumo Logic will deactivate an access key if it has gone unused for more than 30 days, though the [Access Keys deactivation policy](#access-keys-deactivation-policy) can be updated by a Sumo Logic administrator. You can reactivate a key at any time to begin using it again.
+ :::note
+ After an access key is deactivated, there can be a brief period of time during which a previous successful authentication remains cached and a subsequent API request using the deactivated key will succeed. This could occur if the access key was used to authenticate within 15 minutes prior to the key being deactivated.
+ :::
+ * **Delete**. Permanently removes the access key. The key will no longer be usable for API calls. However, deleting a key used to register a Collector does not affect the Collector, since the only time a Collector uses the access key is at installation.
-## Edit, deactivate, or delete an org access key
+### Organization access keys
-If you have the [**Manage Access Keys** role capability](/docs/manage/users-roles/roles/role-capabilities#security), you can you can edit, deactivate, and delete any access keys created by other users in your organization.
+If you have the [**Manage Access Keys** role capability](/docs/manage/users-roles/roles/role-capabilities#security), you can edit, deactivate, and delete any access keys created by other users in your organization.
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Access Keys**.
+1. Under the **Access Keys Deactivation** section, select a value in the **No. of Days** field.
+ :::note
+ This section is visible to Administrators only.
+ :::
diff --git a/docs/manage/users-roles/roles/role-capabilities.md b/docs/manage/users-roles/roles/role-capabilities.md
index 73746386ca..2f7f5e6435 100644
--- a/docs/manage/users-roles/roles/role-capabilities.md
+++ b/docs/manage/users-roles/roles/role-capabilities.md
@@ -53,7 +53,7 @@ Following are the capabilities you can assign when you [create roles](create-ma
| :-- | :-- |
| Manage Password Policy | Set the password policy for your Sumo Logic account.|
| Allowlist IP Addresses | [Explicitly grant access](/docs/manage/security/create-allowlist-ip-cidr-addresses) to specific IP addresses or address ranges.|
-| Create Access Keys | Create your own [access keys](/docs/manage/security/access-keys/) on the [Account Preferences](/docs/get-started/account-settings-preferences) page.|
+| Create Access Keys | Create your own [access keys](/docs/manage/security/access-keys/).|
| Manage Access Keys | Set up, activate, deactivate, or delete access keys for your organization.|
| Manage Support Account Access | Enable management of the Sumo Logic [support account](/docs/manage/security/enable-support-account) for your organization.|
| Manage Audit Data Feed | Enable and manage the [Audit Index](/docs/manage/security/audit-indexes/audit-index), which provides information on the internal events that occur in your account associated with account management, user activity, and scheduled searches.|
diff --git a/docs/observability/application-components.md b/docs/observability/application-components.md
index a98bb312c2..2874552d05 100644
--- a/docs/observability/application-components.md
+++ b/docs/observability/application-components.md
@@ -49,7 +49,7 @@ The Terraform script performs the following actions:
* Manage connections
* Manage Content
-1. Populate the name and click **Create Key**.
-1. Copy the **Access ID** and **Access Key** and store them (temporally) into a text editor.
-1. Click **Done** after you copy the Access ID and Access Key.
+[Create an access key](/docs/manage/security/access-keys/#create-an-access-key) and copy the resulting **Access ID** and **Access Key**. Store the ID and access key (temporally) into a text editor.
+
+:::note
+The ID and key won't be available again once you close the confirmation screen.
+:::
## Sumo Logic Cloud SIEM in Automation Service and Cloud SOAR
diff --git a/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics.md b/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics.md
index 4ed803ab26..8870bd0ec5 100644
--- a/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics.md
+++ b/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics.md
@@ -23,14 +23,11 @@ Integration with Sumo Logic platform for logs, metrics, and monitors.
## Sumo Logic Log Analytics configuration
-1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select your username and then **Preferences**.
-1. Populate the name and click **Create Key**.
-1. Copy the **Access ID** and **Access Key** and store them (temporally) into a text editor.
- :::note
- They won't be available again once you close this screen.
- :::
-1. Click **Done** after you copy the Access ID and Access Key.
+[Create an access key](/docs/manage/security/access-keys/#create-an-access-key) and copy the resulting **Access ID** and **Access Key**. Store the ID and access key (temporally) into a text editor.
+
+:::note
+The ID and key won't be available again once you close the confirmation screen.
+:::
## Sumo Logic Log Analytics in Automation Service and Cloud SOAR
diff --git a/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail.md b/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail.md
index 791a485dd8..bdf6d60834 100644
--- a/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail.md
+++ b/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail.md
@@ -20,14 +20,10 @@ Integration with Sumo Logic platform for monitors and Gmail notification.
## Sumo Logic Notifications By Gmail configuration
-1. In the main Sumo Logic menu, select your username and then **Preferences**.
-2. From the preferences screen, in the section **My Access Keys**, click **Add Access Key**.
-3. Populate the name and click **Create Key**.
-4. Copy the **Access ID** and **Access Key** and store them (temporally) into a text editor.
+1. [Create an access key](/docs/manage/security/access-keys/#create-an-access-key) and copy the resulting **Access ID** and **Access Key**. Store the ID and access key (temporally) into a text editor.
:::note
- They won't be available again once you close this screen.
+ The ID and key won't be available again once you close the confirmation screen.
:::
-5. Click **Done** after you copied the Access ID and Access Key.
6. Create a new Project in the [Developer Console](https://console.developers.google.com/).
7. In the **APIs & Services** section, navigate to **Credentials** and select **Create Credentials**: [https://console.cloud.google.com/apis/api](https://console.cloud.google.com/apis/api).
8. Select **OAuth Client ID** as the credential type and set the following inputs:
diff --git a/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications.md b/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications.md
index fe7f9424be..02f60f6dea 100644
--- a/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications.md
+++ b/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications.md
@@ -18,14 +18,11 @@ Integration with Sumo Logic platform for monitors and Slack Notification.
## Sumo Logic Notifications configuration
-1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select your username and then **Preferences**.
-1. Populate the name and click **Create Key**.
-1. Copy the **Access ID** and **Access Key** and store them (temporally) into a text editor.
- :::note
- They won't be available again once you close this screen.
- :::
-1. Click **Done** after you copied the Access ID and Access Key.
+[Create an access key](/docs/manage/security/access-keys/#create-an-access-key) and copy the resulting **Access ID** and **Access Key**. Store the ID and access key (temporally) into a text editor.
+
+:::note
+The ID and key won't be available again once you close the confirmation screen.
+:::
## Sumo Logic Notifications in Automation Service and Cloud SOAR
diff --git a/docs/send-data/installed-collectors/collector-installation-reference/sumoconf-for-legacy-collectors.md b/docs/send-data/installed-collectors/collector-installation-reference/sumoconf-for-legacy-collectors.md
index 213953ecc3..f2ba699bbd 100644
--- a/docs/send-data/installed-collectors/collector-installation-reference/sumoconf-for-legacy-collectors.md
+++ b/docs/send-data/installed-collectors/collector-installation-reference/sumoconf-for-legacy-collectors.md
@@ -8,7 +8,7 @@ description: This file passes Collector configuration parameters during installa
For legacy Collectors (releases prior to 19.137), the `sumo.conf` file allows you to pass Collector configuration parameters to Sumo during installation.
-To authenticate Collectors, you must include an access ID and access key. See [Access Keys](/docs/manage/security/access-keys.md for information on generating and managing access keys.
+To authenticate Collectors, you must include an access ID and access key. See [Access Keys](/docs/manage/security/access-keys) for information on generating and managing access keys.
## Creating sumo.conf
@@ -37,8 +37,8 @@ You cannot have blank values, like `name=` .
| Parameter | Description | Example | Required/Optional |
|:--|:--|:--|:--|
| `name` | Name used to register the Collector. If no name is specified, the hostname is used. The hostname can be a maximum of 128 characters. | `name=FirewallLogs` | Optional |
-| `accessid` | Access ID generated in the Security page. See [Access Keys](/docs/manage/security/access-keys.md) | `accessid=MboxeezMzN8S` | Required |
-| `accesskey` | Access ID generated in the Security page. See [Access Keys](/docs/manage/security/access-keys.md) | `accesskey=dBorwTn8TxF8ofounEXnsQ4hPpuqCzw` | Required |
+| `accessid` | Access ID generated in the Security page. See [Access Keys](/docs/manage/security/access-keys.md). | `accessid=MboxeezMzN8S` | Required |
+| `accesskey` | Access ID generated in the Security page. See [Access Keys](/docs/manage/security/access-keys.md). | `accesskey=dBorwTn8TxF8ofounEXnsQ4hPpuqCzw` | Required |
| `sources` | Path to JSON file that contains Source configuration. See [JSON Source Configuration](/docs/send-data/use-json-configure-sources).