diff --git a/docs/alerts/index.md b/docs/alerts/index.md index 6bf51ef564..82621a9820 100644 --- a/docs/alerts/index.md +++ b/docs/alerts/index.md @@ -11,19 +11,19 @@ Sumo Logic offers several alerting features. See the topics below for details on
- icon

Monitors

+ icon

Monitors

Configure alerting policies notify you about critical changes or issues affecting your production applications.

- icon

Scheduled Searches

+ icon

Scheduled Searches

Create saved searches that are executed continuously on a schedule you set, monitoring your stack.

- icon

Monitors vs. Scheduled Searches

+ icon

Monitors vs. Scheduled Searches

Learn about the feature differences between Monitors and Scheduled Searches.

diff --git a/docs/alerts/monitors/index.md b/docs/alerts/monitors/index.md index e3bebff5cc..e9a18bc784 100644 --- a/docs/alerts/monitors/index.md +++ b/docs/alerts/monitors/index.md @@ -14,67 +14,67 @@ In this section, we'll introduce the following concepts:
- icon

Overview

+ icon

Overview

Set up monitors to continuously query your logs or metrics and send notifications when specific events occur.

- icon

Create a Monitor

+ icon

Create a Monitor

Learn how to create a monitor.

- icon

Monitor Settings

+ icon

Monitor Settings

Learn how to view, create, manage, and organize Monitors.

- icon

Monitors FAQ

+ icon

Monitors FAQ

This topic lists the common FAQs regarding Monitors.

- icon

Alert Variables

+ icon

Alert Variables

Use Alert Variables as parameters to customize the JSON payload object of your alert notifications.

- icon

Alert Response

+ icon

Alert Response

Get contextual insights about triggered alerts to minimize the time needed to investigate and resolve application failures.

- icon

Alert Response FAQ

+ icon

Alert Response FAQ

This topic lists the common FAQs regarding Alert Response.

- icon

Alert Grouping

+ icon

Alert Grouping

Customize how your alerts are generated from monitors by specifying a grouping condition based on specific fields.

- icon

Muting Schedules

+ icon

Muting Schedules

Pause alert notifications from monitors according to the schedule that you define.

- icon

Monitor Log Ingestion and Alerts

+ icon

Monitor Log Ingestion and Alerts

Add Scheduled Searches that monitor log ingestion and send alerts.

- icon

Automated Playbooks in Monitors

+ icon

Automated Playbooks in Monitors

Learn how to use Automation Service playbooks with monitors.

diff --git a/docs/alerts/scheduled-searches/index.md b/docs/alerts/scheduled-searches/index.md index 951b06e963..317c2f4160 100644 --- a/docs/alerts/scheduled-searches/index.md +++ b/docs/alerts/scheduled-searches/index.md @@ -11,43 +11,43 @@ A _Scheduled Search_ is a standard [Log Search](/docs/search) that you save and
- icon

Create a Scheduled Search

+ icon

Create a Scheduled Search

Learn how to add alerts and schedule search to run it at a regular scheduled time.

- icon

Create a Scheduled Search Email Alert

+ icon

Create a Scheduled Search Email Alert

Learn how to create a Scheduled Search email alert.

- icon

Edit or Cancel a Scheduled Search

+ icon

Edit or Cancel a Scheduled Search

Learn how to edit or cancel a Scheduled Search at any time.

- icon

Save to Index

+ icon

Save to Index

Learn how to save the results to an Index after creating a Scheduled Search email alert.

- icon

Save to Lookup

+ icon

Save to Lookup

Learn how to save the results of a Scheduled Search to a Lookup Table.

- icon

Generate Cloud SIEM Signals with a Scheduled Search

+ icon

Generate Cloud SIEM Signals with a Scheduled Search

Learn how to create a Scheduled Search that will trigger a Cloud SIEM Signal.

- icon

FAQ

+ icon

FAQ

Review frequently asked questions about Scheduled Searches and troubleshooting tips.

diff --git a/docs/alerts/webhook-connections/index.md b/docs/alerts/webhook-connections/index.md index 0cf1d59e86..ab5293b21e 100644 --- a/docs/alerts/webhook-connections/index.md +++ b/docs/alerts/webhook-connections/index.md @@ -22,55 +22,55 @@ In this section, we'll introduce the following concepts and more:
icon -

Set Up Webhook Connections

+

Set Up Webhook Connections

Thumbnail icon -

AWS Lambda

+

AWS Lambda

Thumbnail icon -

Azure Functions

+

Azure Functions

thumbnail icon -

MS Teams

+

MS Teams

Thumbnail icon -

PagerDuty

+

PagerDuty

Thumbnail icon -

Slack

+

Slack

Thumbnail icon -

Opsgenie

+

Opsgenie

icon -

ServiceNow

+

ServiceNow

Thumbnail icon -

Jira

+

Jira

diff --git a/docs/alerts/webhook-connections/servicenow/index.md b/docs/alerts/webhook-connections/servicenow/index.md index e4b1e4e9ff..2253c2f4ac 100644 --- a/docs/alerts/webhook-connections/servicenow/index.md +++ b/docs/alerts/webhook-connections/servicenow/index.md @@ -19,25 +19,25 @@ In this section, we'll introduce the following concepts:
- icon

Set Up Security Incident Webhooks

+ icon

Set Up Security Incident Webhooks

Learn how to set up a ServiceNow Security Incident Webhook connection and create scheduled searches.

- icon

Launch ServiceNow Investigations

+ icon

Launch ServiceNow Investigations

Learn how to launch ad hoc investigations directly from search results in Sumo Logic.

- icon

Set Up ServiceNow Searches

+ icon

Set Up ServiceNow Searches

Learn how to set up scheduled searches for ServiceNow integration.

- icon

Set Up ServiceNow Connections

+ icon

Set Up ServiceNow Connections

Learn how to set up connections for ServiceNow integration.

diff --git a/docs/api/about-apis/index.md b/docs/api/about-apis/index.md index 7727b04fa0..a94a18836a 100644 --- a/docs/api/about-apis/index.md +++ b/docs/api/about-apis/index.md @@ -13,25 +13,25 @@ This section contains articles about how to use the Sumo Logic APIs.
- Thumbnail icon

Introduction to Sumo Logic APIs

+ Thumbnail icon

Introduction to Sumo Logic APIs

Learn how to get started with the Sumo Logic APIs.

- icon

Authentication and Endpoints

+ icon

Authentication and Endpoints

Get your API credentials and endpoint URL to start using the Sumo Logic APIs.

- Thumbnail icon

Use Terraform with Sumo Logic

+ Thumbnail icon

Use Terraform with Sumo Logic

Learn how to use Terraform with Sumo Logic.

- Thumbnail icon

Troubleshooting

+ Thumbnail icon

Troubleshooting

Troubleshoot errors you may find when using the Sumo APIs.

diff --git a/docs/api/collector-management/collector-api-methods-examples.md b/docs/api/collector-management/collector-api-methods-examples.md index 67df8fa1ef..ea251b2023 100644 --- a/docs/api/collector-management/collector-api-methods-examples.md +++ b/docs/api/collector-management/collector-api-methods-examples.md @@ -116,7 +116,7 @@ The following table lists the API response fields for installed and hosted Colle Boolean Yes - When true, the collector will be deleted after 12 hours of inactivity. For more information, see Setting a Collector as Ephemeral. + When true, the collector will be deleted after 12 hours of inactivity. For more information, see [Setting a Collector as Ephemeral](/docs/send-data/installed-collectors/collector-installation-reference/set-collector-as-ephemeral). Modifiable @@ -124,7 +124,7 @@ The following table lists the API response fields for installed and hosted Colle JSON Object No - JSON map of key-value fields (metadata) to apply to the Collector. To assign an Ingest Budget to the Collector use the field _budget with the Field Value of the Ingest Budget to assign. For example, if you have a budget with a Field Value of Dev_20GB, you would add: + JSON map of key-value [fields](/docs/manage/fields) (metadata) to apply to the Collector. To assign an [Ingest Budget](/docs/manage/ingestion-volume/ingest-budgets) to the Collector use the field _budget with the Field Value of the Ingest Budget to assign. For example, if you have a budget with a Field Value of Dev_20GB, you would add:

fields=_budget=Dev_20GB

Modifiable @@ -167,7 +167,7 @@ The following table lists the API response fields for installed and hosted Colle UI For installed Collectors, whether the Collector is using local source configuration management (using a JSON file), or cloud management (using the UI) Modifiable -

To assign to JSON, learn more.

+

To assign to JSON, [learn more](/docs/send-data/use-json-configure-sources/local-configuration-file-management/existing-collectors-and-sources).

timeZone @@ -182,7 +182,7 @@ The following table lists the API response fields for installed and hosted Colle Long No Null - When CPU utilization exceeds this threshold, the Collector will slow down its rate of ingestion to lower its CPU utilization. Currently only Local and Remote File Sources are supported. The value must be expressed as a whole number percentage. The collector will adjust resources to attempt to limit the CPU usage to at most 20%. For more information, see Set the Collector CPU Usage Target. + When CPU utilization exceeds this threshold, the Collector will slow down its rate of ingestion to lower its CPU utilization. Currently only Local and Remote File Sources are supported. The value must be expressed as a whole number percentage. The collector will adjust resources to attempt to limit the CPU usage to at most 20%. For more information, see [Set the Collector CPU Usage Target](/docs/send-data/collection/set-collector-cpu-usage-target). Modifiable diff --git a/docs/api/data-deletion-rules.md b/docs/api/data-deletion-rules.md index 59ea094326..86fddb97f7 100644 --- a/docs/api/data-deletion-rules.md +++ b/docs/api/data-deletion-rules.md @@ -9,7 +9,7 @@ description: Data Deletion Rules APIs allow you to delete ingested data from Sum -

Beta

+

Beta

import useBaseUrl from '@docusaurus/useBaseUrl'; import ApiIntro from '../reuse/api-intro.md'; diff --git a/docs/api/index.md b/docs/api/index.md index c6d8fceeef..b970d9d5d2 100644 --- a/docs/api/index.md +++ b/docs/api/index.md @@ -11,7 +11,7 @@ Use the Sumo Logic Application Programming Interfaces (APIs) to interact with ou
- icon

About Sumo Logic APIs

+ icon

About Sumo Logic APIs

Learn about Sumo Logic APIs, including endpoints and how to use them.

@@ -21,242 +21,242 @@ Use the Sumo Logic Application Programming Interfaces (APIs) to interact with ou
- Thumbnail icon

Roles

+ Thumbnail icon

Roles

- Thumbnail icon

SLOs

+ Thumbnail icon

SLOs

- Thumbnail icon

Users

+ Thumbnail icon

Users

diff --git a/docs/api/metrics-searches.md b/docs/api/metrics-searches.md index b7f2ba1b08..8e30522d13 100644 --- a/docs/api/metrics-searches.md +++ b/docs/api/metrics-searches.md @@ -9,7 +9,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; import ApiIntro from '../reuse/api-intro.md'; import ApiRoles from '../reuse/api-roles.md'; -

Beta

+

Beta

Thumbnail icon diff --git a/docs/api/search-job.md b/docs/api/search-job.md index 92eea844b8..e9798e640b 100644 --- a/docs/api/search-job.md +++ b/docs/api/search-job.md @@ -777,13 +777,13 @@ To create a search job (step 1 in the [process flow](#process-flow)), send a JSO byReceiptTime Boolean No - Define as true to run the search using receipt time. By default, searches do not run by receipt time. + Define as true to run the search using [receipt time](/docs/search/get-started-with-search/build-search/use-receipt-time). By default, searches do not run by receipt time. autoParsingMode String No - This enables dynamic parsing. Values are:

AutoParse - Sumo Logic will perform field extraction on JSON log messages when you run a search.

Manual - (Default value) Sumo Logic will not autoparse JSON logs at search time.

Note Previously, the supported values for this parameter were performance, intelligent, and verbose. These values still function, but are deprecated. Sumo Logic recommends the use of the new supported values: AutoParse and Manual. + This enables [dynamic parsing](/docs/search/get-started-with-search/build-search/dynamic-parsing). Values are:

AutoParse - Sumo Logic will perform field extraction on JSON log messages when you run a search.

Manual - (Default value) Sumo Logic will not autoparse JSON logs at search time.

Note Previously, the supported values for this parameter were performance, intelligent, and verbose. These values still function, but are deprecated. Sumo Logic recommends the use of the new supported values: AutoParse and Manual. requiresRawMessages diff --git a/docs/apm/index.md b/docs/apm/index.md index 432cd0d64a..9bb1450232 100644 --- a/docs/apm/index.md +++ b/docs/apm/index.md @@ -12,37 +12,37 @@ Monitor user activity, span analytics, service maps, and transaction traces betw
- icon

Traces

+ icon

Traces

Learn how to work with application tracing data using dashboards, Services Lists and Maps, Spans, and queries.

- icon

Get Started with Transaction Tracing

+ icon

Get Started with Transaction Tracing

Learn how to send Traces to Sumo Logic in AWS, Kubernetes, and other environments.

- icon

OpenTelemetry App Instrumentation

+ icon

OpenTelemetry App Instrumentation

OpenTelemetry provides a wide range of componentry to get you started with distributed tracing.

- icon

Real User Monitoring

+ icon

Real User Monitoring

Understand how users interact with the digital interfaces of your business.

- icon

Configure RUM Data Collection

+ icon

Configure RUM Data Collection

Learn how to collect Traces and RUM metrics from a browser using a RUM HTTP Traces Source.

- icon

RUM Dashboards

+ icon

RUM Dashboards

Use RUM Dashboards to gain visibility into application performance and end-user activity.

diff --git a/docs/apm/traces/advanced-configuration/correlate-logs.md b/docs/apm/traces/advanced-configuration/correlate-logs.md index b9b5c0a3c0..36bd5eb55f 100644 --- a/docs/apm/traces/advanced-configuration/correlate-logs.md +++ b/docs/apm/traces/advanced-configuration/correlate-logs.md @@ -14,35 +14,35 @@ Our configurations, available in several programming languages, will inject the
Thumbnail icon -

Java

+

Java

Injects data into user logs in your Java applications.

Thumbnail icon -

JavaScript

+

JavaScript

Injects data into user logs in your JavaScript apps.

thumbnail icon -

Go (Golang)

+

Go (Golang)

Injects data into your GoLang app user logs.

Thumbnail icon -

.NET

+

.NET

Injects data into user logs from ASP.NET & .NET core.

Thumbnail icon -

Python

+

Python

Injects data into your Python lambda logs.

diff --git a/docs/apm/traces/advanced-configuration/index.md b/docs/apm/traces/advanced-configuration/index.md index ba236c776f..903ca93711 100644 --- a/docs/apm/traces/advanced-configuration/index.md +++ b/docs/apm/traces/advanced-configuration/index.md @@ -5,24 +5,26 @@ sidebar_label: Advanced Configuration description: This guide provides advanced configuration options for Distributed Tracing (APM). --- +import useBaseUrl from '@docusaurus/useBaseUrl'; + This guide provides advanced configuration options for Application Performance Management (APM) and distributed tracing, including the following:
-

Correlating Logs and Traces

+

Correlating Logs and Traces

Link your traces and logs to better understand your environment.

-

Filter and Shape Your Trace Data

+

Filter and Shape Your Trace Data

Create and apply custom rules to filter and shape your tracing data.

-

Working with Span Attributes

+

Working with Span Attributes

Learn how to modify the attributes of your spans.

diff --git a/docs/apm/traces/get-started-transaction-tracing/index.md b/docs/apm/traces/get-started-transaction-tracing/index.md index 95e818357f..f615f975b3 100644 --- a/docs/apm/traces/get-started-transaction-tracing/index.md +++ b/docs/apm/traces/get-started-transaction-tracing/index.md @@ -17,19 +17,19 @@ Sumo Logic tracing supports the OpenTelemetry standard as well as other legacy o
- icon

For AWS environments

+ icon

For AWS environments

Learn how to install an OpenTelemetry Collector and collect traces in AWS environments.

- icon

For Kubernetes environments

+ icon

For Kubernetes environments

Learn how to install the Sumo Logic Kubernetes Collection and send traces using OpenTelemetry.

- icon

For Other environments

+ icon

For Other environments

Learn how to leverage OpenTelemetry standards and start collecting Traces.

@@ -48,49 +48,49 @@ Learn how to collect telemetry data from applications written in the following p
Thumbnail icon -

Java

+

Java

Thumbnail icon -

.NET

+

.NET

Thumbnail icon -

Ruby

+

Ruby

Thumbnail icon -

Istio

+

Istio

@@ -104,19 +104,19 @@ Learn how to install and configure OpenTelemetry distributed tracing for AWS Lam
Thumbnail icon -

Java

+

Java

@@ -135,19 +135,19 @@ Setting up Tracing instrumentation for applications deployed in Kubernetes just
Thumbnail icon -

Java

+

Java

@@ -157,19 +157,19 @@ Setting up Tracing instrumentation for applications deployed in Kubernetes just
- icon

Correlating Logs and Traces

+ icon

Correlating Logs and Traces

Linking together your Sumo Logic traces and logs will provide you a broad and deep understanding of your environment.

- icon

Filter and Shape Your Trace Data

+ icon

Filter and Shape Your Trace Data

Learn how to create and apply custom rules to shape tracing data and specify which data to send to Sumo Logic.

- icon

Working with Span Attributes

+ icon

Working with Span Attributes

Learn how to modify span attributes to enhance diagnostic data details, remove redundant information, and mask sensitive information before they leave your site.

diff --git a/docs/apm/traces/index.md b/docs/apm/traces/index.md index 97bbe24440..9c03ad082c 100644 --- a/docs/apm/traces/index.md +++ b/docs/apm/traces/index.md @@ -14,55 +14,55 @@ This guide provides information to work with your tracing data.
- icon

Setup and Configuration

+ icon

Setup and Configuration

Learn how to send traces to Sumo Logic.

- icon

Quickstart

+ icon

Quickstart

Get up and running quickly with and explore how your application is behaving with Trace analytics.

- icon

View and Investigate Traces

+ icon

View and Investigate Traces

Learn how to search and investigate your traces, trace views, and trace events.

- icon

Services List and Services Map

+ icon

Services List and Services Map

View your application topology and investigate microservice interactions.

- icon

Application Service APM and Tracing Dashboards

+ icon

Application Service APM and Tracing Dashboards

Explore and create Tracing dashboards, install apps, and more.

- icon

Span Analytics and Queries

+ icon

Span Analytics and Queries

Learn how to use the Spans page to explore your span data.

- icon

Search Query Language Support for Traces

+ icon

Search Query Language Support for Traces

Use our Search Query Language to gain valuable insight into your traces.

- icon

Advanced Configuration

+ icon

Advanced Configuration

Learn how to link logs and traces, modify span attributes, and mask sensitive site information.

- icon

Troubleshoot Ingest

+ icon

Troubleshoot Ingest

Use tracing to troubleshoot problems with data ingest.

diff --git a/docs/cloud-soar/index.md b/docs/cloud-soar/index.md index f6a2870ab7..bb0d181fa1 100644 --- a/docs/cloud-soar/index.md +++ b/docs/cloud-soar/index.md @@ -16,48 +16,48 @@ This section contains the following topics:
- Shield and gear icon

Overview

+ Shield and gear icon

Overview

Learn how Cloud SOAR allows you to perform incident management and threat response.

- Shield and gear icon

Introduction

+ Shield and gear icon

Introduction

Provides an introduction to Cloud SOAR for analysts and administrators.

- Shield and gear icon

Cloud SOAR Compared to the Automation Service

+ Shield and gear icon

Cloud SOAR Compared to the Automation Service

Compare the features of Cloud SOAR with the Automation Service.

- Shield and gear icon

Cloud SOAR Settings

+ Shield and gear icon

Cloud SOAR Settings

Setup and configuration options for the Cloud SOAR platform.

- Shield and gear icon

Cloud SOAR Menus

+ Shield and gear icon

Cloud SOAR Menus

Navigate menus in Cloud SOAR.

- Shield and gear icon

Incidents and Triage

+ Shield and gear icon

Incidents and Triage

Customize your Cloud SOAR Incident data display.

- Shield and gear icon

Automation

+ Shield and gear icon

Automation

Configuration tools for Cloud SOAR automation and orchestration features.

- Shield and gear icon

Legacy Cloud SOAR

+ Shield and gear icon

Legacy Cloud SOAR

Learn about our legacy Cloud SOAR product offering.

diff --git a/docs/cloud-soar/legacy/index.md b/docs/cloud-soar/legacy/index.md index 2c3feaa234..0f190d392a 100644 --- a/docs/cloud-soar/legacy/index.md +++ b/docs/cloud-soar/legacy/index.md @@ -16,43 +16,43 @@ In this section, we'll introduce the following concepts:
- Computer chip icon

Legacy Cloud SOAR Architecture

+ Computer chip icon

Legacy Cloud SOAR Architecture

Learn about features of the legacy Cloud SOAR architecture.

- Computer chip icon

Legacy Cloud SOAR Global Functions Menu

+ Computer chip icon

Legacy Cloud SOAR Global Functions Menu

Learn about features of the legacy Cloud SOAR Global Functions menu.

- Computer chip icon

Legacy Cloud SOAR Main Menu

+ Computer chip icon

Legacy Cloud SOAR Main Menu

Learn about features of the legacy Cloud SOAR main menu.

- Computer chip icon

Legacy Cloud SOAR Incident Management and Triage

+ Computer chip icon

Legacy Cloud SOAR Incident Management and Triage

Learn about features of the legacy Cloud SOAR automated real-time incident management and threat response.

- Computer chip icon

Legacy Cloud SOAR Automation

+ Computer chip icon

Legacy Cloud SOAR Automation

Learn about features of legacy Cloud SOAR automation.

- Computer chip icon

Cloud SOAR for MSSPs (Legacy Only)

+ Computer chip icon

Cloud SOAR for MSSPs (Legacy Only)

Full-featured instance of legacy Cloud SOAR designed for internal MSSP use.

- Computer chip icon

Legacy Cloud SOAR APIs

+ Computer chip icon

Legacy Cloud SOAR APIs

Learn how to access legacy Cloud SOAR APIs and API documentation.

diff --git a/docs/contributing/index.md b/docs/contributing/index.md index e9ef0529e4..e43a688b48 100644 --- a/docs/contributing/index.md +++ b/docs/contributing/index.md @@ -21,32 +21,32 @@ You can also explore more Sumo Logic open-source projects on our [GitHub site](h diff --git a/docs/contributing/style-guide.md b/docs/contributing/style-guide.md index d274367466..68595e57fe 100644 --- a/docs/contributing/style-guide.md +++ b/docs/contributing/style-guide.md @@ -262,7 +262,7 @@ To format a closed beta release: -

Beta

+

Beta

First paragraph goes here... ``` @@ -282,7 +282,7 @@ To format an open beta release: description: The XYZ Source provides a secure endpoint to receive event data. --- -

Beta

+

Beta

First paragraph goes here... ``` diff --git a/docs/cse/administration/index.md b/docs/cse/administration/index.md index 0e3748aaea..6e59e6d496 100644 --- a/docs/cse/administration/index.md +++ b/docs/cse/administration/index.md @@ -12,103 +12,103 @@ Learn about onboarding tasks and best practices for Cloud SIEM administrators. I
- Magnifying glass icon

Filter and Search

+ Magnifying glass icon

Filter and Search

Learn how to filter and search Cloud SIEM list pages.

- Network icon

Network Blocks

+ Network icon

Network Blocks

Learn about network blocks, their purpose, and instructions for setting them up and using them.

- Tree diagram icon

Create a Custom Tag Schema

+ Tree diagram icon

Create a Custom Tag Schema

Learn how to create a custom tag schema in Cloud SIEM.

- Shield with a globe icon

Custom Threat Intelligence Sources

+ Shield with a globe icon

Custom Threat Intelligence Sources

Learn how manage custom threat intelligence sources.

- Cloud with a shield icon

Create Cloud SIEM Actions

+ Cloud with a shield icon

Create Cloud SIEM Actions

Learn how to issue a notification to another service when certain events occur in Cloud SIEM.

- Database symbol in a magnifying glass icon

Create Cloud SIEM Context Actions

+ Database symbol in a magnifying glass icon

Create Cloud SIEM Context Actions

Learn to query an external system for details about an entity, IOC, or data encountered in a record.

- Code icon

Cloud SIEM APIs

+ Code icon

Cloud SIEM APIs

Learn how to access Cloud SIEM APIs and API documentation.

- Database icon

Data Retention

+ Database icon

Data Retention

Learn about retention periods for different types of Cloud SIEM data.

- Document icon

Audit Logging

+ Document icon

Audit Logging

Learn how to search the Audit Event Index for Cloud SIEM log events.

- People with gears icon

Cloud SIEM User Accounts and Roles

+ People with gears icon

Cloud SIEM User Accounts and Roles

Learn how to create and manage user accounts and roles for Cloud SIEM.

- Small boxes merging into a circle icon

Custom Inventory Source

+ Small boxes merging into a circle icon

Custom Inventory Source

Learn how to extract Inventory Data from logs in Sumo Logic and send it to Cloud SIEM.

- Check mark in an magnifhing glass icon

Save Inventory Data to a Lookup Table

+ Check mark in an magnifhing glass icon

Save Inventory Data to a Lookup Table

Learn how to use a saved Sumo Logic search to populate a Lookup Table with Cloud SIEM inventory data.

- Bar chart with a gear icon

Manage Custom Insight Resolutions

+ Bar chart with a gear icon

Manage Custom Insight Resolutions

Learn how to create and manage custom insight resolutions.

- Bar chart in a circle icon

Managing Custom Insight Statuses

+ Bar chart in a circle icon

Managing Custom Insight Statuses

Learn how to create and manage custom insight statuses.

- Squares icon

Sensor Zones

+ Squares icon

Sensor Zones

Learn how to use Sensor Zones to distinguish between Cloud SIEM entities that have the same IP address.

- Peoople on a gear icon

Inventory Sources and Data

+ Peoople on a gear icon

Inventory Sources and Data

Learn about Inventory Sources and the Inventory Data they collect.

- People on a gear icon

MITRE Coverage

+ People on a gear icon

MITRE Coverage

Learn how well you are prepared to detect adversary attacks based on the tactics and techniques in the MITRE ATT&CK Enterprise Matrix.

diff --git a/docs/cse/automation/index.md b/docs/cse/automation/index.md index 5a3e9fbc85..97c3ec2bc4 100644 --- a/docs/cse/automation/index.md +++ b/docs/cse/automation/index.md @@ -15,19 +15,19 @@ In this section, we'll introduce the following concepts:
- Shield on a workflow icon

About the Automation Service and Cloud SIEM

+ Shield on a workflow icon

About the Automation Service and Cloud SIEM

Get an overview of how the Automation Service allows you to automate smart actions, including enrichments and notifications.

- Shield on a workflow icon

Automations in Cloud SIEM

+ Shield on a workflow icon

Automations in Cloud SIEM

Learn how to create automations that run playbooks to add enrichments and create notifications for either insights or entities.

- Shield on a workflow icon

Cloud SIEM Automation Examples

+ Shield on a workflow icon

Cloud SIEM Automation Examples

See examples that show you how to create automations for different situations.

diff --git a/docs/cse/get-started-with-cloud-siem/index.md b/docs/cse/get-started-with-cloud-siem/index.md index ef3927faec..028cd27702 100644 --- a/docs/cse/get-started-with-cloud-siem/index.md +++ b/docs/cse/get-started-with-cloud-siem/index.md @@ -11,54 +11,54 @@ This guide helps you get started using Cloud SIEM for threat hunting.
- Shield on a workflow icon

Cloud SIEM User Interface

+ Shield on a workflow icon

Cloud SIEM User Interface

Learn about the Cloud SIEM user interface.

- Shield on a workflow icon

Introduction to Cloud SIEM for Analysts

+ Shield on a workflow icon

Introduction to Cloud SIEM for Analysts

Learn basic concepts about Cloud SIEM for security analysts.

- Shield on a workflow icon

Introduction to Cloud SIEM for Administrators

+ Shield on a workflow icon

Introduction to Cloud SIEM for Administrators

Learn basic concepts about Cloud SIEM for administrators.

- Shield on a workflow icon

Cloud SIEM Heads Up Display

+ Shield on a workflow icon

Cloud SIEM Heads Up Display

Learn how to use the Heads Up Display to perform threat investigations.

- Shield on a workflow icon

Insight Generation

+ Shield on a workflow icon

Insight Generation

Learn how Cloud SIEM correlates signals by entity to create insights.

- Shield on a workflow icon

Cloud SIEM Insight UI

+ Shield on a workflow icon

Cloud SIEM Insight UI

Learn about the contents of the insights UI in Cloud SIEM.

- Shield on a workflow icon

Insight Summary

+ Shield on a workflow icon

Insight Summary

Learn how the insight summary pane uses AI to provide summaries of threat incidents.

- Checklist icon

Cloud SIEM Content Catalog

+ Checklist icon

Cloud SIEM Content Catalog

See the out-of-the-box rules, schema, mappings, and parsers for Cloud SIEM.

- Checklist icon

Cloud SIEM Onboarding Checklist

+ Checklist icon

Cloud SIEM Onboarding Checklist

Get up and running quickly with Cloud SIEM administrator tasks.

diff --git a/docs/cse/index.md b/docs/cse/index.md index 99e9bbdb2c..8f3c039626 100644 --- a/docs/cse/index.md +++ b/docs/cse/index.md @@ -21,61 +21,61 @@ This section contains the following topics:
- Shield on a cloud icon

Get Started with Cloud SIEM

+ Shield on a cloud icon

Get Started with Cloud SIEM

Learn how to start using Cloud SIEM for threat hunting.

- Shield on a cloud icon

Records, Signals, Entities, and Insights

+ Shield on a cloud icon

Records, Signals, Entities, and Insights

Learn about Insight generation, working with Entities, and how to query Cloud SIEM Records.

- Shield on a cloud icon

Ingestion

+ Shield on a cloud icon

Ingestion

Learn how to configure ingestion for supported products and services.

- Shield on a cloud icon

Rules

+ Shield on a cloud icon

Rules

Learn how to write rules, rules syntax, and Cloud SIEM built-in rules.

- Shield on a cloud icon

Schema

+ Shield on a cloud icon

Schema

Learn about Cloud SIEM Schema v3, schema attributes, and the Record processing pipeline.

- Shield on a cloud icon

Sensors

+ Shield on a cloud icon

Sensors

Cloud SIEM Sensors collect log and event data from your infrastructure and applications.

- Shield on a cloud icon

Integrations

+ Shield on a cloud icon

Integrations

Cloud SIEM integration with Sumo Logic and threat intel sources, and leveraging the Cloud SIEM Insight Enrichment Server.

- Shield on a cloud icon

Match Lists and Suppressed Lists

+ Shield on a cloud icon

Match Lists and Suppressed Lists

Learn about creating a Match list and their usage in rules.

- Shield on a cloud icon

Automation

+ Shield on a cloud icon

Automation

Learn how to configure automations to create notifications and enrichments in Cloud SIEM.

- Shield on a cloud icon

Administration

+ Shield on a cloud icon

Administration

Learn how to set up user accounts and roles, Actions, Network Blocks, custom Insight status and sub-resolutions, and more.

diff --git a/docs/cse/ingestion/index.md b/docs/cse/ingestion/index.md index c5a119f7c1..eebe912329 100644 --- a/docs/cse/ingestion/index.md +++ b/docs/cse/ingestion/index.md @@ -12,31 +12,31 @@ The articles in this section provide guidance on how to ingest data into Cloud S
- Database icon

Best Practices

+ Database icon

Best Practices

Learn how to send Sumo Logic Source or Cloud-to-Cloud Connector log messages to Cloud SIEM to be transformed into records.

- Database icon

Products with Log Mappings

+ Database icon

Products with Log Mappings

See the product and services that Cloud SIEM supports with log mappings and parsers.

- Database icon

Viewing Log Mappers

+ Database icon

Viewing Log Mappers

Learn how to find what mappers Cloud SIEM provides for a product or service.

- Shield on a cloud icon

Sumo Logic Cloud SIEM Ingest Mapping

+ Shield on a cloud icon

Sumo Logic Cloud SIEM Ingest Mapping

Configure Sumo Logic to send log messages to be processed by Cloud SIEM's system mapper.

- Shield on a cloud icon

Ingestion Sources for Cloud SIEM

+ Shield on a cloud icon

Ingestion Sources for Cloud SIEM

Learn the sources available for ingesting data to Cloud SIEM.

diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/index.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/index.md index 153c2a78bd..b9a13f6131 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/index.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/index.md @@ -18,169 +18,169 @@ For all available methods to ingest data into Cloud SIEM, see [Recommended metho
- Auth0 thumbnail icon

Auth0

+ Auth0 thumbnail icon

Auth0

Configure an HTTP source to ingest Auth0 log messages and send them to Cloud SIEM’s Auth0 system parser.

- AWS Load Balancer thumbnail icon

AWS Application Load Balancer

+ AWS Load Balancer thumbnail icon

AWS Application Load Balancer

Configure collection and ingestion of AWS ALB log messages from an S3 bucket to be parsed by Cloud SIEM.

- AWS CloudTrail thumbnail icon

AWS CloudTrail

+ AWS CloudTrail thumbnail icon

AWS CloudTrail

Configure a CloudTrail source on a hosted collector to ingest CloudTrail log messages to be parsed by Cloud SIEM.

- AWS GuardDuty thumbnail icon

AWS GuardDuty

+ AWS GuardDuty thumbnail icon

AWS GuardDuty

Configure an HTTP source to ingest AWS GuardDuty log messages and send them to Cloud SIEM's system parser.

- AWS Network Firewall thumbnail icon

AWS Network Firewall

+ AWS Network Firewall thumbnail icon

AWS Network Firewall

Configure collection and ingestion of AWS Network Firewall log messages from an S3 bucket to be parsed by Cloud SIEM.

- AWS VPC Flow thumbnail icon

AWS VPC Flow

+ AWS VPC Flow thumbnail icon

AWS VPC Flow

Configure collection and ingestion of VPC Flow logs from an S3 bucket to be parsed by Cloud SIEM.

- Carbon Black Cloud thumbnail icon

Carbon Black Cloud

+ Carbon Black Cloud thumbnail icon

Carbon Black Cloud

Configure collection of Carbon Black Cloud logs messages from an S3 bucket to be parsed by Cloud SIEM.

- Check Point Firewall thumbnail icon

Check Point Firewall

+ Check Point Firewall thumbnail icon

Check Point Firewall

Configure a syslog source to ingest Check Point Firewall log messages to be parsed by Cloud SIEM.

- Cisco ASA thumbnail icon

Cisco ASA

+ Cisco ASA thumbnail icon

Cisco ASA

Configure a syslog source to ingest Cisco ASA log messages to be parsed by Cloud SIEM.

- Cisco Meraki icon

Cisco Meraki

+ Cisco Meraki icon

Cisco Meraki

Configure a syslog source to ingest Cisco Meraki log messages to be parsed by Cloud SIEM Cisco.

- Corelight Zeek icon

Corelight Zeek

+ Corelight Zeek icon

Corelight Zeek

Configure a syslog source to ingest Corelight Zeek log messages and send them to Cloud SIEM's log mapper.

- Fortigate Firewall icon

Fortigate Firewall

+ Fortigate Firewall icon

Fortigate Firewall

Configure a syslog source to ingest Fortigate Firewall log messages to be parsed by Cloud SIEM.

- G Suite Alert Center icon

G Suite Alert Center

+ G Suite Alert Center icon

G Suite Alert Center

Collect log messages from G Suite Alert Center to be parsed by Cloud SIEM.

- Kemp LoadMaster icon

Kemp LoadMaster

+ Kemp LoadMaster icon

Kemp LoadMaster

Configure a syslog source to ingest Kemp LoadMaster messages to be parsed by Cloud SIEM.

- Linux OS Syslog icon

Linux OS Syslog

+ Linux OS Syslog icon

Linux OS Syslog

Configure a syslog source to ingest Linux OS log messages to be parsed by Cloud SIEM.

- Microsoft 365 Audit icon

Microsoft 365 Audit (Office 365 Audit)

+ Microsoft 365 Audit icon

Microsoft 365 Audit (Office 365 Audit)

Configure collection of Microsoft 365 log messages to be parsed by Cloud SIEM. 

- Microsoft Azure Activity Log icon

Microsoft Azure Activity Log

+ Microsoft Azure Activity Log icon

Microsoft Azure Activity Log

Configure an HTTP Source to ingest Microsoft Azure Activity Log messages and to be parsed by Cloud SIEM.

- Microsoft Windows icon

Microsoft Windows

+ Microsoft Windows icon

Microsoft Windows

Configure collection of Windows Event Log messages and send them to the Cloud SIEM mapper.

- Nginx Access Logs icon

Nginx Access Logs

+ Nginx Access Logs icon

Nginx Access Logs

Configure a syslog source to ingest Nginx Access log messages to be parsed by Cloud SIEM.

- Okta icon

Okta

+ Okta icon

Okta

Configure an Okta source to ingest Okta log messages and send them to Cloud SIEM’s system parser.

- OneLogin icon

OneLogin

+ OneLogin icon

OneLogin

Learn how to collect OneLogin log messages and send them to Sumo Logic to be ingested by Cloud SIEM.

- Osquery icon

Osquery

+ Osquery icon

Osquery

Configure an HTTP source to ingest osquery log messages and send them to the Cloud SIEM system parser.

- Palo Alto Firewall icon

Palo Alto Firewall

+ Palo Alto Firewall icon

Palo Alto Firewall

Configure collection of Palo Alto Firewall log messages to be parsed by Cloud SIEM's system parser.

- SentinelOne icon

SentinelOne

+ SentinelOne icon

SentinelOne

Learn how to collect SentinelOne log messages and send them to be ingested by Cloud SIEM.

- Signal Sciences WAF icon

Signal Sciences WAF

+ Signal Sciences WAF icon

Signal Sciences WAF

Lean how to collect Signal Sciences WAF log messages and sending them to Sumo Logic to be ingested by Cloud SIEM.

- Symantec Blue Coat Proxy icon

Symantec Blue Coat Proxy

+ Symantec Blue Coat Proxy icon

Symantec Blue Coat Proxy

Configure a Syslog source to collect and send Symantec Proxy Secure Gateway (ProxySG) log messages to Cloud SIEM.

- ZScaler NSS icon

ZScaler NSS

+ ZScaler NSS icon

ZScaler NSS

Configure collection of ZScaler NSS log messages to be parsed by Cloud SIEM's system parser for ZScaler NSS.

- Zscaler Private Access icon

Zscaler Private Access

+ Zscaler Private Access icon

Zscaler Private Access

Configure an HTTP source to ingest Zscaler Private Access log messages and send them to Cloud SIEM's system parser.

diff --git a/docs/cse/integrations/index.md b/docs/cse/integrations/index.md index ec62cc192a..20a53b392b 100644 --- a/docs/cse/integrations/index.md +++ b/docs/cse/integrations/index.md @@ -12,37 +12,37 @@ In this section, we'll introduce the following concepts:
- Icon of two screens

ThreatQ Source

+ Icon of two screens

ThreatQ Source

Learn how to set up a ThreatQ source.

- Icon of two screens

Insight Enrichment Server

+ Icon of two screens

Insight Enrichment Server

Learn how to automatically enrich Cloud SIEM insights.

- Icon of two screens

Enable VirusTotal Enrichment

+ Icon of two screens

Enable VirusTotal Enrichment

Learn how to enrich signals based on queries it runs against VirusTotal.

- Icon of two screens

TAXII Feed

+ Icon of two screens

TAXII Feed

Learn how to integrate Cloud SIEM with a TAXII threat intelligence feed.

- Icon of two screens

Security Incident Response (SIR)

+ Icon of two screens

Security Incident Response (SIR)

Learn to install and configure the integration between Sumo Logic Cloud SIEM and ServiceNow's SIR.

- Icon of two screens

Enrichments

+ Icon of two screens

Enrichments

Learn how enrichments can add information to signals, entities, and insights.

diff --git a/docs/cse/match-lists-suppressed-lists/index.md b/docs/cse/match-lists-suppressed-lists/index.md index 1b7776f233..8a8af5703c 100644 --- a/docs/cse/match-lists-suppressed-lists/index.md +++ b/docs/cse/match-lists-suppressed-lists/index.md @@ -13,31 +13,31 @@ In this section, we'll introduce the following concepts:
- List icon

Create a Match List

+ List icon

Create a Match List

Learn about match lists, their purpose, usage, and how to create them.

- List icon

Custom match list Columns

+ List icon

Custom match list Columns

Learn how to define custom columns for use in match lists.

- List icon

Match Fields Reference

+ List icon

Match Fields Reference

Learn what record fields a match list with a given target column will be compared to.

- List icon

Entity Tags and Standard Match Lists

+ List icon

Entity Tags and Standard Match Lists

Learn how to identify specific entities that should be treated differently during Cloud SIEM rule processing.

- List icon

Suppressed Lists

+ List icon

Suppressed Lists

Learn to suppress signals that contain a particular indicator value in any of the signal's records.

diff --git a/docs/cse/records-signals-entities-insights/index.md b/docs/cse/records-signals-entities-insights/index.md index e9e0cb5f3e..0082578c36 100644 --- a/docs/cse/records-signals-entities-insights/index.md +++ b/docs/cse/records-signals-entities-insights/index.md @@ -13,73 +13,73 @@ In this section, we'll introduce the following concepts:
- Icon of a shield on a flow diagram

Insight Generation Settings

+ Icon of a shield on a flow diagram

Insight Generation Settings

Learn how to configure the detection window and the threshold activity score for insight generation.

- Icon of a shield on a flow diagram

Custom Insights

+ Icon of a shield on a flow diagram

Custom Insights

Learn how to set up custom insight configurations.

- Icon of a shield on a flow diagram

View and Manage Entities

+ Icon of a shield on a flow diagram

View and Manage Entities

Learn about all the entities in Cloud SIEM and their activity scores.

- Icon of a shield on a flow diagram

Entity Criticality

+ Icon of a shield on a flow diagram

Entity Criticality

Learn how to adjust the severity of signals for specific entities.

- Icon of a shield on a flow diagram

Custom Entity Types

+ Icon of a shield on a flow diagram

Custom Entity Types

Learn how to create custom entity types in Cloud SIEM.

- Icon of a shield on a flow diagram

Entity Groups

+ Icon of a shield on a flow diagram

Entity Groups

Learn how to automatically group entities in terms of criteria like name or IP address.

- Icon of a shield on a flow diagram

Entity Lookup Tables

+ Icon of a shield on a flow diagram

Entity Lookup Tables

Learn how to normalize the names of users and hosts (machines) in your environment.

- Icon of a shield on a flow diagram

View Records for a Signal

+ Icon of a shield on a flow diagram

View Records for a Signal

Learn how to view records associated with a signal in Cloud SIEM.

- Icon of a shield on a flow diagram

Signal Suppression

+ Icon of a shield on a flow diagram

Signal Suppression

Learn about ways to suppress and exclude Cloud SIEM signals from the insight generation process.

- Icon of a shield on a flow diagram

Search Sumo Logic for Cloud SIEM Records

+ Icon of a shield on a flow diagram

Search Sumo Logic for Cloud SIEM Records

Learn to search the Sumo Logic platform for records and signals that have been forwarded from Cloud SIEM.

- Icon of a shield on a flow diagram

Using Tags

+ Icon of a shield on a flow diagram

Using Tags

Learn how to add context to Cloud SIEM items, and search and filter items by tag.

diff --git a/docs/cse/rules/index.md b/docs/cse/rules/index.md index c1722544bf..cfbbfe4948 100644 --- a/docs/cse/rules/index.md +++ b/docs/cse/rules/index.md @@ -13,103 +13,103 @@ In this section, we'll introduce the following concepts:
- Flow diagram icon

About Cloud SIEM Rules

+ Flow diagram icon

About Cloud SIEM Rules

Learn about Cloud SIEM rules, rules syntax, and how to write rules.

- Flow diagram icon

Rules Status

+ Flow diagram icon

Rules Status

Learn about Cloud SIEM rules statuses and how to address rules in a degraded or failed state.

- Flow diagram icon

Before You Write a Custom Rule

+ Flow diagram icon

Before You Write a Custom Rule

Learn how to plan a custom rule and prototype rule expressions.

- Flow diagram icon

Rules Syntax

+ Flow diagram icon

Rules Syntax

Learn about the functions you can use when writing Cloud SIEM rules.

- Flow diagram icon

Match Rule

+ Flow diagram icon

Match Rule

Learn how to write a match rule.

- Flow diagram icon

Chain Rule

+ Flow diagram icon

Chain Rule

Learn how to write a chain rule.

- Flow diagram icon

Aggregation Rule

+ Flow diagram icon

Aggregation Rule

Learn how to write an Aggregation rule.

- Flow diagram icon

Threshold Rule

+ Flow diagram icon

Threshold Rule

Learn how to write a Threshold rule.

- Flow diagram icon

First Seen Rule

+ Flow diagram icon

First Seen Rule

Learn how to write a First Seen rule.

- Flow diagram icon

Outlier Rule

+ Flow diagram icon

Outlier Rule

Learn how to write an Outlier rule.

- Flow diagram icon

Built-In Rules

+ Flow diagram icon

Built-In Rules

Look at the various page lists and Cloud SIEM's built-in rules.

- Flow diagram icon

Import YARA Rules

+ Flow diagram icon

Import YARA Rules

Learn how to import YARA rules from GitHub into Cloud SIEM.

- Flow diagram icon

Normalized Authentication Rules

+ Flow diagram icon

Normalized Authentication Rules

Detect activities that compromise accounts using authentication logs.

- Flow diagram icon

Normalized Threat Rules

+ Flow diagram icon

Normalized Threat Rules

Learn about Cloud SIEM’s built-in normalized threat rules.

- Flow diagram icon

Rule Tuning

+ Flow diagram icon

Rule Tuning

Learn how to create and use tuning expressions for rules.

- Flow diagram icon

Tailor a Global Rule

+ Flow diagram icon

Tailor a Global Rule

Learn how to tailor global (built-in) rules in Cloud SIEM.

- Flow diagram icon

Insight Trainer

+ Flow diagram icon

Insight Trainer

Learn how to adjust rules to improve insight generation.

diff --git a/docs/cse/schema/index.md b/docs/cse/schema/index.md index fc70a27384..dd587355b0 100644 --- a/docs/cse/schema/index.md +++ b/docs/cse/schema/index.md @@ -11,61 +11,61 @@ This guide has information about Cloud SIEM schemas. In this section, we'll intr
- Flow diagram icon

Record Processing Pipeline

+ Flow diagram icon

Record Processing Pipeline

Learn how Cloud SIEM transforms incoming raw messages into records.

- Flow diagram icon

Cloud SIEM Schema Attributes

+ Flow diagram icon

Cloud SIEM Schema Attributes

Learn about Cloud SIEM schema attributes.

- Flow diagram icon

Mappable Attributes

+ Flow diagram icon

Mappable Attributes

Learn what Cloud SIEM schema attributes you can map to records.

- Flow diagram icon

Record Types

+ Flow diagram icon

Record Types

Learn about the record types to which you can map schema attributes.

- Flow diagram icon

Parsing Language Reference

+ Flow diagram icon

Parsing Language Reference

Parsing is the first step in the Cloud SIEM record processing pipeline.

- Flow diagram icon

Log Mapping

+ Flow diagram icon

Log Mapping

Learn how to create a log mapping for structured messages.

- Flow diagram icon

Normalized Classification

+ Flow diagram icon

Normalized Classification

Set up schema fields with an enforced, Cloud SIEM-defined output.

- Flow diagram icon

Field Mappings

+ Flow diagram icon

Field Mappings

Set up field mappings for messages that you want to be processed by Cloud SIEM's normalized threat rules.

- Flow diagram icon

Parser Editor

+ Flow diagram icon

Parser Editor

Learn how to use the Parser Editor to configure and test a custom parser.

- Flow diagram icon

Username and Hostname Normalization

+ Flow diagram icon

Username and Hostname Normalization

Learn how to import YARA rules from GitHub into Cloud SIEM.

diff --git a/docs/cse/sensors/index.md b/docs/cse/sensors/index.md index 6ad1e09bd3..0e63c31d0e 100644 --- a/docs/cse/sensors/index.md +++ b/docs/cse/sensors/index.md @@ -14,31 +14,31 @@ In this section, we'll introduce the following concepts:
- Document icon

Ingest Zeek Logs

+ Document icon

Ingest Zeek Logs

Learn how to collect Zeek (Bro) logs and ingest them to Cloud SIEM.

- Database icon

Sensor Download Locations

+ Database icon

Sensor Download Locations

Learn about where to download the Cloud SIEM Network Sensor that's specific to your Cloud SIEM deployment.

- Arrows icon

Network Sensor Deployment

+ Arrows icon

Network Sensor Deployment

Learn about how to deploy and configure a Cloud SIEM Network Sensor.

- Wrench icon

Network Sensor Troubleshooting

+ Wrench icon

Network Sensor Troubleshooting

Learn how to troubleshoot problems with the Cloud SIEM Network Sensor.

- Wrench icon

Log Sensor Troubleshooting

+ Wrench icon

Log Sensor Troubleshooting

Learn how to collect Log Sensor status and data to support troubleshooting efforts.

diff --git a/docs/cse/troubleshoot/index.md b/docs/cse/troubleshoot/index.md index 6450287f5f..45603d2c20 100644 --- a/docs/cse/troubleshoot/index.md +++ b/docs/cse/troubleshoot/index.md @@ -11,19 +11,19 @@ This section contains articles to help you troubleshoot problems with Cloud SIEM
- Troubleshoot icon

Troubleshoot Parsers

+ Troubleshoot icon

Troubleshoot Parsers

Learn how to troubleshoot problems with log parsers.

- Troubleshoot icon

Troubleshoot Mappers

+ Troubleshoot icon

Troubleshoot Mappers

Learn how to troubleshoot problems with log mappers.

- Troubleshoot icon

Troubleshoot Rules

+ Troubleshoot icon

Troubleshoot Rules

Learn how to troubleshoot problems with rules.

diff --git a/docs/dashboards/index.md b/docs/dashboards/index.md index dd13fa6019..2ae58b38b0 100644 --- a/docs/dashboards/index.md +++ b/docs/dashboards/index.md @@ -16,103 +16,103 @@ In this section, we'll introduce the following concepts:
- icon

About Dashboards

+ icon

About Dashboards

Learn about the benefits of Sumo Logic dashboards and how they seamlessly integrate logs, metrics, and traces data.

- icon

Migrating from Legacy Dashboards

+ icon

Migrating from Legacy Dashboards

Learn how to migrate data from our legacy dashboards solution.

- icon

Create a Dashboard

+ icon

Create a Dashboard

Create and customize dashboards with panels and queries.

- icon

Create a Dashboard for Child Orgs (MSSPs)

+ icon

Create a Dashboard for Child Orgs (MSSPs)

Create and customize dashboards with panels and queries for child orgs.

- icon

Dashboard Panels

+ icon

Dashboard Panels

Learn about the various Dashboard panels and the types of data best suited for each.

- icon

Linking Together Multiple Dashboards

+ icon

Linking Together Multiple Dashboards

Learn how to quickly link dashboards together to view related data.

- icon

Explore Monitoring Dashboards

+ icon

Explore Monitoring Dashboards

Monitoring dashboards give you an easy way to view and navigate the hierarchy of your environment.

- icon

Set Dashboard and Panel Time Ranges

+ icon

Set Dashboard and Panel Time Ranges

Learn how to set dashboard and panel time ranges.

- icon

Exporting Dashboards

+ icon

Exporting Dashboards

Learn how to export dashboards as PDF or PNG files.

- icon

FAQ

+ icon

FAQ

Find answers to frequently asked questions about our dashboards.

- icon

Root Cause Investigation

+ icon

Root Cause Investigation

Use dashboards to investigate root causes of a spike of interest.

- icon

Locate Deviations in a Time Series

+ icon

Locate Deviations in a Time Series

Learn how to create charts that locate deviations and outliers in a time series.

- icon

Restricted Operators in Dashboards

+ icon

Restricted Operators in Dashboards

Learn about the restrictions when you use operators with dashboards.

- icon

Sharing Dashboards

+ icon

Sharing Dashboards

Learn how to share a custom dashboard with colleagues.

- icon

Sharing Dashboards Outside Your Organization

+ icon

Sharing Dashboards Outside Your Organization

Learn how to share a custom dashboard outside your organization.

- icon

Advanced Features

+ icon

Advanced Features

Learn about advanced dashboard features.

diff --git a/docs/get-started/index.md b/docs/get-started/index.md index ef80866b0a..137663b6e6 100644 --- a/docs/get-started/index.md +++ b/docs/get-started/index.md @@ -19,55 +19,55 @@ Let's get started!
- icon

Sign up

+ icon

Sign up

Sign up for a free trial and activate your account.

- icon

Sumo Quickstart

+ icon

Sumo Quickstart

Get up and running quickly with Sumo Logic.

- icon

Sumo Overview

+ icon

Sumo Overview

Before diving in, check out our Sumo Logic overview and micro lessons.

- icon

Onboarding Tasks

+ icon

Onboarding Tasks

Must-do onboarding tasks for users and admins.

- icon

Account Preferences

+ icon

Account Preferences

Account settings and credentials.

- icon

System Req.

+ icon

System Req.

Supported browsers and other requirements.

- icon

App Installation

+ icon

App Installation

How to install Sumo Logic apps and integrations.

- iconicon

Training

+ iconicon

Training

Sumo Logic Training and Certification offerings.

- icon

Help

+ icon

Help

Get help from Sumo Docs, Support, and more.

diff --git a/docs/integrations/account-plans.md b/docs/integrations/account-plans.md index ca7bc2a239..8133b2165d 100644 --- a/docs/integrations/account-plans.md +++ b/docs/integrations/account-plans.md @@ -19,7 +19,7 @@ Use this page to determine which apps are available based on your account plan. Enterprise Suite - Global Intelligence for AWS CloudTrail SecOps + [Global Intelligence for AWS CloudTrail SecOps](/docs/integrations/amazon-aws/global-intelligence-cloudtrail-secops) ✓ @@ -27,7 +27,7 @@ Use this page to determine which apps are available based on your account plan. ✓ - Global Intelligence for Amazon GuardDuty + [Global Intelligence for Amazon GuardDuty](/docs/integrations/amazon-aws/global-intelligence-guardduty) ✓ @@ -35,7 +35,7 @@ Use this page to determine which apps are available based on your account plan. ✓ - Enterprise Audit Apps + [Enterprise Audit Apps](/docs/integrations/sumo-apps/enterprise-audit) ✓ ✓ @@ -43,7 +43,7 @@ Use this page to determine which apps are available based on your account plan. ✓ - PCI Compliance App + [PCI Compliance App](/docs/integrations/pci-compliance) ✓ ✓ @@ -51,7 +51,7 @@ Use this page to determine which apps are available based on your account plan. ✓ - Infrequent Data Tier + [Infrequent Data Tier](/docs/integrations/sumo-apps/infrequent-data-tier) @@ -80,27 +80,25 @@ Use this page to determine which apps are available based on your account plan. Enterprise - Global Intelligence for AWS CloudTrail SecOps + [Global Intelligence for AWS CloudTrail SecOps](/docs/integrations/amazon-aws/global-intelligence-cloudtrail-secops) ✓ ✓ - Global Intelligence for Amazon GuardDuty + [Global Intelligence for Amazon GuardDuty](/docs/integrations/amazon-aws/global-intelligence-guardduty) ✓ ✓ - Global Intelligence for AWS CloudTrail DevOps + [Global Intelligence for AWS CloudTrail DevOps](/docs/integrations/amazon-aws/global-intelligence-cloudtrail-devops) ✓ ✓ - - ✓ - Enterprise Audit Apps + [Enterprise Audit Apps](/docs/integrations/sumo-apps/enterprise-audit) ✓ ✓ diff --git a/docs/integrations/amazon-aws/aws-privatelink.md b/docs/integrations/amazon-aws/aws-privatelink.md index 939c9ceee4..2fbd726b42 100644 --- a/docs/integrations/amazon-aws/aws-privatelink.md +++ b/docs/integrations/amazon-aws/aws-privatelink.md @@ -11,7 +11,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Beta

+

Beta

diff --git a/docs/integrations/amazon-aws/index.md b/docs/integrations/amazon-aws/index.md index 8242e1e9df..d7a5c667e3 100644 --- a/docs/integrations/amazon-aws/index.md +++ b/docs/integrations/amazon-aws/index.md @@ -12,371 +12,371 @@ This guide has documentation for all of the apps that Sumo provides for Amazon a
Thumbnail icon -

Amazon AppFlow

+

Amazon AppFlow

A guide to the Sumo Logic integration for Amazon AppFlow.

Thumbnail icon -

Amazon AppStream 2.0

+

Amazon AppStream 2.0

A guide to the Sumo Logic integration for Amazon AppStream 2.0.

Thumbnail icon -

Amazon Athena

+

Amazon Athena

A guide to the Sumo Logic integration for Amazon Athena.

Thumbnail icon -

AWS Amplify

+

AWS Amplify

A guide to the Sumo Logic integration for AWS Amplify.

Thumbnail icon -

AWS App Runner

+

AWS App Runner

A guide to the Sumo Logic integration for AWS App Runner.

Thumbnail icon -

AWS AppSync

+

AWS AppSync

A guide to the Sumo Logic integration for AWS AppSync.

Thumbnail icon -

AWS Backup

+

AWS Backup

A guide to the Sumo Logic integration for AWS Backup.

Thumbnail icon -

Amazon Bedrock

+

Amazon Bedrock

A guide to the Sumo Logic integration for Amazon Bedrock.

Thumbnail icon -

AWS Certificate Manager

+

AWS Certificate Manager

A guide to the Sumo Logic integration for AWS Certificate Manager.

Thumbnail icon -

AWS Chatbot

+

AWS Chatbot

A guide to the Sumo Logic integration for AWS Chatbot.

Thumbnail icon -

AWS Private Certificate Authority

+

AWS Private Certificate Authority

A guide to the Sumo Logic integration for AWS Private Certificate Authority.

Thumbnail icon -

Amazon CloudFront

+

Amazon CloudFront

A guide to the Sumo Logic app for Amazon CloudFront.

Thumbnail icon -

Amazon DynamoDB

+

Amazon DynamoDB

A guide to the Sumo Logic app for Amazon DynamoDB.

Thumbnail icon -

Amazon EKS - Control Plane

+

Amazon EKS - Control Plane

A guide to the Sumo Logic app Amazon EKS Control Plane.

Thumbnail icon -

Amazon ElastiCache

+

Amazon ElastiCache

A guide to the Sumo Logic app for Amazon ElastiCache.

Thumbnail icon -

Amazon ECS

+

Amazon ECS

A guide to the Sumo Logic app for Amazon ECS.

Thumbnail icon -

Amazon ECS CW

+

Amazon ECS CW

A guide to our app for Amazon ECS CloudWatch.

Thumbnail icon -

Amazon GuardDuty

+

Amazon GuardDuty

A guide to the Sumo Logic app for Amazon GuardDuty.

Thumbnail icon -

Amazon GuardDuty Benchmark

+

Amazon GuardDuty Benchmark

A guide to the Sumo Logic app for Amazon GuardDuty Benchmark.

Thumbnail icon -

GI for Amazon GuardDuty

+

GI for Amazon GuardDuty

A guide to the Sumo Logic app for GI for Amazon GuardDuty.

Thumbnail icon -

Amazon Inspector

+

Amazon Inspector

A guide to the Sumo Logic app for Amazon Inspector.

Thumbnail icon -

Amazon Inspector App Classic

+

Amazon Inspector App Classic

A guide to the Sumo Logic app for Amazon Inspector App Classic.

Thumbnail icon -

Amazon Kinesis - Streams Classic

+

Amazon Kinesis - Streams Classic

A guide to our app for Amazon Kinesis - Streams.

Thumbnail icon -

Amazon OpenSearch

+

Amazon OpenSearch

Learn about the collection process for the Amazon OpenSearch Service.

Thumbnail icon -

AWS Network Load Balancer

+

AWS Network Load Balancer

A guide to the Sumo Logic app for AWS Network Load Balancer.

Thumbnail icon -

Amazon RDS

+

Amazon RDS

A guide to the Sumo Logic app for Amazon RDS.

Thumbnail icon -

Amazon Redshift ULM

+

Amazon Redshift ULM

A guide to our app for Amazon Redshift ULM.

Thumbnail icon -

Route53 Resolver Security

+

Route53 Resolver Security

A guide to our app for Route53 Resolver Security.

Thumbnail icon -

Amazon S3 Audit

+

Amazon S3 Audit

A guide to the Sumo Logic app for Amazon S3 Audit.

Thumbnail icon -

Amazon Security QuickStart

+

Amazon Security QuickStart

A guide to our Security QuickStart app.

Thumbnail icon -

Amazon SES

+

Amazon SES

A guide to the Sumo Logic app for Amazon SES.

Thumbnail icon -

Amazon SNS

+

Amazon SNS

A guide to the Sumo Logic app for Amazon SNS.

Thumbnail icon -

Amazon SQS

+

Amazon SQS

A guide to the Sumo Logic app for Amazon SQS.

Thumbnail icon -

VPC Flow Logs

+

VPC Flow Logs

A guide to the Sumo Logic app for Amazon VPC Flow Logs.

Thumbnail icon -

PCI Compliance - VPC Flow Logs

+

PCI Compliance - VPC Flow Logs

A guide to our PCI app for VPC Flow Logs.

Thumbnail icon -

AWS API Gateway

+

AWS API Gateway

A guide to the Sumo Logic app for AWS API Gateway.

Thumbnail icon -

AWS ALB

+

AWS ALB

A guide to our AWS Application Load Balancer app.

Thumbnail icon -

AWS Classic Load Balancer

+

AWS Classic Load Balancer

A guide to our Classic Load Balancer app.

Thumbnail icon -

AWS CloudTrail

+

AWS CloudTrail

A guide to the Sumo Logic app for AWS CloudTrail.

Thumbnail icon -

GI for AWS CloudTrail SecOps

+

GI for AWS CloudTrail SecOps

A guide to the GI for AWS CloudTrail SecOps app.

Thumbnail icon -

GI for AWS CloudTrail DevOps

+

GI for AWS CloudTrail DevOps

A guide to the GI for AWS CloudTrail DevOps app.

Thumbnail icon -

PCI Compliance - CloudTrail

+

PCI Compliance - CloudTrail

A guide to our PCI CloudTrail app.

Thumbnail icon -

AWS Config

+

AWS Config

A guide to the Sumo Logic app for AWS Config.

icon -

AWS Cost Explorer

+

AWS Cost Explorer

A guide to the Sumo Logic app for AWS Cost Explorer.

Thumbnail icon -

AWS EC2 CW Metrics

+

AWS EC2 CW Metrics

A guide to our app for AWS EC2 CW Metrics.

Thumbnail icon -

AWS EC2 Host Metrics

+

AWS EC2 Host Metrics

A guide to our app for AWS EC2 Host Metrics.

Thumbnail icon -

AWS Lambda

+

AWS Lambda

A guide to the Sumo Logic app for AWS Lambda.

Thumbnail icon -

AWS Network Firewall

+

AWS Network Firewall

A guide to our app for AWS Network Firewall.

Thumbnail icon -

AWS Security Hub CSPM

+

AWS Security Hub CSPM

A guide to the Sumo Logic app for AWS Security Hub CSPM.

Thumbnail icon -

AWS WAF

+

AWS WAF

A guide to the Sumo Logic app for AWS WAF.

Thumbnail icon -
CIS AWS Foundations Benchmark App
+
CIS AWS Foundations Benchmark App

A guide to our CIS AWS Foundations Benchmark app.

Thumbnail icon -

AWS Foundations Benchmark App

+

AWS Foundations Benchmark App

A guide to the Sumo Logic app for AWS Threat Intel.

Thumbnail icon -

Cloud Infrastructure Security for AWS

+

Cloud Infrastructure Security for AWS

A guide to our Cloud Infrastructure Security for AWS app.

diff --git a/docs/integrations/app-development/index.md b/docs/integrations/app-development/index.md index 079b3cff53..1abce0db05 100644 --- a/docs/integrations/app-development/index.md +++ b/docs/integrations/app-development/index.md @@ -11,62 +11,62 @@ Sumo Logic provides apps for platforms and tools that support software developme
- Thumbnail icon

Bitbucket

+ Thumbnail icon

Bitbucket

A guide to Sumo Logic apps for Bitbucket.

- Thumbnail icon

GitHub

+ Thumbnail icon

GitHub

A guide to Sumo Logic apps for GitHub.

- Thumbnail icon

GitLab

+ Thumbnail icon

GitLab

A guide to Sumo Logic apps for GitLab.

- Thumbnail icon

Jenkins

+ Thumbnail icon

Jenkins

A guide to Sumo Logic apps for Jenkins.

- Thumbnail icon

JFrog Artifactory

+ Thumbnail icon

JFrog Artifactory

A guide to Sumo Logic apps for JFrog Artifactory.

- Thumbnail icon

JFrog Xray

+ Thumbnail icon

JFrog Xray

A guide to Sumo Logic apps for JFrog Xray.

Thumbnail icon -

Jira

+

Jira

A guide to Sumo Logic apps for Jira.

- Thumbnail icon

Jira Cloud

+ Thumbnail icon

Jira Cloud

A guide to Sumo Logic apps for Jira Cloud.

- Thumbnail icon

JMX

+ Thumbnail icon

JMX

A guide to Sumo Logic apps for JMX.

- Thumbnail icon

Puppet

+ Thumbnail icon

Puppet

A guide to Sumo Logic apps for Puppet.

diff --git a/docs/integrations/cloud-security-monitoring-analytics/index.md b/docs/integrations/cloud-security-monitoring-analytics/index.md index 8a2b0ac8e1..2093dd3bf2 100644 --- a/docs/integrations/cloud-security-monitoring-analytics/index.md +++ b/docs/integrations/cloud-security-monitoring-analytics/index.md @@ -16,84 +16,84 @@ import CisNote from '../../reuse/cis-note.md';
Thumbnail icon -

Amazon GuardDuty

+

Amazon GuardDuty

A guide to Amazon GuardDuty Cloud Security Monitoring and Analytics.

Thumbnail icon -

Amazon VPC Flow

+

Amazon VPC Flow

A guide to the Sumo Logic app for Amazon VPC Flow.

Amazon CloudTrail - Cloud Security Monitoring and Analytics icon -

Amazon CloudTrail

+

Amazon CloudTrail

A guide to the Sumo Logic app for Amazon CloudTrail - Cloud Security Monitoring and Analytics

Thumbnail icon -

AWS Security Hub< - OCSF

+

AWS Security Hub< - OCSF

A guide to the Sumo Logic app for AWS Security Hub - OCSF.

Thumbnail icon -

AWS Security Hub

+

AWS Security Hub

A guide to the Sumo Logic app for AWS Security Hub.

Thumbnail icon -

WAF

+

WAF

A guide to the Sumo Logic app for AWS WAF Security Analytics.

Thumbnail icon -

Linux

+

Linux

A guide to the Sumo Logic app for Linux Cloud Security Monitoring and Analytics.

Thumbnail icon -

Linux - OpenTelemetry

+

Linux - OpenTelemetry

A guide to the Sumo Logic app for Linux Cloud Security Monitoring and Analytics via OpenTelemetry filelog receiver.

Thumbnail icon -

Palo Alto Firewall 9

+

Palo Alto Firewall 9

A guide to the Sumo Logic app for Palo Alto Firewall 9 - Cloud Security Monitoring and Analytics.

Thumbnail icon -

Palo Alto Firewall 10

+

Palo Alto Firewall 10

A guide to the Sumo Logic app for Palo Alto Firewall 10 - Cloud Security Monitoring and Analytics.

Thumbnail icon -

Palo Alto Firewall 11

+

Palo Alto Firewall 11

A guide to the Sumo Logic app for Palo Alto Firewall 11.

Thumbnail icon -

Windows

+

Windows

A guide to the Sumo Logic app for Windows - Cloud Security Monitoring and Analytics.

diff --git a/docs/integrations/containers-orchestration/index.md b/docs/integrations/containers-orchestration/index.md index fb1f75b3dd..d707c90390 100644 --- a/docs/integrations/containers-orchestration/index.md +++ b/docs/integrations/containers-orchestration/index.md @@ -12,77 +12,77 @@ This guide has documentation Sumo apps for container management and orchestratio
Thumbnail icon -

Active MQ

+

Active MQ

A guide to the Sumo Logic App for ActiveMQ.

Thumbnail icon -

Docker Community Edition

+

Docker Community Edition

A guide to Sumo Logic app for Docker Community Edition.

Thumbnail icon -

Docker ULM

+

Docker ULM

A guide to the Sumo Logic app for Docker ULM.

Thumbnail icon -

Kafka

+

Kafka

A guide to the Sumo Logic app for Kafka related features and technologies.

Thumbnail icon -

Strimzi Kafka

+

Strimzi Kafka

A guide to collecting logs and metrics for Strimzi Kafka.

Thumbnail icon -

Kubernetes

+

Kubernetes

A guide to the Sumo Logic app for Kubernetes.

Thumbnail icon -

Kubernetes Control Plane

+

Kubernetes Control Plane

A guide to the Sumo Logic app for Kubernetes Control Pane.

Thumbnail icon -

RabbitMQ

+

RabbitMQ

A guide to the Sumo Logic app for RabbitMQ.

Thumbnail icon -

VMware

+

VMware

A guide to the Sumo Logic app for VMware.

Thumbnail icon -

VMware Legacy

+

VMware Legacy

A guide to the Sumo Logic app for VMware Legacy.

Thumbnail icon -

VMware Tanzu Application Service

+

VMware Tanzu Application Service

A guide to the Sumo Logic app for VMware Tanzu Application Service.

diff --git a/docs/integrations/databases/index.md b/docs/integrations/databases/index.md index e16136b5fa..6194611c97 100644 --- a/docs/integrations/databases/index.md +++ b/docs/integrations/databases/index.md @@ -11,61 +11,61 @@ This guide has documentation for Sumo apps for database servers.
- Thumbnail icon

Cassandra

+ Thumbnail icon

Cassandra

Monitor the availability, performance, health, and resource utilization of your Cassandra clusters.

- Thumbnail icon

Couchbase

+ Thumbnail icon

Couchbase

Monitor Couchbase cluster activity, errors, and health.

- Thumbnail icon

Elasticsearch

+ Thumbnail icon

Elasticsearch

Monitor the availability, performance, health, and resource utilization of your Elasticsearch clusters.

- Thumbnail icon

MariaDB

+ Thumbnail icon

MariaDB

Monitor the availability, performance, and resource utilization of your MariaDB clusters.

- Thumbnail icon

Memcached

+ Thumbnail icon

Memcached

Monitor the availability, performance, health, and resource utilization of your Memcached clusters.

- Thumbnail icon

MongoDB

+ Thumbnail icon

MongoDB

Insight into overall system health, queries, logins, connections, errors and warnings, replication, and sharding.

- Thumbnail icon

MongoDB Atlas

+ Thumbnail icon

MongoDB Atlas

Visibility into the security posture of your clusters, performance KPIs, and database operational activities.

- Thumbnail icon

MySQL

+ Thumbnail icon

MySQL

Gain insight into the health of your MySQL servers, replication status, and errors.

- Thumbnail icon

PostgreSQL

+ Thumbnail icon

PostgreSQL

Track your performance, logins, connections, errors, and overall system health.

- Thumbnail icon

Redis

+ Thumbnail icon

Redis

Monitor the state of your Redis database cluster.

diff --git a/docs/integrations/global-intelligence/index.md b/docs/integrations/global-intelligence/index.md index 43823ae301..d705b8de5d 100644 --- a/docs/integrations/global-intelligence/index.md +++ b/docs/integrations/global-intelligence/index.md @@ -14,28 +14,28 @@ Our Global Intelligence Service apps provide security teams with valuable real-t
icon -

Global Intelligence for Apache

+

Global Intelligence for Apache

A guide to the Sumo Logic app for GI for Apache.

icon -

Global Intelligence for Apache Tomcat

+

Global Intelligence for Apache Tomcat

A guide to the Sumo Logic app for GI for Apache Tomcat.

-
+
Thumbnail icon -

Global Intelligence for Nginx

+

Global Intelligence for Nginx

A guide to the Sumo Logic app for GI for Nginx.

-
+
icon -

Global Intelligence for Security Insights

+

Global Intelligence for Security Insights

A guide to the Sumo Logic app for GI for Security Insights (Cloud SIEM).

@@ -43,21 +43,22 @@ Our Global Intelligence Service apps provide security teams with valuable real-t
Thumbnail icon -

Global Intelligence for AWS CloudTrail DevOps

+

Global Intelligence for AWS CloudTrail DevOps

A guide to the Sumo Logic app for GI for AWS CloudTrail DevOps.

-
-
+
+
Thumbnail icon -

Global Intelligence for AWS CloudTrail SecOps

+

Global Intelligence for AWS CloudTrail SecOps

A guide to the Sumo Logic app for GI for AWS CloudTrail SecOps.

-
+
Thumbnail icon -

Global Intelligence for Amazon GuardDuty

+

Global Intelligence for Amazon GuardDuty

A guide to the Sumo Logic app for GI for Amazon GuardDuty.

-
+
+
diff --git a/docs/integrations/google/index.md b/docs/integrations/google/index.md index 7b9f65fc45..b015a20db7 100644 --- a/docs/integrations/google/index.md +++ b/docs/integrations/google/index.md @@ -11,341 +11,341 @@ This guide has documentation for all of the apps that Sumo Logic provides for Go
- Thumbnail icon

Google Cloud AlloyDB for PostgreSQL

+ Thumbnail icon

Google Cloud AlloyDB for PostgreSQL

A guide to the Sumo Logic app for Google Cloud AlloyDB for PostgreSQL.

- Thumbnail icon

Google Cloud API Gateway

+ Thumbnail icon

Google Cloud API Gateway

A guide to the Sumo Logic app for Google Cloud API Gateway.

- Thumbnail icon

Google Cloud APIs

+ Thumbnail icon

Google Cloud APIs

A guide to the Sumo Logic app for Google Cloud APIs.

Thumbnail icon -

Google Cloud Armor

+

Google Cloud Armor

A guide to the Sumo Logic app for Google Cloud Armor.

Thumbnail icon -

Google Cloud Auto Scaler

+

Google Cloud Auto Scaler

A guide to the Sumo Logic app for Google Cloud Auto Scaler.

Thumbnail icon -

Google Cloud Backup for GKE

+

Google Cloud Backup for GKE

A guide to the Sumo Logic app for Google Cloud Backup for GKE.

Thumbnail icon -

Google Cloud BigQuery BI Engine

+

Google Cloud BigQuery BI Engine

A guide to the Sumo Logic app for Google Cloud BigQuery BI Engine.

Thumbnail icon -

Google Cloud Bigtable

+

Google Cloud Bigtable

A guide to the Sumo Logic app for Google Cloud Bigtable.

Thumbnail icon -

Google Cloud Certificate Authority Service

+

Google Cloud Certificate Authority Service

A guide to the Sumo Logic app for Google Cloud Certificate Authority Service.

Thumbnail icon -

Google Cloud Certificate Manager

+

Google Cloud Certificate Manager

A guide to the Sumo Logic app for Google Cloud Certificate Manager.

Thumbnail icon -

Google Cloud Composer

+

Google Cloud Composer

A guide to the Sumo Logic app for Google Cloud Composer.

Thumbnail icon -

Google Cloud Dataflow

+

Google Cloud Dataflow

A guide to the Sumo Logic app for Google Cloud Dataflow.

Thumbnail icon -

Google Cloud Dataproc Metastore

+

Google Cloud Dataproc Metastore

A guide to the Sumo Logic app for Google Cloud Dataproc Metastore.

Thumbnail icon -

Google Cloud Dataproc

+

Google Cloud Dataproc

A guide to the Sumo Logic app for Google Cloud Dataproc.

Thumbnail icon -

Google Cloud Datastore

+

Google Cloud Datastore

A guide to the Sumo Logic app for Google Cloud Datastore.

Thumbnail icon -

Google Cloud Datastream

+

Google Cloud Datastream

A guide to the Sumo Logic app for Google Cloud Datastream.

Thumbnail icon -

Google Cloud Deploy

+

Google Cloud Deploy

A guide to the Sumo Logic app for Google Cloud Deploy.

Thumbnail icon -

Google Cloud Filestore

+

Google Cloud Filestore

A guide to the Sumo Logic app for Google Cloud Filestore.

Thumbnail icon -

Google Cloud Firebase

+

Google Cloud Firebase

A guide to the Sumo Logic app for Google Cloud Firebase.

Thumbnail icon -

Google Cloud Firestore

+

Google Cloud Firestore

A guide to the Sumo Logic app for Google Cloud Firestore.

Thumbnail icon -

Google Cloud Fleet Engine

+

Google Cloud Fleet Engine

A guide to the Sumo Logic app for Google Cloud Fleet Engine.

Thumbnail icon -

Google Cloud Interconnect

+

Google Cloud Interconnect

A guide to the Sumo Logic app for Google Cloud Interconnect.

Thumbnail icon -

Google Cloud Logging

+

Google Cloud Logging

A guide to the Sumo Logic app for Google Cloud Logging.

Thumbnail icon -

Google Cloud Memorystore for Redis

+

Google Cloud Memorystore for Redis

A guide to the Sumo Logic app for Google Cloud Memorystore for Redis.

Thumbnail icon -

Google Cloud Net App Cloud Volumes Service

+

Google Cloud Net App Cloud Volumes Service

A guide to the Sumo Logic app for Google Cloud Net App Cloud Volumes Service.

Thumbnail icon -

Google Cloud Network Topology

+

Google Cloud Network Topology

A guide to the Sumo Logic app for Google Cloud Network Topology.

Thumbnail icon -

Google Cloud Pub Sub

+

Google Cloud Pub Sub

A guide to the Sumo Logic app forGoogle Cloud Pub Sub.

Thumbnail icon -

Google Cloud Router

+

Google Cloud Router

A guide to the Sumo Logic app for Google Cloud Router.

- Thumbnail icon

Google Cloud Run

+ Thumbnail icon

Google Cloud Run

A guide to the Sumo Logic app for Google Cloud Run.

- Thumbnail icon

Google Cloud Security Command Center

+ Thumbnail icon

Google Cloud Security Command Center

A guide to the Sumo Logic app for Google Cloud Security Command Center.

- Thumbnail icon

Google Cloud Spanner

+ Thumbnail icon

Google Cloud Spanner

A guide to the Sumo Logic app for Google Cloud Spanner.

- Thumbnail icon

Google Cloud Tasks

+ Thumbnail icon

Google Cloud Tasks

A guide to the Sumo Logic app for Google Cloud Tasks.

- Thumbnail icon

Google Cloud TPU

+ Thumbnail icon

Google Cloud TPU

A guide to the Sumo Logic app for Google Cloud TPU.

- Thumbnail icon

Google Cloud Trace

+ Thumbnail icon

Google Cloud Trace

A guide to the Sumo Logic app for Google Cloud Trace.

- Thumbnail icon

Google Cloud Traffic Director

+ Thumbnail icon

Google Cloud Traffic Director

A guide to the Sumo Logic app for Google Cloud Traffic Director.

- Thumbnail icon

Google Cloud Vertex AI

+ Thumbnail icon

Google Cloud Vertex AI

A guide to the Sumo Logic app for Google Cloud Vertex AI.

- Thumbnail icon

Google Cloud VPN

+ Thumbnail icon

Google Cloud VPN

A guide to the Sumo Logic app for Google Cloud VPN.

- Thumbnail icon

Google App Engine

+ Thumbnail icon

Google App Engine

A guide to the Sumo Logic app for Google App Engine.

- Thumbnail icon

Google BigQuery

+ Thumbnail icon

Google BigQuery

A guide to the Sumo Logic app for Google BigQuery.

Thumbnail icon -

Google Cloud Audit

+

Google Cloud Audit

A guide to the Sumo Logic app for Google Cloud Audit.

Thumbnail icon -

Google Cloud Firewall

+

Google Cloud Firewall

A guide to the Sumo Logic app for Google Cloud Firewall.

- Thumbnail icon

Google Cloud Bigtable

+ Thumbnail icon

Google Cloud Bigtable

A guide to the Sumo Logic app for Google Cloud Bigtable.

- Thumbnail icon

Google Cloud Functions

+ Thumbnail icon

Google Cloud Functions

A guide to the Sumo Logic app for Google Cloud Functions.

Thumbnail icon -

Google Cloud IAM

+

Google Cloud IAM

A guide to the Sumo Logic app for Google Cloud IAM.

Thumbnail icon -

Google Cloud Load Balancing

+

Google Cloud Load Balancing

A guide to the Sumo Logic app for Google Cloud Load Balancing.

Thumbnail icon -

Google Cloud SQL

+

Google Cloud SQL

A guide to the Sumo Logic app for Google Cloud SQL.

Thumbnail icon -

Google Cloud Storage

+

Google Cloud Storage

A guide to the Sumo Logic app for Google Cloud Storage.

Thumbnail icon -

Google Cloud VPC

+

Google Cloud VPC

A guide to the Sumo Logic app for Google Cloud VPC.

- Thumbnail icon

Google Compute Engine

+ Thumbnail icon

Google Compute Engine

A guide to the Sumo Logic app for Google Compute Engine.

Thumbnail icon -

Google Kubernetes Engine (GKE)

+

Google Kubernetes Engine (GKE)

A guide to the Sumo Logic app for Google Kubernetes Engine.

thumbnail icon -

Google Workspace

+

Google Workspace

A guide to the Sumo Logic app for Google Workspace.

diff --git a/docs/integrations/hosts-operating-systems/index.md b/docs/integrations/hosts-operating-systems/index.md index a6ee85c784..030ee9aacc 100644 --- a/docs/integrations/hosts-operating-systems/index.md +++ b/docs/integrations/hosts-operating-systems/index.md @@ -14,28 +14,28 @@ If you're looking for an app for Microsoft Windows, see [Microsoft and Azure](/d
Thumbnail icon -

Host Metrics

+

Host Metrics

A guide to the Sumo Logic app for Host Metrics.

Thumbnail icon -

Host and Process Metrics

+

Host and Process Metrics

A guide to the Sumo Logic app for Host and Process Metrics.

Thumbnail icon -

Linux

+

Linux

A guide to the Sumo Logic app for Linux.

Thumbnail icon -

Linux Performance (Deprecated)

+

Linux Performance (Deprecated)

A guide to the Sumo Logic app for Linux Performance.

diff --git a/docs/integrations/index.md b/docs/integrations/index.md index c982581bf7..3ff6161b68 100644 --- a/docs/integrations/index.md +++ b/docs/integrations/index.md @@ -50,121 +50,121 @@ Watch this tutorial to learn how to use our **App Catalog**.
- Thumbnail icon

Product List

+ Thumbnail icon

Product List

A list of all the products that Sumo Logic integrates with.

- Thumbnail icon

Amazon/AWS

+ Thumbnail icon

Amazon/AWS

A guide to Sumo Logic apps for Amazon and AWS products.

- Thumbnail icon

Microsoft/Azure

+ Thumbnail icon

Microsoft/Azure

A guide to Sumo Logic apps for Microsoft and Azure.

- Thumbnail icon

Google

+ Thumbnail icon

Google

A guide to Sumo Logic apps for Google products, such as Workspace.

- Thumbnail icon

App Development

+ Thumbnail icon

App Development

Monitor your platforms and tools that support software development and automation.

- Thumbnail icon

Containers

+ Thumbnail icon

Containers

A guide to Sumo Logic apps for container management, such as Kubernetes and Docker.

- icon

Cloud Security Monitoring/Analytics

+ icon

Cloud Security Monitoring/Analytics

A guide to Sumo Logic apps for cloud security data source.

- Thumbnail icon

Database Servers

+ Thumbnail icon

Database Servers

A guide to Sumo Logic apps for database servers, such as Oracle and MongoDB.

- icon

Global Intelligence

+ icon

Global Intelligence

Sumo Logic apps for Global Intelligence provide valuable real-time security intelligence.

- Thumbnail icon

Hosts and Operating Systems

+ Thumbnail icon

Hosts and Operating Systems

Monitor host metrics and the Linux OS.

- PCI Compliance icon

PCI Compliance

+ PCI Compliance icon

PCI Compliance

Meet evolving PCI requirements without the data hassle.

- Thumbnail icon

SaaS/Cloud

+ Thumbnail icon

SaaS/Cloud

Learn about Sumo Logic apps for SaaS and Cloud applications.

- Thumbnail icon

SAML

+ Thumbnail icon

SAML

A guide to Sumo Logic apps for SAML.

- thumbnail icon

Security and Threat Detection

+ thumbnail icon

Security and Threat Detection

Learn about Sumo apps for Security and Threat Detection.

- Thumbnail icon

Sumo Logic Apps

+ Thumbnail icon

Sumo Logic Apps

Use these apps to monitor your Sumo Logic org activities and data volume.

- Thumbnail icon

Web Servers

+ Thumbnail icon

Web Servers

A guide to Sumo Logic apps for web servers, such as Apache, Nginx, and Squid Proxy.

- Thumbnail icon

Apps for Sumo Logic Account Plans

+ Thumbnail icon

Apps for Sumo Logic Account Plans

Apps for various Sumo Logic account plans.

- Thumbnail icon

Community Ecosystem Apps

+ Thumbnail icon

Community Ecosystem Apps

Community Ecosystem Apps Listing and program description.

- Thumbnail icon

Partner Ecosystem Apps

+ Thumbnail icon

Partner Ecosystem Apps

Third-party Sumo Logic apps for partners including Auth0, CircleCI, and more.

- Thumbnail icon

Partner Integrations

+ Thumbnail icon

Partner Integrations

Sumo Logic Partner Integrations are provided and supported by our partner network.

diff --git a/docs/integrations/microsoft-azure/index.md b/docs/integrations/microsoft-azure/index.md index 798dec728c..8725c3360b 100644 --- a/docs/integrations/microsoft-azure/index.md +++ b/docs/integrations/microsoft-azure/index.md @@ -12,445 +12,445 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
Thumbnail icon -

Active Directory JSON

+

Active Directory JSON

A guide to the Sumo Logic app for Active Directory JSON.

Thumbnail icon -

Active Directory (Legacy)

+

Active Directory (Legacy)

A guide to the Sumo Logic app for Active Directory (Legacy).

Thumbnail icon -

Azure Active Directory

+

Azure Active Directory

A guide to the Sumo Logic app for Active Directory Azure.

Thumbnail icon -

Azure Analysis Services

+

Azure Analysis Services

A guide to the Sumo Logic integration for Azure Analysis Services.

Thumbnail icon -

Azure Audit

+

Azure Audit

A guide to the Sumo Logic app for Azure Audit.

Thumbnail icon -

Azure API Management

+

Azure API Management

A guide to the Sumo Logic integration for Azure API Management.

Thumbnail icon -

Azure App Configuration

+

Azure App Configuration

A guide to the Sumo Logic integration for Azure App Configuration.

Thumbnail icon -

Azure App Service Environment

+

Azure App Service Environment

A guide to the Sumo Logic integration for Azure App Service Environment.

Thumbnail icon -

Azure App Service Plan

+

Azure App Service Plan

A guide to the Sumo Logic integration for Azure App Service Plan.

Thumbnail icon -

Azure Application Gateway

+

Azure Application Gateway

A guide to the Sumo Logic integration for Azure Application Gateway.

Thumbnail icon -

Azure Automation

+

Azure Automation

A guide to the Sumo Logic integration for Azure Automation.

Thumbnail icon -

Azure Backup

+

Azure Backup

A guide to the Sumo Logic integration for Azure Backup.

Thumbnail icon -

Azure Batch

+

Azure Batch

A guide to the Sumo Logic integration for Azure Batch.

Thumbnail icon -

Azure Cache for Redis

+

Azure Cache for Redis

A guide to the Sumo Logic integration for Azure Cache for Redis.

Thumbnail icon -

Azure Cognitive Search

+

Azure Cognitive Search

A guide to the Sumo Logic integration for Azure Cognitive Search.

Thumbnail icon -

Azure Container Instances

+

Azure Container Instances

Learn about the Sumo Logic collection process for the Azure Container Instances service.

Thumbnail icon -

Azure Cosmos DB for PostgreSQL

+

Azure Cosmos DB for PostgreSQL

A guide to the Sumo Logic integration for Azure Cosmos DB for PostgreSQL.

Thumbnail icon -

Azure Cosmos DB

+

Azure Cosmos DB

A guide to the Sumo Logic integration for Azure Cosmos DB.

Thumbnail icon -

Azure Data Explorer

+

Azure Data Explorer

A guide to the Sumo Logic integration for Azure Data Explorer.

Thumbnail icon -

Azure Data Factory

+

Azure Data Factory

A guide to the Sumo Logic integration for Azure Data Factory.

Thumbnail icon -

Azure Database for MariaDB

+

Azure Database for MariaDB

A guide to the Sumo Logic integration for Azure Database for MariaDB.

Thumbnail icon -

Azure Database for MySQL

+

Azure Database for MySQL

A guide to the Sumo Logic integration for Azure Database for MySQL.

Thumbnail icon -

Azure Database for PostgreSQL

+

Azure Database for PostgreSQL

A guide to the Sumo Logic integration for Azure Database for PostgreSQL.

Thumbnail icon -

Azure Event Grid

+

Azure Event Grid

A guide to the Sumo Logic integration for Azure Event Grid.

Thumbnail icon -

Azure Event Hubs

+

Azure Event Hubs

A guide to the Sumo Logic integration for Azure Event Hubs.

Thumbnail icon -

Azure Front Door

+

Azure Front Door

A guide to the Sumo Logic integration for Azure Front Door.

Thumbnail icon -

Azure Functions

+

Azure Functions

A guide to the Sumo Logic integration for Azure Functions.

Thumbnail icon -

Azure HDInsight

+

Azure HDInsight

A guide to the Sumo Logic integration for Azure HDInsight.

Thumbnail icon -

Azure IoT Hub

+

Azure IoT Hub

A guide to the Sumo Logic integration for Azure IoT Hub.

Thumbnail icon -

Azure Key Vault

+

Azure Key Vault

A guide to the Sumo Logic integration for Azure Key Vault.

Thumbnail icon -

Azure Load Balancer

+

Azure Load Balancer

A guide to the Sumo Logic integration for Azure Load Balancer.

Thumbnail icon -

Azure Logic App

+

Azure Logic App

A guide to the Sumo Logic integration for Azure Logic App.

Thumbnail icon -

Azure Machine Learning

+

Azure Machine Learning

A guide to the Sumo Logic integration for Azure Machine Learning.

Thumbnail icon -

Azure Network Interface

+

Azure Network Interface

A guide to the Sumo Logic integration for Azure Network Interface.

Thumbnail icon -

Azure Notification Hubs

+

Azure Notification Hubs

A guide to the Sumo Logic integration for Azure Notification Hubs.

Thumbnail icon -

Azure IP Addresses

+

Azure IP Addresses

A guide to the Sumo Logic integration for Azure IP Addresses.

Thumbnail icon -

Azure OpenAI

+

Azure OpenAI

A guide to the Sumo Logic integration for Azure OpenAI.

Thumbnail icon -

Azure Relay

+

Azure Relay

A guide to the Sumo Logic integration for Azure Relay.

Thumbnail icon -

Azure Security - Advisor

+

Azure Security - Advisor

A guide to the Sumo Logic integration for Azure Security - Advisor.

- thumbnail icon

Azure Security - Defender for Cloud

+ thumbnail icon

Azure Security - Defender for Cloud

Learn about the Sumo Logic collection process for the Azure Security - Defender for Cloud service.

- thumbnail icon

Azure Security - Microsoft Defender for Identity

+ thumbnail icon

Azure Security - Microsoft Defender for Identity

Learn about the Sumo Logic collection process for the Azure Security - Microsoft Defender for Identity

- thumbnail icon

Azure Security - Microsoft Defender for Office 365

+ thumbnail icon

Azure Security - Microsoft Defender for Office 365

Learn about the Sumo Logic collection process for the Azure Security - Microsoft Defender for Office 365

Thumbnail icon -

Azure Service Bus

+

Azure Service Bus

A guide to the Sumo Logic integration for Azure Service Bus.

Thumbnail icon -

Azure SQL Elastic Pool

+

Azure SQL Elastic Pool

A guide to the Sumo Logic integration for Azure SQL Elastic Pool.

Thumbnail icon -

Azure SQL Managed Instance

+

Azure SQL Managed Instance

A guide to the Sumo Logic integration for Azure SQL Managed Instance.

Thumbnail icon -

Azure Storage

+

Azure Storage

A guide to the Sumo Logic integration for Azure Storage.

Thumbnail icon -

Azure Stream Analytics

+

Azure Stream Analytics

A guide to the Sumo Logic integration for Azure Stream Analytics.

Thumbnail icon -

Azure Synapse Analytics

+

Azure Synapse Analytics

A guide to the Sumo Logic integration for Azure Synapse Analytics.

Thumbnail icon -

Azure Virtual Network

+

Azure Virtual Network

A guide to the Sumo Logic integration for Azure Virtual Network.

Thumbnail icon -

Azure Kubernetes Service Control Plane

+

Azure Kubernetes Service Control Plane

A guide to the Sumo Logic app for Azure Kubernetes Service Control Plane.

Thumbnail icon -

Microsoft Defender for Endpoint

+

Microsoft Defender for Endpoint

A guide to the Sumo Logic app for Microsoft Defender for Endpoint.

Thumbnail icon -

Azure Network Watcher

+

Azure Network Watcher

A guide to the Sumo Logic app for Azure Network Watcher.

Thumbnail icon -

Azure SQL

+

Azure SQL

A guide to the Sumo Logic app for Azure SQL.

Thumbnail icon -

Azure Web Apps

+

Azure Web Apps

A guide to the Sumo Logic app for Azure Web Apps.

Thumbnail icon -

IIS 7

+

IIS 7

A guide to the Sumo Logic app for IIS 7.

Thumbnail icon -

Microsoft Dynamics 365 Customer Insights

+

Microsoft Dynamics 365 Customer Insights

A guide to the Sumo Logic app for Microsoft Dynamics 365 Customer Insights.

Thumbnail icon -

Microsoft Graph Identity Protection

+

Microsoft Graph Identity Protection

A guide to the Sumo Logic app for Microsoft Graph Identity Protection.

Thumbnail icon -

Microsoft Office Audit 365

+

Microsoft Office Audit 365

A guide to the Sumo Logic app for Microsoft Office Audit 365.

Thumbnail icon -

Microsoft SQL Server

+

Microsoft SQL Server

A guide to the Sumo Logic app for Microsoft SQL Server.

Thumbnail icon -

Microsoft Teams

+

Microsoft Teams

A guide to the Sumo Logic app for Microsoft Teams.

Thumbnail icon -

PCI Compliance for Windows JSON

+

PCI Compliance for Windows JSON

A guide to the Sumo Logic app for PCI Compliance for Windows JSON.

Thumbnail icon -

Windows JSON

+

Windows JSON

A guide to the Sumo Logic app for Windows JSON.

Thumbnail icon -

Windows Legacy

+

Windows Legacy

A guide to the Sumo Logic app for Windows Legacy.

Thumbnail icon -

Windows Performance

+

Windows Performance

A guide to the Sumo Logic app for Windows Performance.

diff --git a/docs/integrations/pci-compliance/index.md b/docs/integrations/pci-compliance/index.md index 00d3dea745..07c6d08a62 100644 --- a/docs/integrations/pci-compliance/index.md +++ b/docs/integrations/pci-compliance/index.md @@ -18,56 +18,56 @@ With the Sumo Logic apps for PCI Compliance, you can meet evolving PCI requireme
Thumbnail icon -

PCI Compliance for Linux - OpenTelemetry

+

PCI Compliance for Linux - OpenTelemetry

A guide to the Sumo Logic app for PCI Compliance for Linux.

Thumbnail icon -

PCI Compliance for Windows JSON - OpenTelemetry

+

PCI Compliance for Windows JSON - OpenTelemetry

A guide to the Sumo Logic app for PCI Compliance for Windows JSON using OpenTelemetry.

Thumbnail icon -

PCI Compliance for AWS CloudTrail(Legacy)

+

PCI Compliance for AWS CloudTrail(Legacy)

A guide to the Sumo Logic app for PCI Compliance for AWS CloudTrail(Legacy).

Thumbnail icon -

PCI Compliance for Amazon VPC Flow Logs

+

PCI Compliance for Amazon VPC Flow Logs

A guide to the Sumo Logic app for PCI Compliance for Amazon VPC Flow Logs.

Thumbnail icon -

PCI Compliance for Linux

+

PCI Compliance for Linux

A guide to the Sumo Logic app for PCI Compliance for Linux.

Thumbnail icon -

PCI Compliance for Palo Alto Networks 9

+

PCI Compliance for Palo Alto Networks 9

A guide to the Sumo Logic app for PCI Compliance for Palo Alto Networks 9.

Thumbnail icon -

PCI Compliance for Palo Alto Networks 10 (Legacy)

+

PCI Compliance for Palo Alto Networks 10 (Legacy)

A guide to the Sumo Logic app for PCI Compliance for Palo Alto Networks 10(Legacy).

Thumbnail icon -

PCI Compliance for Windows JSON

+

PCI Compliance for Windows JSON

A guide to the Sumo Logic app for PCI Compliance for Windows JSON.

diff --git a/docs/integrations/product-list/index.md b/docs/integrations/product-list/index.md index 4b1124e819..1211292044 100644 --- a/docs/integrations/product-list/index.md +++ b/docs/integrations/product-list/index.md @@ -22,13 +22,13 @@ See the following articles for the vendors and products that Sumo Logic integrat
- List icon

Product List A-L

+ List icon

Product List A-L

List of vendors and products A-L that Sumo Logic integrates with.

- List icon

Product List M-Z

+ List icon

Product List M-Z

List of vendors and products M-Z that Sumo Logic integrates with.

diff --git a/docs/integrations/saas-cloud/index.md b/docs/integrations/saas-cloud/index.md index ebed89caf9..e33796da2c 100644 --- a/docs/integrations/saas-cloud/index.md +++ b/docs/integrations/saas-cloud/index.md @@ -11,469 +11,469 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
- Thumbnail icon

1Password

+ Thumbnail icon

1Password

1Password helps you monitor your 1Password account’s sign-in and item usage events.

- icon

Abnormal Security

+ icon

Abnormal Security

Gain robust monitoring of email security threats.

- icon

Acquia

+ icon

Acquia

Gain visibility into your key Acquia platform components.

- airtable-icon.png

Airtable

+ airtable-icon.png

Airtable

Monitor and analyze your Airtable audit logs.

- icon

Akamai Cloud Monitor

+ icon

Akamai Cloud Monitor

Analyze and correlate Akamai data with origin data.

- icon

Akamai CPC

+ icon

Akamai CPC

Monitor threats and enforce compliance for client-side web applications using rich dashboards and Akamai CPC data.

- icon

Akamai DataStream

+ icon

Akamai DataStream

Monitor and analyze the performance of Akamai Edge server

- armis-icon.png

Armis

+ armis-icon.png

Armis

Monitor and manage your device security.

- asana-icon.png

Asana

+ asana-icon.png

Asana

Monitor and analyze the Asana data to detect potential security threats related to user activity.

- atlassian-icon.png

Atlassian

+ atlassian-icon.png

Atlassian

Monitor and analyze the critical events of Atlassian data.

- automox-icon.png

Automox

+ automox-icon.png

Automox

Gain insights into Automox events and audit data to enhance security monitoring, streamline endpoint management, and boost operational resilience.

- aws-iam-users-logo

AWS IAM Users

+ aws-iam-users-logo

AWS IAM Users

Gain insights into AWS IAM Users events to enhance user activity and security within your AWS environment.

- bitwarden-icon.png

Bitwarden

+ bitwarden-icon.png

Bitwarden

Gain insights into user activity, security events, and administrative changes within your Bitwarden environment.

- icon

Box

+ icon

Box

Gain insight into user behavior patterns and resources.

- icon

Carbon Black Inventory

+ icon

Carbon Black Inventory

Gain insight into endpoint assets and their security status in your environment.

- icon

Cato Networks

+ icon

Cato Networks

Gain insight into the events and identify potential security threats with admin activities.

- icon

Cisco AMP

+ icon

Cisco AMP

Monitor and analyze the host activity status and file types implicated in cybersecurity incidents.

- icon

Cisco Meraki - C2C

+ icon

Cisco Meraki - C2C

Gain insights into the events and identify potential network events along with admin activities.

- icon

Cisco Umbrella

+ icon

Cisco Umbrella

View analytics on DNS, Proxy, and Audit admin activities.

- icon

Cisco Vulnerability Management

+ icon

Cisco Vulnerability Management

Monitor and manage your organizations software vulnerabilities.

- citrix-cloud-icon

Citrix

+ citrix-cloud-icon

Citrix

Track configuration modifications impacting your environment and admins.

- icon

Cloudflare

+ icon

Cloudflare

Analyze logs, events, and trends from your websites and apps on the Cloudflare network.

- icon

Code42 Incydr

+ icon

Code42 Incydr

Monitor, detect, and respond to potential data threats on your Code42 Incydr platform.

- icon

Confluent Cloud

+ icon

Confluent Cloud

Monitor and analyze streaming activity in Confluent Cloud to ensure secure, reliable, and high-performance data pipelines.

- icon

CrowdStrike Falcon FileVantage

+ icon

CrowdStrike Falcon FileVantage

Monitor and analyze file integrity.

- icon

CrowdStrike FDR Host Inventory

+ icon

CrowdStrike FDR Host Inventory

Monitor and manage your device security.

- icon

CrowdStrike Spotlight

+ icon

CrowdStrike Spotlight

Gather real-time visibility into the vulnerabilities.

- icon

CyberArk Audit

+ icon

CyberArk Audit

Gather information about your organization's cybersecurity practices to strengthen security.

- Thumbnail icon

Digital Guardian ARC

+ Thumbnail icon

Digital Guardian ARC

Monitor, detect, and respond to critical events.

- Thumbnail icon

DocuSign

+ Thumbnail icon

DocuSign

Monitor and secure your DocuSign account.

- Thumbnail icon

Dragos

+ Thumbnail icon

Dragos

Monitor and analyze your Dragos account.

- dropbox-icon.png

Dropbox

+ dropbox-icon.png

Dropbox

Monitor and analyze your Dropbox usage data.

- dropbox-icon.png

Druva Cyber Resilience

+ dropbox-icon.png

Druva Cyber Resilience

Enhance your cybersecurity posture by providing real-time insights.

- Thumbnail icon

Fastly

+ Thumbnail icon

Fastly

Control how and where you serve content, and view performance analytics.

- icon

Gmail Trace Logs

+ icon

Gmail Trace Logs

Monitor spam, malware threats, and dropped or rejected messages.

- icon

Istio

+ icon

Istio

Gain visibility into your Istio and control plane component performance.

- icon

Jamf

+ icon

Jamf

Get critical insights into your organization's Jamf environment.

- icon

JumpCloud Directory Insights

+ icon

JumpCloud Directory Insights

Get critical insights into your organization's JumpCloud Directory Insights environment.

- icon

Kaltura

+ icon

Kaltura

Get critical insights into your content management ecosystem, including total entries, user activity trends, and event distributions.

- icon

Kandji

+ icon

Kandji

Identify security threats by analyzing threat events and device events.

- icon

KnowBe4

+ icon

KnowBe4

Monitor and analyze KnowBe4 Phishing Security logs.

- icon

LastPass

+ icon

LastPass

Identify security threats by analyzing audit events.

- icon

Microsoft Azure AD Inventory

+ icon

Microsoft Azure AD Inventory

Identify security threats by analyzing users and devices logs.

- icon

Microsoft Exchange Trace Logs

+ icon

Microsoft Exchange Trace Logs

Monitor Delivered, Failed, Quarantined, Pending, and Spam messages.

- icon

Mimecast

+ icon

Mimecast

Monitor and analyze Mimecast email data to identify potential threats and improve email security posture.

- icon

Microsoft Graph Security V1

+ icon

Microsoft Graph Security V1

Identify security threats by analyzing alert logs.

- icon

Microsoft Graph Security V2

+ icon

Microsoft Graph Security V2

Identify security threats by analyzing alert logs.

- icon

Miro

+ icon

Miro

Monitoring and investigate Miro potential security threats.

- icon

MS Graph Azure AD Reporting

+ icon

MS Graph Azure AD Reporting

Monitor and analyze user activity, sign-in patterns and provisioning activities.

- icon

Netskope WebTx

+ icon

Netskope WebTx

Monitor, analyze, and secure your web traffic.

- icon

Opsgenie

+ icon

Opsgenie

Gain insight into your incidents and event handling operations.

- icon

PagerDuty V2

+ icon

PagerDuty V2

Monitor PagerDuty V2 incident data.

- icon

PagerDuty V3

+ icon

PagerDuty V3

Monitor PagerDuty V3 incident data.

- icon

Palo Alto Cortex XDR

+ icon

Palo Alto Cortex XDR

Monitor and analyze alerts and incidents from Palo Alto Networks Cortex XDR platform.

- icon

Proofpoint on Demand

+ icon

Proofpoint on Demand

Analyze message logs and improve your security posture.

- icon

Proofpoint TAP

+ icon

Proofpoint TAP

Analyze messages and clicks of malicious URLs to improve your security posture.

- icon

Qualys VMDR

+ icon

Qualys VMDR

Track errors, health, start-up progress, and cloud security.

- icon

Rapid7

+ icon

Rapid7

Monitor asset and vulnerability management activities.

- Thumbnail icon

Salesforce

+ Thumbnail icon

Salesforce

Analyze event logs generated by your Salesforce instance and apps.

- sentinelone-icon.png

SentinelOne

+ sentinelone-icon.png

SentinelOne

Monitor your organization's SentinelOne Threats and Agents logs.

- icon

Slack

+ icon

Slack

Monitor analytics for your Slack users, channels, and access logs for workspaces.

- icon

Snowflake Logs

+ icon

Snowflake Logs

Monitor the key metrics, query performance, and overall health of Snowflake environments to optimize Snowflake's potential.

- icon

Sophos

+ icon

Sophos

Identify security threats by analyzing alerts and events logs.

- icon

Sumo Collection

+ icon

Sumo Collection

Identify, manage, and monitor collectors and sources within Sumo Logic.

- icon

Symantec Endpoint Security Service

+ icon

Symantec Endpoint Security Service

Gain insights into the log data and identify potential security threats.

- icon

Symantec Web Security Service

+ icon

Symantec Web Security Service

Gain insights into the web traffic and identify potential security threats.

- icon

Sysdig Secure

+ icon

Sysdig Secure

Gain insights into container security to protect Kubernetes and containerized environments.

- icon

Tenable

+ icon

Tenable

Gain comprehensive visibility and actionable insights into your organization's security posture.

- icon

Trellix mVision ePO

+ icon

Trellix mVision ePO

Detect, analyze, and respond faster to threats with Trellix mVision ePO for Sumo Logic.

- icon

Trend Micro Vision One

+ icon

Trend Micro Vision One

Analyze alert logs to detect potential security risks.

- icon

Trust Login

+ icon

Trust Login

Analyze authentication events, user activities, and potential security threats.

- icon

Vectra

+ icon

Vectra

Gain visibility into security threats detected across networks, cloud environments, and endpoints.

- icon

VMware Workspace ONE

+ icon

VMware Workspace ONE

Analyze device compliance, encryption, and security status to spot risks and keep devices secure.

- icon

Webex

+ icon

Webex

Monitor and analyse Webex security events, user activities, and system health.

- icon

Workday

+ icon

Workday

Monitor Workday login activity, user activity, and admin activity.

- icon

Zendesk

+ icon

Zendesk

Identify security threats by analyzing audit logs.

- icon

Zimperium

+ icon

Zimperium

Identify security threats and incidents on mobile devices.

- icon

Zoom

+ icon

Zoom

Monitor your organization's Zoom performance, security, and user activity.

diff --git a/docs/integrations/saml/index.md b/docs/integrations/saml/index.md index bbacb2ec90..22f30fa91d 100644 --- a/docs/integrations/saml/index.md +++ b/docs/integrations/saml/index.md @@ -11,19 +11,19 @@ Learn how to use Sumo Logic apps for SAML.
- Thumbnail icon

Auth0

+ Thumbnail icon

Auth0

Sumo Logic app for Auth0.

- Thumbnail icon

Okta

+ Thumbnail icon

Okta

Sumo Logic app for Okta.

- Thumbnail icon

OneLogin

+ Thumbnail icon

OneLogin

Sumo Logic app for OneLogin.

diff --git a/docs/integrations/security-threat-detection/index.md b/docs/integrations/security-threat-detection/index.md index 927dfe689b..c9d424bff3 100644 --- a/docs/integrations/security-threat-detection/index.md +++ b/docs/integrations/security-threat-detection/index.md @@ -15,139 +15,139 @@ import CisNote from '../../reuse/cis-note.md';
- icon

Akamai Security Events

+ icon

Akamai Security Events

A guide to the Sumo Logic app for Akamai Security Events.

- icon

Alert Logic

+ icon

Alert Logic

A guide to the Sumo Logic app for Alert Logic.

- icon

Barracuda WAF

+ icon

Barracuda WAF

A guide to the Sumo Logic app for Barracuda WAF.

- icon

Carbon Black Cloud

+ icon

Carbon Black Cloud

A guide to the Sumo Logic app for Carbon Black Cloud.

- icon

Cisco ASA

+ icon

Cisco ASA

A guide to the Sumo Logic app for Cisco ASA.

- thumbnail icon

Cisco Meraki

+ thumbnail icon

Cisco Meraki

A guide to the Sumo Logic app for Cisco Meraki.

- thumbnail icon

CloudPassage Halo

+ thumbnail icon

CloudPassage Halo

A guide to the Sumo Logic app for CloudPassage Halo.

- thumbnail icon

CrowdStrike Falcon Endpoint Protection

+ thumbnail icon

CrowdStrike Falcon Endpoint Protection

A guide to the Sumo Logic app for CrowdStrike.

- thumbnail icon

Cylance

+ thumbnail icon

Cylance

A guide to the Sumo Logic app for Cylance.

- thumbnail icon

Duo Security

+ thumbnail icon

Duo Security

A guide to the Sumo Logic app for Duo Security.

- thumbnail icon

Evident.io ESP

+ thumbnail icon

Evident.io ESP

A guide to the Sumo Logic app for Evident.io ESP.

- thumbnail icon

F5 - BIG-IP LTM

+ thumbnail icon

F5 - BIG-IP LTM

A guide to the Sumo Logic app for F5 - BIG-IP LTM.

- thumbnail icon

Imperva Incapsula

+ thumbnail icon

Imperva Incapsula

A guide to the Sumo Logic app for Imperva Incapsula.

- thumbnail icon

Netskope Legacy Collection

+ thumbnail icon

Netskope Legacy Collection

A guide to the Sumo Logic app for Netskope Legacy Collection.

- thumbnail icon

Netskope

+ thumbnail icon

Netskope

A guide to the Sumo Logic app for Netskope.

- thumbnail icon

Observable Networks

+ thumbnail icon

Observable Networks

A guide to the Sumo Logic app for Observable Networks.

- thumbnail icon

Palo Alto Networks 9

+ thumbnail icon

Palo Alto Networks 9

A guide to the Sumo Logic app for Palo Alto Networks 9.

-

SailPoint

+

SailPoint

A guide to the Sumo Logic app for SailPoint.

- thumbnail icon

Threat Intel Quick Analysis

+ thumbnail icon

Threat Intel Quick Analysis

A guide to the Sumo Logic app for Threat Intel Quick Analysis.

- thumbnail icon

Trend Micro Deep Security

+ thumbnail icon

Trend Micro Deep Security

A guide to the Sumo Logic app for Trend Micro Deep Security.

- thumbnail icon

Twistlock

+ thumbnail icon

Twistlock

A guide to the Sumo Logic app for Twistlock.

- thumbnail icon

Zscaler Internet Access

+ thumbnail icon

Zscaler Internet Access

A guide to the Sumo Logic app for Zscaler Internet Access.

- thumbnail icon

Zscaler Private Access

+ thumbnail icon

Zscaler Private Access

A guide to the Sumo Logic app for Zscaler Private Access.

diff --git a/docs/integrations/sumo-apps/index.md b/docs/integrations/sumo-apps/index.md index 01d508da59..48f811e682 100644 --- a/docs/integrations/sumo-apps/index.md +++ b/docs/integrations/sumo-apps/index.md @@ -29,67 +29,67 @@ Once a request has been submitted, a support ticket is automatically opened. A r
- icon

Audit

+ icon

Audit

Use this guide to work with the Sumo Logic Audit App.

- icon

Cloud SIEM

+ icon

Cloud SIEM

Gives visibility into what’s going on in your Cloud SIEM.

- icon

Data Volume

+ icon

Data Volume

Provides a summary and detailed views of your account's data usage volume.

- Thumbnail icon

Enterprise Audit (multiple apps)

+ Thumbnail icon

Enterprise Audit (multiple apps)

A guide to the Sumo Logic app for Enterprise Audit.

- icon

Enterprise Search Audit

+ icon

Enterprise Search Audit

A guide to our Enterprise Search Audit App.

- Thumbnail icon

Flex

+ Thumbnail icon

Flex

A guide to the Sumo Logic Flex app.

- Thumbnail icon

Infrequent Data Tier

+ Thumbnail icon

Infrequent Data Tier

A guide to the Sumo Logic Infrequent Data Tier app.

- Thumbnail icon

Kickstart Data

+ Thumbnail icon

Kickstart Data

A guide to the Sumo Logic Kickstart Data app.

- Thumbnail icon

Log Analysis QuickStart

+ Thumbnail icon

Log Analysis QuickStart

A guide to the Sumo Logic Log Analysis QuickStart app.

- Thumbnail icon

OpenTelemetry Collector Insights

+ Thumbnail icon

OpenTelemetry Collector Insights

A guide to the Sumo Logic OpenTelemetry Collector Insights app.

- Thumbnail icon

Security Analytics

+ Thumbnail icon

Security Analytics

A guide to the Sumo Logic app for Security Analytics.

diff --git a/docs/integrations/web-servers/index.md b/docs/integrations/web-servers/index.md index 4939e61c60..2ade44abaf 100644 --- a/docs/integrations/web-servers/index.md +++ b/docs/integrations/web-servers/index.md @@ -12,77 +12,77 @@ This guide has documentation for Sumo apps for web servers.
Thumbnail icon -

Apache

+

Apache

The Apache app gives insight into website behavior patterns, monitor server operations, and assists in troubleshooting issues that span entire web sever farms.

Thumbnail icon -

Apache Tomcat

+

Apache Tomcat

The Apache Tomcat app monitors server operations, assists in troubleshooting issues, and provides insight into website visitor behavior patterns across entire web server farms.

Thumbnail icon -

HAProxy

+

HAProxy

The Sumo Logic App for HAProxy is a unified logs and metrics app that helps you monitor the availability, performance, and health of your HAProxy cluster.

thumbnail icon -

IIS 10

+

IIS 10

The IIS 10 app is a unified logs and metrics app that helps you monitor your IIS web servers' availability, performance, health, and resource utilization.

Thumbnail icon -

Nginx

+

Nginx

The Sumo Logic App for Nginx helps to monitor activity generated by Nginx servers.

Thumbnail icon -

Nginx Ingress

+

Nginx Ingress

The Nginx Ingress app is a unified logs and metrics app that helps you monitor the availability, performance, health, and resource utilization of your Nginx Ingress web servers.

Thumbnail icon -

Nginx Plus

+

Nginx Plus

The Nginx Plus app is an unified logs and metrics app that helps you monitor the availability, performance, health and resource utilization of your Nginx Plus web servers.

Thumbnail icon -

Nginx Plus Ingress

+

Nginx Plus Ingress

The Nginx Plus Ingress app is a unified logs and metrics app that helps you monitor the availability, performance, health and resource utilization of your Nginx Plus Ingress web servers.

Thumbnail icon -

Squid Proxy

+

Squid Proxy

The Squid Proxy app is a unified logs and metrics app that helps you monitor activity in Squid Proxy.

Thumbnail icon -

Varnish

+

Varnish

The Sumo Logic App for Varnish provides dashboards that help you analyze log and metric events generated by Varnish servers.

Thumbnail icon -

Heroku

+

Heroku

The Sumo Logic app for Heroku is a logs only app that allows you to monitor your Heroku environment.

diff --git a/docs/manage/content-sharing/index.md b/docs/manage/content-sharing/index.md index 3a3054c697..5f8d52a496 100644 --- a/docs/manage/content-sharing/index.md +++ b/docs/manage/content-sharing/index.md @@ -89,19 +89,19 @@ In this section, we'll introduce the following concepts:
- icon

Admin Mode

+ icon

Admin Mode

Learn how to control your content and add important items to the Admin Recommended folder.

- icon

Changing Other Alerts

+ icon

Changing Other Alerts

Learn how to modify or turn off alerts created by another user.

- icon

FAQ

+ icon

FAQ

Get to know the answers to basic questions around Content Sharing.

diff --git a/docs/manage/data-archiving/index.md b/docs/manage/data-archiving/index.md index de486ac13d..86e4c5a999 100644 --- a/docs/manage/data-archiving/index.md +++ b/docs/manage/data-archiving/index.md @@ -20,7 +20,7 @@ In this section, we'll introduce the following concepts:
- + Thumbnail icon

Archive Log Data to S3

diff --git a/docs/manage/data-forwarding/index.md b/docs/manage/data-forwarding/index.md index f72fd82c9d..852079bb5d 100644 --- a/docs/manage/data-forwarding/index.md +++ b/docs/manage/data-forwarding/index.md @@ -17,7 +17,7 @@ In this section, we'll introduce the following concepts:
- + Document with a forward symbol  icon

Forward Data from an Installed Collector

@@ -26,7 +26,7 @@ In this section, we'll introduce the following concepts:
- + Document with a forward symbol  icon

Forward Data from Sumo Logic to S3 or GCS

@@ -35,7 +35,7 @@ In this section, we'll introduce the following concepts:
- + Document with a forward symbol  icon

Manage Data Forwarding

@@ -44,7 +44,7 @@ In this section, we'll introduce the following concepts:
- + Document with a forward symbol  icon

View Information About Data Forwarding

diff --git a/docs/manage/deletion-requests.md b/docs/manage/deletion-requests.md index b4a3869294..4cb53dc7ec 100644 --- a/docs/manage/deletion-requests.md +++ b/docs/manage/deletion-requests.md @@ -8,7 +8,7 @@ description: Learn how to independently and efficiently control or remove your s -

Beta

+

Beta

import useBaseUrl from '@docusaurus/useBaseUrl'; diff --git a/docs/manage/field-extractions/fer-templates/index.md b/docs/manage/field-extractions/fer-templates/index.md index 9ed66ceae2..ae79791af5 100644 --- a/docs/manage/field-extractions/fer-templates/index.md +++ b/docs/manage/field-extractions/fer-templates/index.md @@ -16,79 +16,79 @@ In this section, we'll introduce the following concepts:
- icon

Akamai Cloud Monitor

+ icon

Akamai Cloud Monitor

Learn how to parse the common fields in your Akamai Cloud Monitor log.

- icon

Apache Access Logs

+ icon

Apache Access Logs

Learn how to parse the common fields in your Apache Access log.

- icon

Apache Tomcat Access Logs

+ icon

Apache Tomcat Access Logs

Learn how to parse the common fields in your Apache Tomcat Access log.

- icon

Sample Apache Tomcat 7 Access Log Field Extraction Rule

+ icon

Sample Apache Tomcat 7 Access Log Field Extraction Rule

Learn how to parse the Remote IP address, Method, Requested URL path, HTTP status code, Time Taken, and Bytes Sent.

- icon

AWS CloudTrail Logs

+ icon

AWS CloudTrail Logs

Learn how to parse the common fields in your AWS CloudTrail log.

- icon

AWS Elastic Load Balancing Logs

+ icon

AWS Elastic Load Balancing Logs

Learn how to parse the common fields in your AWS Elastic Load Balancing log.

- icon

Amazon S3 Usage Logs

+ icon

Amazon S3 Usage Logs

Learn how to parse the common fields in your Amazon S3 Usage log.

- icon

Cisco Logs Extraction Template

+ icon

Cisco Logs Extraction Template

Learn how to parse the common fields in your Cisco ASA log.

- icon

Sample Cisco FWSM Field Extraction Rule

+ icon

Sample Cisco FWSM Field Extraction Rule

Learn how to create field extraction rules for CISCO FWSM.

- icon

Microsoft IIS Logs

+ icon

Microsoft IIS Logs

Learn how to parse the common fields in your Microsoft IIS log.

- icon

Nginx Logs

+ icon

Nginx Logs

Learn how to parse the common fields in your Nginx Access log.

- icon

Palo Alto Networks

+ icon

Palo Alto Networks

Learn how to parse the common fields in your Palo Alto Networks log.

- icon

Varnish Logs Extraction Template

+ icon

Varnish Logs Extraction Template

Learn how to parse the common fields in your Varnish log.

diff --git a/docs/manage/field-extractions/index.md b/docs/manage/field-extractions/index.md index ed1fc3c9ec..ff0ec376af 100644 --- a/docs/manage/field-extractions/index.md +++ b/docs/manage/field-extractions/index.md @@ -97,37 +97,37 @@ In this section, we'll introduce the following concepts:
- icon

Field Naming Convention

+ icon

Field Naming Convention

Learn about the recommended naming conventions for standard fields in Sumo Logic.

- icon

Create a Field Extraction Rule

+ icon

Create a Field Extraction Rule

Learn how to instruct Sumo Logic to parse out fields automatically.

- icon

Edit Field Extraction Rules

+ icon

Edit Field Extraction Rules

Learn how to change Field Extraction Rules.

- icon

FER Templates

+ icon

FER Templates

Learn how to use FER Templates to parse common fields for various applications.

- icon

Parse AWS ELB Logs

+ icon

Parse AWS ELB Logs

Learn how to parse the common fields in AWS ELB logs.

- icon

Sample Safend Field Extraction

+ icon

Sample Safend Field Extraction

Learn how to create Field Extraction Rules for Safend.

diff --git a/docs/manage/index.md b/docs/manage/index.md index 85311ffd28..ddefed8f4b 100644 --- a/docs/manage/index.md +++ b/docs/manage/index.md @@ -17,81 +17,81 @@ This topic describes features and options that give you administration over acco
- icon

Fields

+ icon

Fields

Learn how to define and manage the assignment of metadata to your logs.

- icon

Health Events

+ icon

Health Events

Monitor the health of your Collectors and Sources.

- icon

Field Extractions

+ icon

Field Extractions

Accelerates the search process by parsing fields as log messages are ingested.

- icon

Partitions

+ icon

Partitions

Accelerate the search process by allowing Admins to filter a subset of the log messages in an index.

- icon

Users and Roles

+ icon

Users and Roles

Learn how to manage users and roles in Sumo Logic.

- icon

Manage Subscription

+ icon

Manage Subscription

Learn about Sumo Logic account plans and types and about how to manage yours.

- icon

Content Sharing

+ icon

Content Sharing

Allows you collaborate on apps, dashboards, and searches with specific users or roles.

- icon

Data Forwarding

+ icon

Data Forwarding

Allows you to forward selected data to an external server or Amazon S3.

- icon

Data Archiving

+ icon

Data Archiving

Learn how to archive selected data to an external server or Amazon S3.

- icon

Ingestion and Volume

+ icon

Ingestion and Volume

Learn how to manage the ingestion of data by Sumo Logic.

- icon

Scheduled Views

+ icon

Scheduled Views

Accelerate the search process for data subsets by functioning as a pre-aggregated index.

- icon

Security

+ icon

Security

Learn how to set up security for Sumo Logic accounts.

diff --git a/docs/manage/ingestion-volume/data-volume-index/index.md b/docs/manage/ingestion-volume/data-volume-index/index.md index d375d547c9..3f3f2358ff 100644 --- a/docs/manage/ingestion-volume/data-volume-index/index.md +++ b/docs/manage/ingestion-volume/data-volume-index/index.md @@ -48,13 +48,13 @@ In this section, we'll introduce the following concepts:
- icon

Log and Tracing Data Volume Index

+ icon

Log and Tracing Data Volume Index

Get to know how much data your account is ingesting.

- icon

Metrics Data Volume Index

+ icon

Metrics Data Volume Index

Get to know the volume of metric data points your account is ingesting.

diff --git a/docs/manage/ingestion-volume/index.md b/docs/manage/ingestion-volume/index.md index ec7322e5c8..2ffdf1b756 100644 --- a/docs/manage/ingestion-volume/index.md +++ b/docs/manage/ingestion-volume/index.md @@ -13,31 +13,31 @@ In this section, we'll introduce the following concepts:
- icon

Log Ingestion

+ icon

Log Ingestion

Learn how the logs will be ingested across all Collectors.

- icon

Collection Status Page

+ icon

Collection Status Page

Get a visual snapshot of the message history of your deployment.

- icon

Data Volume Index

+ icon

Data Volume Index

Learn how to get visibility into how much data you are sending to Sumo Logic.

- icon

Ingest Budgets

+ icon

Ingest Budgets

Learn how to control the daily volume of log data sent to Sumo Logic.

- icon

Monitor Log Ingestion and Alerts

+ icon

Monitor Log Ingestion and Alerts

Add scheduled searches that monitor ingestion and send alerts.

diff --git a/docs/manage/ingestion-volume/ingest-budgets/index.md b/docs/manage/ingestion-volume/ingest-budgets/index.md index c9f4ef4197..f853d78cb0 100644 --- a/docs/manage/ingestion-volume/ingest-budgets/index.md +++ b/docs/manage/ingestion-volume/ingest-budgets/index.md @@ -14,13 +14,13 @@ In this section, we'll introduce the following concepts:
- icon

Daily Volume

+ icon

Daily Volume

Learn how to control the capacity of daily log ingestion.

- icon

Minute Volume

+ icon

Minute Volume

Learn how to control data ingestion to minute granularity.

diff --git a/docs/manage/manage-subscription/create-and-manage-orgs/index.md b/docs/manage/manage-subscription/create-and-manage-orgs/index.md index 5f0687e020..426d6c3275 100644 --- a/docs/manage/manage-subscription/create-and-manage-orgs/index.md +++ b/docs/manage/manage-subscription/create-and-manage-orgs/index.md @@ -25,37 +25,37 @@ In this section, we'll introduce the following concepts:
- icon

Create and Manage Orgs

+ icon

Create and Manage Orgs

Learn how to create and manage multiple Sumo Logic Orgs.

- icon

Create and Manage Orgs (Service Providers)

+ icon

Create and Manage Orgs (Service Providers)

Learn how to group, provision, centrally manage, and monitor credits usage of multiple orgs.

- icon

Create and Manage Orgs (Flex)

+ icon

Create and Manage Orgs (Flex)

Learn how to create and manage multiple Sumo Logic Orgs with Flex data.

- icon

Manage Org Settings

+ icon

Manage Org Settings

Learn how to update org names, define subdomain names, delete orgs, and change the account owner.

- icon

Manage Organizations for MSSPs - Cloud SIEM

+ icon

Manage Organizations for MSSPs - Cloud SIEM

Learn how to manage organizational Cloud SIEM rules and rule tuning for MSSPs.

diff --git a/docs/manage/manage-subscription/create-and-manage-orgs/manage-orgs-for-mssps.md b/docs/manage/manage-subscription/create-and-manage-orgs/manage-orgs-for-mssps.md index 42dd5ca805..b33ba89f78 100644 --- a/docs/manage/manage-subscription/create-and-manage-orgs/manage-orgs-for-mssps.md +++ b/docs/manage/manage-subscription/create-and-manage-orgs/manage-orgs-for-mssps.md @@ -9,7 +9,7 @@ description: Learn how to manage library content for Managed Security Service Pr -

Beta

+

Beta

import useBaseUrl from '@docusaurus/useBaseUrl'; diff --git a/docs/manage/manage-subscription/index.md b/docs/manage/manage-subscription/index.md index 7a05872a34..54a228d255 100644 --- a/docs/manage/manage-subscription/index.md +++ b/docs/manage/manage-subscription/index.md @@ -13,67 +13,67 @@ In this section, we'll introduce the following concepts:
- icon

Credits Accounts

+ icon

Credits Accounts

Learn about Sumo Logic Credits accounts, monitoring usage, and managing account costs.

- icon

Flex Accounts

+ icon

Flex Accounts

Learn about Sumo Logic Flex accounts, monitoring usage and managing account costs.

- icon

Cloud Flex Legacy Accounts

+ icon

Cloud Flex Legacy Accounts

View information, monitor usage, and manage account costs on Cloud Flex legacy accounts.

- icon

Create and Manage Orgs

+ icon

Create and Manage Orgs

Learn how to create and manage your Sumo Logic organizations.

- icon

Upgrade Account

+ icon

Upgrade Account

Learn how to upgrade your Sumo Logic account plans.

- icon

Manage Billing Information

+ icon

Manage Billing Information

Learn how to manage billing for professional accounts.

- icon

Organization Usage Limits

+ icon

Organization Usage Limits

Learn to set query-level budget to define spending limits for queries.

- icon

Scan Budget

+ icon

Scan Budget

Learn to set advacned query-level budget to define spending limits for queries.

- icon

FedRAMP Capabilities

+ icon

FedRAMP Capabilities

Learn the capabilities included with Sumo Logic’s FedRAMP solution.

- icon

Beta Participation Opt-In

+ icon

Beta Participation Opt-In

Learn how to opt in for Sumo Logic pre-release programs.

- icon

Close or Cancel a Sumo Logic Account

+ icon

Close or Cancel a Sumo Logic Account

Learn how to delete your org from Sumo Logic when on a Free or Trial account.

diff --git a/docs/manage/manage-subscription/upgrade-account/index.md b/docs/manage/manage-subscription/upgrade-account/index.md index e62070ad0c..645c1d573b 100644 --- a/docs/manage/manage-subscription/upgrade-account/index.md +++ b/docs/manage/manage-subscription/upgrade-account/index.md @@ -13,19 +13,19 @@ In this section, we'll introduce the following concepts:
- icon

Upgrade a Credits Account

+ icon

Upgrade a Credits Account

Learn how to upgrade a Free or Trial account to an Essentials subscription.

- icon

Upgrade a Flex Account

+ icon

Upgrade a Flex Account

Learn how to upgrade a Free or Trial account to an Essentials subscription.

- icon

Upgrade a Cloud Flex Legacy Account

+ icon

Upgrade a Cloud Flex Legacy Account

Learn how to upgrade a Cloud Flex legacy account.

diff --git a/docs/manage/partitions/data-tiers/index.md b/docs/manage/partitions/data-tiers/index.md index 4d83e3e48e..07d5f12117 100644 --- a/docs/manage/partitions/data-tiers/index.md +++ b/docs/manage/partitions/data-tiers/index.md @@ -94,32 +94,26 @@ In this section, we'll introduce the following concepts:
- icon

Create and Edit a Partition

+ icon

Create and Edit a Partition

Learn how to create and edit a Partition in an Index.

- icon

View Details About a Partition

+ icon

View Details About a Partition

Learn how to view details about a Sumo Logic Partition.

- icon

Data Tiers

-

Get to know about Sumo Logic's Data Tiers feature.

+ icon

Searching Data Tiers

+

Learn how to search specific Data Tiers.

- icon

Data Tiers FAQs

+ icon

Data Tiers FAQs

Get answers on various FAQs about Data Tiers.

-
-
- icon

Searching Data Tiers

-

Learn how to search specific Data Tiers.

-
-
diff --git a/docs/manage/partitions/data-tiers/infrequent-tier-dashboard-support.md b/docs/manage/partitions/data-tiers/infrequent-tier-dashboard-support.md index 031039efe5..20611bbfb4 100644 --- a/docs/manage/partitions/data-tiers/infrequent-tier-dashboard-support.md +++ b/docs/manage/partitions/data-tiers/infrequent-tier-dashboard-support.md @@ -10,7 +10,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Beta

+

Beta

diff --git a/docs/manage/partitions/data-tiers/infrequent-tier-monitors.md b/docs/manage/partitions/data-tiers/infrequent-tier-monitors.md index 1a90170fca..2b7e4bede8 100644 --- a/docs/manage/partitions/data-tiers/infrequent-tier-monitors.md +++ b/docs/manage/partitions/data-tiers/infrequent-tier-monitors.md @@ -3,12 +3,13 @@ id: infrequent-tier-monitors title: Monitors and Alert Response Page on Infrequent Tier Data (Beta) description: Learn how to monitor and view the details about the alert against the Infrequent data tier. --- +import useBaseUrl from '@docusaurus/useBaseUrl'; -

Closed Beta

+

Closed Beta

diff --git a/docs/manage/partitions/data-tiers/infrequent-tier-search.md b/docs/manage/partitions/data-tiers/infrequent-tier-search.md index ee20e6dce2..8dc06abb7f 100644 --- a/docs/manage/partitions/data-tiers/infrequent-tier-search.md +++ b/docs/manage/partitions/data-tiers/infrequent-tier-search.md @@ -10,7 +10,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Closed Beta

+

Closed Beta

diff --git a/docs/manage/partitions/data-tiers/infrequent-tier-slo-support.md b/docs/manage/partitions/data-tiers/infrequent-tier-slo-support.md index 3046dcc0b0..f56b7b6a6e 100644 --- a/docs/manage/partitions/data-tiers/infrequent-tier-slo-support.md +++ b/docs/manage/partitions/data-tiers/infrequent-tier-slo-support.md @@ -10,7 +10,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Beta

+

Beta

diff --git a/docs/manage/partitions/flex/index.md b/docs/manage/partitions/flex/index.md index cc1ae1c507..dd1e9b190c 100644 --- a/docs/manage/partitions/flex/index.md +++ b/docs/manage/partitions/flex/index.md @@ -48,31 +48,31 @@ In this section, we'll introduce the following concepts:
- icon

Setup and Configure Flex app

+ icon

Setup and Configure Flex app

Learn how to setup and configure the Flex app.

- icon

Create and Edit a Partition

+ icon

Create and Edit a Partition

Learn how to create and edit a Partition in an Index.

- icon

View Details About a Partition

+ icon

View Details About a Partition

Learn how to view details about a Sumo Logic partition.

- icon

Estimate Scan Data

+ icon

Estimate Scan Data

Learn about the estimate scan data for Flex pricing.

- icon

Flex FAQs

+ icon

Flex FAQs

Answers to FAQ about Flex.

diff --git a/docs/manage/partitions/index.md b/docs/manage/partitions/index.md index 4fd675fe98..155ea632e4 100644 --- a/docs/manage/partitions/index.md +++ b/docs/manage/partitions/index.md @@ -61,25 +61,25 @@ In this section, we'll introduce the following concepts:
- icon

Search a Partition

+ icon

Search a Partition

Learn how to run a search against data in a Partition.

- icon

Edit Data Forwarding Destinations for a Partition

+ icon

Edit Data Forwarding Destinations for a Partition

Learn how to specify Data Forwarding settings for a Partition.

- icon

Manage Indexes with Variable Retention

+ icon

Manage Indexes with Variable Retention

Learn how to create Index Partitions and Scheduled Views to store your data.

- icon

Decommission a Partition

+ icon

Decommission a Partition

Learn how to decommission a Partition to keep it from being started.

diff --git a/docs/manage/scheduled-views/index.md b/docs/manage/scheduled-views/index.md index e85b884790..61a72d6b21 100644 --- a/docs/manage/scheduled-views/index.md +++ b/docs/manage/scheduled-views/index.md @@ -41,37 +41,37 @@ In this section, we'll introduce the following concepts:
- icon

Add a Scheduled View

+ icon

Add a Scheduled View

Learn how to add a Scheduled View.

- icon

Pause or Disable Scheduled Views

+ icon

Pause or Disable Scheduled Views

Learn how to pause view stops new data from being Indexed.

- icon

Run a Search Against a Scheduled View

+ icon

Run a Search Against a Scheduled View

Learn how to run a search against Indexed data in a Scheduled View.

- icon

Scheduled View Lag Time

+ icon

Scheduled View Lag Time

Learn how to view data that's not up to date in the Scheduled View.

- icon

Scheduled Views Best Practices and Examples

+ icon

Scheduled Views Best Practices and Examples

Get to know some tips for setting up Scheduled View queries.

- icon

View Information About Scheduled Views

+ icon

View Information About Scheduled Views

Learn how to view a list of Scheduled Views configured for your org.

diff --git a/docs/manage/security/audit-indexes/index.md b/docs/manage/security/audit-indexes/index.md index a2f0c3a1b1..b72b4ff0f7 100644 --- a/docs/manage/security/audit-indexes/index.md +++ b/docs/manage/security/audit-indexes/index.md @@ -29,31 +29,31 @@ In this section, we'll introduce the following concepts:
- Shield icon

Audit Index

+ Shield icon

Audit Index

Collect event logs in plain text on account activities, such as account management, user activity, scheduled searches, and alerting.

- Shield icon

Search Audit Index

+ Shield icon

Search Audit Index

Collect event logs on search activities in your account.

- Shield icon

Audit Event Index

+ Shield icon

Audit Event Index

Collect event logs in JSON format on account activities for a wide range of actions.

- Shield icon

System Event Index

+ Shield icon

System Event Index

Collect event logs in JSON format on system activities.

- Shield icon

Documentation for Audit Log Definitions

+ Shield icon

Documentation for Audit Log Definitions

See Audit Event Log Definitions documentation for audited events.

diff --git a/docs/manage/security/index.md b/docs/manage/security/index.md index eb52930fb3..f03505bee6 100644 --- a/docs/manage/security/index.md +++ b/docs/manage/security/index.md @@ -25,97 +25,97 @@ In this section, we'll introduce the following concepts:
- Shield icon

About 2-Step Verification

+ Shield icon

About 2-Step Verification

Learn how to enhance security and secure sensitive data stored in Sumo Logic.

- Shield icon

2-Step Verification for Administrators

+ Shield icon

2-Step Verification for Administrators

Learn how to set up and manage 2-Step Verification across your organization.

- Shield icon

2-Step Verification for Users

+ Shield icon

2-Step Verification for Users

Learn how to set up and use 2-Step Verification for your user account.

- Shield icon

Access Keys

+ Shield icon

Access Keys

Learn how to use Access Keys to securely register new Collectors or access Sumo Logic APIs.

- Shield icon

Audit Indexes

+ Shield icon

Audit Indexes

Learn how to use audit indexes to query for events in Sumo Logic.

- Shield icon

Audit Event Index

+ Shield icon

Audit Event Index

Learn how to get event logs in JSON format on account activities.

- Shield icon

Create an Allowlist for IP or CIDR Addresses

+ Shield icon

Create an Allowlist for IP or CIDR Addresses

Learn how to explicitly grant access to specific IP OR CIDR Addresses.

- Shield icon

Data Access Level for Shared Dashboards

+ Shield icon

Data Access Level for Shared Dashboards

Learn how to set all newly created dashboards to run with the viewer's role access filter.

- Shield icon

Enable a Support Account

+ Shield icon

Enable a Support Account

Learn how to address support issues when they arise.

- Shield icon

Installation Tokens

+ Shield icon

Installation Tokens

Learn how to use Installation Tokens to register Installed Collectors.

- Shield icon

SAML

+ Shield icon

SAML

Learn how to provision SAML for Single Sign-On access to Sumo Logic.

- Shield icon

Search Audit Index

+ Shield icon

Search Audit Index

Learn how to enable event logs on search usage and activities for your account.

- Shield icon

Log Search Audit Index

+ Shield icon

Log Search Audit Index

Learn how to query the Search Audit Index for search usage and activities for your account.

- Shield icon

Set the Password Policy

+ Shield icon

Set the Password Policy

Learn how to set the account password policy for any user in your organization.

- Shield icon

Set a Limit for User Concurrent Sessions

+ Shield icon

Set a Limit for User Concurrent Sessions

Learn how to limit the number of open concurrent sessions by a user.

- Shield icon

Set a Maximum Web Session Timeout

+ Shield icon

Set a Maximum Web Session Timeout

Learn how to specify the maximum web session timeout period that users in your org can select.

diff --git a/docs/manage/security/saml/index.md b/docs/manage/security/saml/index.md index a426e50cc4..7c44d1bd3c 100644 --- a/docs/manage/security/saml/index.md +++ b/docs/manage/security/saml/index.md @@ -23,61 +23,61 @@ In this section, we'll introduce the following concepts:
- Padlock icon

Set Up SAML for Single Sign-On

+ Padlock icon

Set Up SAML for Single Sign-On

Learn how to enable SSO for users to access Sumo Logic.

- Padlock icon

Integrate Sumo Logic with Bitium

+ Padlock icon

Integrate Sumo Logic with Bitium

Learn how to integrate Bitium with Sumo Logic's SAML for SSO login.

- Padlock icon

Integrate Sumo Logic with Google Apps (G Suite) IAM

+ Padlock icon

Integrate Sumo Logic with Google Apps (G Suite) IAM

Learn how to integrate Sumo Logic SAML with Google Apps IAM for SSO login.

- Padlock icon

Integrate Sumo Logic with Okta

+ Padlock icon

Integrate Sumo Logic with Okta

Learn how to integrate Sumo Logic’s SAML 2.0 API with Okta for SSO login.

- Padlock icon

Integrate Sumo Logic with OneLogin

+ Padlock icon

Integrate Sumo Logic with OneLogin

Learn how to integrate Sumo Logic with OneLogin for SSO login.

- Padlock icon

Integrate Sumo with AWS Single Sign-On

+ Padlock icon

Integrate Sumo with AWS Single Sign-On

Learn how to configure AWS Single Sign-On for Sumo Logic.

- Padlock icon

Integrate Sumo with Azure AD

+ Padlock icon

Integrate Sumo with Azure AD

Learn how to enable SSO for user access to Sumo Logic using Azure AD.

- Padlock icon

Manage Permissions with ADFS

+ Padlock icon

Manage Permissions with ADFS

Learn how to manage Sumo Logic user permissions using ADFS and SAML.

- Padlock icon

Set Up ADFS to Authenticate Sumo Logic Users

+ Padlock icon

Set Up ADFS to Authenticate Sumo Logic Users

Learn how to configure ADFS to authenticate Sumo Logic users.

- Padlock icon

View SAML Debug Information

+ Padlock icon

View SAML Debug Information

Learn how to use the Debug Mode to troubleshoot SAML issues.

diff --git a/docs/manage/security/scim/index.md b/docs/manage/security/scim/index.md index ffb74afb72..cca41a49f9 100644 --- a/docs/manage/security/scim/index.md +++ b/docs/manage/security/scim/index.md @@ -13,25 +13,25 @@ This section contains the following articles:
- icon

About SCIM Provisioning

+ icon

About SCIM Provisioning

Learn about provisioning users in Sumo Logic using SCIM.

- icon

Provision with Microsoft Entra ID

+ icon

Provision with Microsoft Entra ID

Learn how to provision users in Sumo Logic with Microsoft Entra ID (formerly Azure Active Directory).

- icon

Provision with Okta

+ icon

Provision with Okta

Learn how to provision users in Sumo Logic with Okta

- icon

Provision with OneLogin

+ icon

Provision with OneLogin

Learn how to provision users in Sumo Logic with OneLogin

diff --git a/docs/manage/users-roles/index.md b/docs/manage/users-roles/index.md index c69fa0a13a..8f47563be8 100644 --- a/docs/manage/users-roles/index.md +++ b/docs/manage/users-roles/index.md @@ -26,13 +26,13 @@ In this section, we'll introduce the following concepts:
- User and gear icon

Manage Roles

+ User and gear icon

Manage Roles

Learn how to use roles to determine the functions that users can perform in Sumo Logic and the data they can view.

- User and gear icon

Manage Users

+ User and gear icon

Manage Users

Learn how to create user accounts and assign roles to users.

diff --git a/docs/manage/users-roles/roles/index.md b/docs/manage/users-roles/roles/index.md index 4c6238d648..1207aa8dae 100644 --- a/docs/manage/users-roles/roles/index.md +++ b/docs/manage/users-roles/roles/index.md @@ -23,31 +23,31 @@ In this section, we'll introduce the following concepts:
- User icon

Role-Based Access Control

+ User icon

Role-Based Access Control

Learn how to grant access and capabilities to data in Sumo Logic using roles.

- User icon

Create and Manage Roles

+ User icon

Create and Manage Roles

Learn how to create custom roles for your users.

- User icon

Role Capabilities

+ User icon

Role Capabilities

Learn how to assign various capabilities while creating user roles.

- User icon

Construct a Search Filter for a Role

+ User icon

Construct a Search Filter for a Role

Learn how to define a search filter for a role.

- User icon

Add or Remove Users from a Role

+ User icon

Add or Remove Users from a Role

Learn how to change the default assignment of roles to users.

diff --git a/docs/manage/users-roles/users/index.md b/docs/manage/users-roles/users/index.md index b88c474ee7..03da1946da 100644 --- a/docs/manage/users-roles/users/index.md +++ b/docs/manage/users-roles/users/index.md @@ -23,61 +23,61 @@ In this section, we'll introduce the following concepts:
- Person and gear icon

Create and Edit Users

+ Person and gear icon

Create and Edit Users

Learn how to create, edit, and view user accounts.

- Envelope icon

Change a User's Email Address

+ Envelope icon

Change a User's Email Address

Learn how to change a user's email address.

- Wrenche icon

What to Do if Your Account is Locked

+ Wrenche icon

What to Do if Your Account is Locked

Learn how to unlock a user's locked account.

- Users icon

Reset a User's Password

+ Users icon

Reset a User's Password

Learn how to reset another user's password.

- Padlock icon

Unlocking User Accounts

+ Padlock icon

Unlocking User Accounts

Learn how to manually unlock an account before the expiry of the default lockout period.

- User and gear icon

Deactivate or Activate a User

+ User and gear icon

Deactivate or Activate a User

Learn how to deactivate a user without removing the user account or reactivate a deactivated user.

- Exclamation point in a circle icon

Delete a User

+ Exclamation point in a circle icon

Delete a User

Learn how to remove a user permanently by deleting the user account.

- User and flowchart icon

Offboard a User

+ User and flowchart icon

Offboard a User

Learn the steps to take when removing a user from your Org's Sumo Logic Account.

- User and flowchart icon

Multi-Account Access

+ User and flowchart icon

Multi-Account Access

Learn how to log into multiple Sumo Logic accounts using a single username and password.

- Boxes icon

Verification for Secure Third-Party Service Access

+ Boxes icon

Verification for Secure Third-Party Service Access

Get to know several links in the Help menu that securely connect to third-party services.

diff --git a/docs/metrics/index.md b/docs/metrics/index.md index 746bf64934..1b4a8285ac 100644 --- a/docs/metrics/index.md +++ b/docs/metrics/index.md @@ -20,55 +20,55 @@ Metrics are an effective tool for monitoring, troubleshooting, and identifying t
- icon

Intro to Metrics

+ icon

Intro to Metrics

Use Metrics for monitoring, troubleshooting, and identifying root causes.

- icon

Metrics Queries

+ icon

Metrics Queries

Sumo Logic metric query operators and metrics queries.

- icon

Metrics Operators

+ icon

Metrics Operators

Metrics operator syntax rules and examples.

- icon

Managing Metrics Volume

+ icon

Managing Metrics Volume

Metric ingestion and storage, metric data limits, and metrics throttling.

- icon

Metrics Rules Editor

+ icon

Metrics Rules Editor

The Metrics rules editor allows you to tag metrics with data derived from the metric identifier.

- icon

Metrics Transformation Rules

+ icon

Metrics Transformation Rules

Control how long raw metrics are retained.

- icon

Logs-to-Metrics

+ icon

Logs-to-Metrics

Set up rules to extract or create metrics from log data.

- icon

Metrics Data Ingestion

+ icon

Metrics Data Ingestion

View detailed information about your metrics data consumption.

- icon

Kubernetes Metrics

+ icon

Kubernetes Metrics

Kubernetes metrics are collected when you deploy our Kubernetes collection.

diff --git a/docs/metrics/manage-metric-volume/index.md b/docs/metrics/manage-metric-volume/index.md index f13a8a2295..fd906631db 100644 --- a/docs/metrics/manage-metric-volume/index.md +++ b/docs/metrics/manage-metric-volume/index.md @@ -14,25 +14,25 @@ In this section, we'll introduce the following concepts:
- icon

Data Limits for Metrics

+ icon

Data Limits for Metrics

Get to know the volume of metrics that you are ingesting into Sumo Logic.

- icon

Disabled Metrics Sources

+ icon

Disabled Metrics Sources

Learn how to remove the limits set on the number of ingested time series.

- icon

Metric Ingestion and Storage

+ icon

Metric Ingestion and Storage

Learn about how Sumo Logic stores raw and rolled up metrics data.

- icon

Metric Throttling

+ icon

Metric Throttling

Get information on how Sumo Logic throttles metric when metrics ingestion exceeds your DPM limit.

diff --git a/docs/metrics/metrics-operators/index.md b/docs/metrics/metrics-operators/index.md index 0773768ba9..413b653e8b 100644 --- a/docs/metrics/metrics-operators/index.md +++ b/docs/metrics/metrics-operators/index.md @@ -17,151 +17,151 @@ In this section, we'll introduce the following concepts:
- icon

accum

+ icon

accum

Learn how to create a series of running totals for each metric time series.

- icon

along

+ icon

along

Learn how to control what results are joined based on the value of one or more result fields.

- icon

avg

+ icon

avg

Learn how to calculate the average of all matching time series.

- icon

bottomk

+ icon

bottomk

Learn how to apply a specified aggregation function to the time series that match the query selector.

- icon

count

+ icon

count

Learn how to count the total number of time series that match the query.

- icon

delta

+ icon

delta

Learn how to compute the backward difference at each data point in the time series.

- icon

eval

+ icon

eval

Learn how to evaluate a time series based on a user-specified arithmetic or mathematical function.

- icon

ewma

+ icon

ewma

Learn how to compute an EWMA on the data points returned by the query for the selected time range.

- icon

fillmissing

+ icon

fillmissing

Learn how to fill empty time slices in metric query results with a derived data point.

- icon

filter

+ icon

filter

Learn how to limit the results returned by a metric query.

- icon

histogram_quantile

+ icon

histogram_quantile

Learn how to calculate the φ-quantile from the buckets of a histogram.

- icon

in

+ icon

in

Learn how to use this operator in a metrics query selector as shorthand for multiple OR conditions.

- icon

max

+ icon

max

Learn how to calculate the maximum value of the time series that match the query.

- icon

min

+ icon

min

Learn how to calculate the minimum value of the time series that match the query.

- icon

outlier

+ icon

outlier

Learn how to identify metrics data points that are outside the range of expected values.

- icon

parse

+ icon

parse

Learn how to parse the specified field to create new fields to use in the metrics query.

- icon

predict

+ icon

predict

Learn how to take a single time series metric to predict future values.

- icon

pct

+ icon

pct

Learn how to calculate the nth percentile of values of the input series for each time interval.

- icon

quantize

+ icon

quantize

Learn how to use this operator to control Sumo’s quantization behavior.

- icon

rate

+ icon

rate

Learn how to calculate the per-second rate of change between consecutive data points.

- icon

stddev

+ icon

stddev

Learn how to measure the magnitude of deviations between the values in a time series.

- icon

sum

+ icon

sum

Learn how to calculate the sum of the metrics values that match the query.

- icon

timeshift

+ icon

timeshift

Learn how to shift the time series from your metrics query by a specified period of time.

- icon

topk

+ icon

topk

Learn to apply a specified aggregation function to the time series that match the query selector.

- icon

where

+ icon

where

Learn how to filter out entire time series, or individual data points within a time series.

diff --git a/docs/metrics/metrics-queries/index.md b/docs/metrics/metrics-queries/index.md index de6e3fa29b..53e9ba2ebe 100644 --- a/docs/metrics/metrics-queries/index.md +++ b/docs/metrics/metrics-queries/index.md @@ -14,61 +14,61 @@ In this section, we'll introduce the following concepts:
- icon

Metrics Search

+ icon

Metrics Search

Learn how to use the Metrics Search to query your metrics.

- icon

Map Charts

+ icon

Map Charts

Learn how to visualize metrics query results by geographic location.

- icon

Heat Maps

+ icon

Heat Maps

Learn how to visualize the count of data points returned by a metrics query.

- icon

Funnel Chart

+ icon

Funnel Chart

Learn how to visualize the status of a process with sequential steps.

- icon

Metric Query Autocomplete

+ icon

Metric Query Autocomplete

Learn how to set up an autocomplete dropdown dialog that makes query writing easier.

- icon

Using Comments in Queries

+ icon

Using Comments in Queries

Learn to add comments to a metrics query and comment out parts of the query using comment formatting.

- icon

Metric Aggregation Tips

+ icon

Metric Aggregation Tips

Learn to display a tip for how to use an aggregation clause to produce more readable results.

- icon

Error Messages

+ icon

Error Messages

Learn about warnings and error messages presented for long-running metric queries and metric queries.

- icon

Share a Metric Query

+ icon

Share a Metric Query

Learn how to share a saved or unsaved metric query.

- icon

Metric Query Best Practices

+ icon

Metric Query Best Practices

Learn tips for getting the most out of your metric queries.

diff --git a/docs/observability/application-components.md b/docs/observability/application-components.md index 1aa2ff7328..7829b8c10d 100644 --- a/docs/observability/application-components.md +++ b/docs/observability/application-components.md @@ -81,22 +81,22 @@ By default, all other parameters are set up to automatically collect logs and me **Parameter**: `sumologic_environment`
**Required**: Yes
-**Description**: This is your Sumo Logic Deployment. Enter au, ca, de, eu, jp, us2, fed, or us1. See Sumo Logic Endpoints for more information. +**Description**: This is your Sumo Logic Deployment. Enter au, ca, de, eu, jp, us2, fed, or us1. See [Sumo Logic Endpoints](/docs/api/about-apis/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security) for more information. --- **Parameter**: `sumologic_access_id`
**Required**: Yes
-**Description**: Your Sumo Logic Access ID. See Create an access key for more information. +**Description**: Your Sumo Logic Access ID. See [Create an access key](/docs/manage/security/access-keys#create-an-access-key) for more information. --- **Parameter**: `sumologic_access_key`
**Required**: Yes
-**Description**: Your Sumo Logic Access Key, which is used for Sumo Logic API calls. See Sumo Logic Access Key for more information. +**Description**: Your Sumo Logic Access Key, which is used for Sumo Logic API calls. See [Sumo Logic Access Key](/docs/manage/security/access-keys) for more information. --- **Parameter**: `sumologic_organization_id`
**Required**: Yes
-**Description**: Your Sumo Logic Organization ID. You can find your org on the Preferences page in the Sumo Logic UI. Your org ID will be used to configure the IAM Role for Sumo Logic AWS Sources. For more information, see Preferences Page. +**Description**: Your Sumo Logic Organization ID. You can find your org on the Preferences page in the Sumo Logic UI. Your org ID will be used to configure the IAM Role for Sumo Logic AWS Sources. For more information, see [Preferences Page](/docs/get-started/sumo-logic-ui). @@ -152,7 +152,7 @@ email_notifications_critical = [ --- **Parameters**: `connection_notifications_critical`, `connection_notifications_warning`, `connection_notifications_missingdata`
**Required**: No
-**Description**: To configure notification via pagerduty or webhook set these parameters for critical, warning and missing data monitors respectively. See this document for creating payloads with other connection types. +**Description**: To configure notification via pagerduty or webhook set these parameters for critical, warning and missing data monitors respectively. See this [document](/docs/alerts/webhook-connections/set-up-webhook-connections) for creating payloads with other connection types. ```json connection_notifications_critical = [ { diff --git a/docs/observability/aws/index.md b/docs/observability/aws/index.md index d82d7a8796..b0eac6192f 100644 --- a/docs/observability/aws/index.md +++ b/docs/observability/aws/index.md @@ -40,31 +40,31 @@ In this section, we'll introduce the following concepts:
- icon

About AWS Observability

+ icon

About AWS Observability

Learn about the features, benefits, and resources created by the AWS Observability solution.

- icon

Deploy and Use AWS Observability

+ icon

Deploy and Use AWS Observability

Learn how to simplify the monitoring and troubleshooting of your AWS cloud infrastructure.

- icon

Other Configurations and Tools

+ icon

Other Configurations and Tools

Learn about adding a new AWS service, updating existing host metrics, and using AWS Control Tower.

- icon

AWS Observability Apps

+ icon

AWS Observability Apps

Familiarize yourself with information about the AWS Observability Solution apps.

- icon

FAQ

+ icon

FAQ

Learn answers to frequently asked questions about our AWS Observability Solution apps.

diff --git a/docs/observability/aws/integrations/index.md b/docs/observability/aws/integrations/index.md index e42754b19e..cd8d8f5138 100644 --- a/docs/observability/aws/integrations/index.md +++ b/docs/observability/aws/integrations/index.md @@ -13,79 +13,79 @@ In this section, we'll introduce the following concepts:
- icon

AWS API Gateway

+ icon

AWS API Gateway

Learn how to get insights into API Gateway tasks while accepting and processing concurrent API calls.

- icon

AWS Application Load Balancer

+ icon

AWS Application Load Balancer

Learn how to gain visibility into the health of your Application Load Balancer and target groups.

- icon

AWS Classic Load Balancer

+ icon

AWS Classic Load Balancer

Learn how to gain visibility into the health of your Classic Load Balancer.

- icon

AWS DynamoDB

+ icon

AWS DynamoDB

Learn how to get operational insights into DynamoDB instances across your infrastructure.

- icon

AWS EC2 Metrics

+ icon

AWS EC2 Metrics

Learn how to display your EC2 instance metrics (CloudWatch) using predefined dashboards.

- icon

AWS EC2 Host Metrics

+ icon

AWS EC2 Host Metrics

Learn to collect local host metrics and display them using predefined search queries and dashboards.

- icon

AWS Lambda

+ icon

AWS Lambda

Learn how to utilize Lambda Logs and Metrics from CloudWatch, and CloudTrail Lambda Data Events.

- icon

AWS Network Load Balancer

+ icon

AWS Network Load Balancer

Learn how to get insights to ensure that your Network Load-Balancers are operating as expected.

- icon

Amazon RDS

+ icon

Amazon RDS

Learn how to get visibility into your Amazon RDS metrics collected with a CloudWatch metrics source.

- icon

Amazon ECS

+ icon

Amazon ECS

Learn to manage your clusters, and monitor capacity and resource utilization of ECS components.

- icon

Amazon ElastiCache

+ icon

Amazon ElastiCache

Learn to set up, run, and scale popular open-source compatible in-memory data stores in the cloud.

- icon

Amazon SNS

+ icon

Amazon SNS

Learn how to get insights into the operations and utilization of your SNS service.

- icon

Amazon SQS

+ icon

Amazon SQS

Learn how to get operational insights into your Amazon SQS utilization.

diff --git a/docs/observability/aws/other-configurations-tools/index.md b/docs/observability/aws/other-configurations-tools/index.md index cf4d45895d..8270c5bf89 100644 --- a/docs/observability/aws/other-configurations-tools/index.md +++ b/docs/observability/aws/other-configurations-tools/index.md @@ -13,19 +13,19 @@ In this section, we'll introduce the following concepts:
- icon

Add a New AWS Service

+ icon

Add a New AWS Service

Learn how to add a new dashboard to the Hierarchy.

- icon

Add Fields to Existing Host Metrics Sources

+ icon

Add Fields to Existing Host Metrics Sources

Learn how to update the AWS Observability view hierarchy and existing host metrics.

- icon

Integrate Control Tower Accounts with AWS Observability

+ icon

Integrate Control Tower Accounts with AWS Observability

Learn how to update the AWS Observability solution with AWS Control Tower-managed Accounts.

diff --git a/docs/observability/index.md b/docs/observability/index.md index 0e04741e2a..c08f68cf93 100644 --- a/docs/observability/index.md +++ b/docs/observability/index.md @@ -15,43 +15,43 @@ In this section, we'll introduce the following concepts:
- icon

About Observability

+ icon

About Observability

Learn about the Sumo Logic Observability Solution.

- icon

Set up collection

+ icon

Set up collection

Use collectors to start sending critical signals to Sumo Logic.

- icon

Monitoring

+ icon

Monitoring

Set alerts that notify you about system state changes.

- icon

AWS Observability

+ icon

AWS Observability

Simplify monitoring and troubleshooting of your AWS Cloud infrastructure.

- icon

Kubernetes Observability

+ icon

Kubernetes Observability

End-to-end solution for deploying and monitoring your K8s environment.

- icon

Reliability Management/SLOs

+ icon

Reliability Management/SLOs

Create Reliability Management dashboards, configure queries, set SLIs, and more.

- icon

Sensu

+ icon

Sensu

Gain insight into traditional server closets, containers, apps, and more.

diff --git a/docs/observability/kubernetes/index.md b/docs/observability/kubernetes/index.md index afcf722c47..b7662ae47d 100644 --- a/docs/observability/kubernetes/index.md +++ b/docs/observability/kubernetes/index.md @@ -16,50 +16,50 @@ See the [Sumo Logic Kubernetes Collection Deployment Guide](/docs/send-data/kub
- icon

Overview

+ icon

Overview

Learn how Sumo Logic brings ease-of-use to Kubernetes.

- icon

Quickstart

+ icon

Quickstart

Get up and running with our Kubernetes solution in minutes.

- icon

Data Collection

+ icon

Data Collection

Overview of Kubernetes collection process for Kubernetes environments, and configuring logs and metrics collection.

- icon

Kubernetes Apps

+ icon

Kubernetes Apps

Sumo Logic provides Kubernetes apps across a variety of platforms, each with a set of predefined dashboards.

- icon

Setting Alerts

+ icon

Setting Alerts

Sumo Logic monitors provide you with out-of-box alerts ensure that your Kubernetes cluster is available and performing well.

- icon

Monitoring K8s

+ icon

Monitoring K8s

Learn more about effectively monitoring your Kubernetes environment architecture with Sumo Logic.

- icon

Kubernetes Metrics

+ icon

Kubernetes Metrics

Learn which Kubernetes metrics are collected when you deploy our [sumologic-kubernetes-collection](/docs/send-data/kubernetes/install-helm-chart).

- icon

Troubleshoot with Kubernetes Views

+ icon

Troubleshoot with Kubernetes Views

Kubernetes views allow you to quickly locate an object in your physical K8s stack that needs to be debugged.

diff --git a/docs/observability/reliability-management-slo/create-slo.md b/docs/observability/reliability-management-slo/create-slo.md index 8b2cd85c82..860f0e0a5b 100644 --- a/docs/observability/reliability-management-slo/create-slo.md +++ b/docs/observability/reliability-management-slo/create-slo.md @@ -59,11 +59,11 @@ The following table lists the available options for an SLO: For Ratio-based definition, define queries for the successful or unsuccessful events to calculate against total events:
  1. Specify Total Events query.
  2. -
  3. Build a query using metrics and filters. See Overview of Metrics in Sumo.
  4. +
  5. Build a query using metrics and filters. See [Overview of Metrics in Sumo](/docs/metrics/introduction).
  6. Select the values to use from Number of data points or Metric value.
  7. Configure the Total Events, including a query and values, to use Number of data points or Metric value. You can copy and paste the previous query, removing filters to get the total.
For Threshold-based definitions, which calculate against success criteria:
  1. Select Successful or Unsuccessful Events to measure.
  2. -
  3. Build a query using metrics and filters. See Overview of Metrics in Sumo for more information.
  4. +
  5. Build a query using metrics and filters. See [Overview of Metrics in Sumo](/docs/metrics/introduction) for more information.
  6. For Use values from, it always uses the Metric value.
  7. For Success Criteria for Avg, Min, Max, or Sum of the selected signal type (such as latency) which must be greater than, greater than or equal to, less than, or less than equal to an amount you enter (positive or negative number).
@@ -78,11 +78,11 @@ The following table lists the available options for an SLO: For Ratio-based definitions, which calculate successful or unsuccessful events against total events:
  1. Specify Total Events query.
  2. -
  3. Search logs selecting and entering a log query. See About Search Basics for more information.
  4. +
  5. Search logs selecting and entering a log query. See [About Search Basics](/docs/search/get-started-with-search/search-basics/about-search-basics) for more information.
  6. For Use values from, select the numeric value available for that query to pull data from.
  7. Then configure the Total Events, including a query and values. You can copy and paste the previous query, perhaps with filters removed to get the total.
For Threshold-based definitions, which calculate against success criteria:
  1. Select Successful or Unsuccessful Events to measure.
  2. -
  3. Search logs selecting and entering a log query. See About Search Basics for more information.
  4. +
  5. Search logs selecting and entering a log query. See [About Search Basics](/docs/search/get-started-with-search/search-basics/about-search-basics) for more information.
  6. For Use values from, it always uses the Metric value.
  7. For Success Criteria for Avg, Min, Max, or Sum of the selected signal type (such as latency), which must be greater than, greater than or equal to, less than, or less than equal to an amount you enter (positive or negative number).
diff --git a/docs/observability/sdo/index.md b/docs/observability/sdo/index.md index 697c3946b5..788915f735 100644 --- a/docs/observability/sdo/index.md +++ b/docs/observability/sdo/index.md @@ -15,37 +15,37 @@ Check out our [DevOps Glossary](https://www.sumologic.com/glossary).
- icon

About SDO

+ icon

About SDO

Learn how the Sumo Logic SDO effectively manages and enhances development and production environments.

- icon

Set up SDO

+ icon

Set up SDO

This page provides instruction for setting up the Software Development Optimization Solution including manual, Terraform, and Atlassian Marketplace.

- icon

Install SDO App and Dashboards

+ icon

Install SDO App and Dashboards

Learn how to install the SDO app and use pre-configured searches and dashboards that provide insights into your DevOps pipeline.

- icon

Jenkins Plugin

+ icon

Jenkins Plugin

Learn how to send build and deploy events to Sumo Logic from Jenkins Pipeline.

- icon

Supported Tools and Schema

+ icon

Supported Tools and Schema

Learn which Tools and Schema are supported by Software Development Optimization Solution.

- icon

Integrate Other DevOps Tools with SDO (Optional)

+ icon

Integrate Other DevOps Tools with SDO (Optional)

Learn how to integrate other tools with the Software Development Optimization Solution.

diff --git a/docs/platform-services/automation-service/app-central/index.md b/docs/platform-services/automation-service/app-central/index.md index af96479d43..8f66aeb492 100644 --- a/docs/platform-services/automation-service/app-central/index.md +++ b/docs/platform-services/automation-service/app-central/index.md @@ -14,25 +14,25 @@ In this section, we'll introduce the following concepts:
- icon

About App Central

+ icon

About App Central

Learn how to use App Central to get new applications and tools.

- icon

Playbooks in App Central

+ icon

Playbooks in App Central

Learn about the available playbooks in App Central.

- icon

Configure Authentication for Integrations

+ icon

Configure Authentication for Integrations

Learn how to configure authentication for integrations.

- icon

Integrations in App Central

+ icon

Integrations in App Central

See all the integrations available for installation in App Central.

diff --git a/docs/platform-services/automation-service/index.md b/docs/platform-services/automation-service/index.md index 14b7c7b526..f7b42a3599 100644 --- a/docs/platform-services/automation-service/index.md +++ b/docs/platform-services/automation-service/index.md @@ -14,49 +14,49 @@ In this section, we'll introduce the following concepts:
- icon

About the Automation Service

+ icon

About the Automation Service

Get an overview of how the Automation Service allows you to automate actions.

- icon

Introduction to the Automation Service

+ icon

Introduction to the Automation Service

Get an introduction to the Automation Service.

- icon

App Central

+ icon

App Central

Learn how to use App Central to get new applications and tools.

- icon

Playbooks

+ icon

Playbooks

Learn about playbooks. A playbook is a predefined set of actions and conditional statements that run in an automated workflow to respond to a certain event or incident type.

- icon

Integrations

+ icon

Integrations

Learn how integrations are connectors to applications from industry-leading network and security vendors.

- icon

Audit Logging

+ icon

Audit Logging

Learn how to search the Audit Event Index for log events in the Automation Service and Cloud SOAR.

- icon

Automation Bridge

+ icon

Automation Bridge

Learn how to install a bridge for the Automation Service to allow running custom actions or integrations in an on-premise environment.

- icon

Integration Framework

+ icon

Integration Framework

Learn about the framework used for integrations.

diff --git a/docs/platform-services/automation-service/integration-framework/index.md b/docs/platform-services/automation-service/integration-framework/index.md index f24641fe70..fae63400c9 100644 --- a/docs/platform-services/automation-service/integration-framework/index.md +++ b/docs/platform-services/automation-service/integration-framework/index.md @@ -14,25 +14,25 @@ Because the Automation Service is a subset of automation capabilities adapted fr
- icon

About the Integraton Framework

+ icon

About the Integraton Framework

Get an overview of how the integration framework works.

- icon

Integration Framework Output

+ icon

Integration Framework Output

Learn how to work with output from the integration framework.

- icon

Using Docker with the Integration Framework for Cloud SOAR

+ icon

Using Docker with the Integration Framework for Cloud SOAR

Learn how to use Docker with the integration framework for Cloud SOAR.

diff --git a/docs/platform-services/automation-service/playbooks/index.md b/docs/platform-services/automation-service/playbooks/index.md index dedf71ee61..6627b8112b 100644 --- a/docs/platform-services/automation-service/playbooks/index.md +++ b/docs/platform-services/automation-service/playbooks/index.md @@ -19,25 +19,25 @@ To run a playbook, add it to an automation. You can run playbooks in [monitors](
- icon

Create Playbooks

+ icon

Create Playbooks

Learn how to create playbooks in the Automation Service to run automated actions.

- icon

Playbook Payloads

+ icon

Playbook Payloads

Learn about the data payloads of the different playbook types.

- icon

Arrays in Playbooks

+ icon

Arrays in Playbooks

Learn how to handle arrays in Automation Service playbooks

- icon

Troubleshoot Playbooks

+ icon

Troubleshoot Playbooks

Learn how to test playbooks and troubleshoot playbook problems.

diff --git a/docs/platform-services/index.md b/docs/platform-services/index.md index 4397b71264..b6a423659a 100644 --- a/docs/platform-services/index.md +++ b/docs/platform-services/index.md @@ -11,7 +11,7 @@ Platform services are services that are available to use across the entire Sumo
- icon

Automation Service

+ icon

Automation Service

Learn how to use the Automation Service to automate actions.

diff --git a/docs/search/behavior-insights/index.md b/docs/search/behavior-insights/index.md index 6b8d3e4fd2..f48864a004 100644 --- a/docs/search/behavior-insights/index.md +++ b/docs/search/behavior-insights/index.md @@ -19,19 +19,19 @@ In this section, we'll introduce the following concepts:
- icon

LogCompare

+ icon

LogCompare

Compare log data from different time periods to detect major changes or anomalies.

- icon

LogReduce

+ icon

LogReduce

Assess activity patterns for things like a range of devices or traffic on a website.

- icon

LogExplain

+ icon

LogExplain

Find the root cause of outliers in logs based on conditions you specify.

diff --git a/docs/search/behavior-insights/logreduce/index.md b/docs/search/behavior-insights/logreduce/index.md index c5b503377a..79c1f84a99 100644 --- a/docs/search/behavior-insights/logreduce/index.md +++ b/docs/search/behavior-insights/logreduce/index.md @@ -36,37 +36,37 @@ In this section, we'll introduce the following concepts:
- icon

LogReduce Operator

+ icon

LogReduce Operator

Allows you to quickly assess activity patterns for things like a range of devices or traffic on a website.

- icon

Detect Patterns with LogReduce

+ icon

Detect Patterns with LogReduce

Group messages with similar structures and patterns, providing insight into specific keywords or time range.

- icon

LogReduce Keys

+ icon

LogReduce Keys

Clusters JSON logs based on keys providing an at-a-glance summary of patterns in logs based on their schema while ignoring specific values.

- icon

LogReduce Values

+ icon

LogReduce Values

Clusters JSON logs using the values of keys.

- icon

LogReduce Relevance Column

+ icon

LogReduce Relevance Column

Displays a numerical score for a signature, predicting which signatures could be most meaningful.

- icon

Influence the LogReduce Outcome

+ icon

Influence the LogReduce Outcome

Influence the algorithm by editing a signature to increase or decrease your results granularity.

diff --git a/docs/search/get-started-with-search/build-search/index.md b/docs/search/get-started-with-search/build-search/index.md index 44792dbd26..6bfa942a1b 100644 --- a/docs/search/get-started-with-search/build-search/index.md +++ b/docs/search/get-started-with-search/build-search/index.md @@ -13,49 +13,49 @@ In this section, we'll introduce the following concepts:
- icon

Best Practices for Searches

+ icon

Best Practices for Searches

Learn to get the most out of searches using these easy-to-follow rules.

- icon

Dynamic Parsing

+ icon

Dynamic Parsing

Learn how to view fields from JSON logs without having to manually specify parsing logic.

- icon

Keyword Search Expressions

+ icon

Keyword Search Expressions

Learn how to define the scope of data for the query.

- icon

Search Syntax Overview

+ icon

Search Syntax Overview

Learn about query syntax and how to construct a search.

- icon

Search Templates

+ icon

Search Templates

Learn how to simplify searches for your users by giving them a few easy input choices.

- icon

Set the Time Range

+ icon

Set the Time Range

Learn how to adjust the time range for searches and metrics to get the most useful information.

- icon

Use Receipt Time

+ icon

Use Receipt Time

Learn how to display search data in the order that Collectors received the messages.

- icon

Use a URL to Run a Search

+ icon

Use a URL to Run a Search

Learn how to create a custom URL to launch a log search in Sumo Logic.

diff --git a/docs/search/get-started-with-search/build-search/use-searchable-time.md b/docs/search/get-started-with-search/build-search/use-searchable-time.md index 928a2cc17f..daa024d6cb 100644 --- a/docs/search/get-started-with-search/build-search/use-searchable-time.md +++ b/docs/search/get-started-with-search/build-search/use-searchable-time.md @@ -11,7 +11,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Beta

+

Beta

diff --git a/docs/search/get-started-with-search/index.md b/docs/search/get-started-with-search/index.md index d769669936..4b610772af 100644 --- a/docs/search/get-started-with-search/index.md +++ b/docs/search/get-started-with-search/index.md @@ -31,25 +31,25 @@ In this section, we'll introduce the following concepts:
- icon

Search Basics

+ icon

Search Basics

Sumo Logic search syntax uses logical and familiar operators allowing you to create ad hoc queries quickly and efficiently.

- icon

Build Searches

+ icon

Build Searches

Details on building a search - best practices, syntax, time range, and efficient searches.

- icon

Using the Search Page

+ icon

Using the Search Page

Understand the basic components of the Search window and how they can help you investigate your issues.

- icon

Suggested Searches

+ icon

Suggested Searches

Sumo Logic queries can help track and diagnose common IT issues. Take a look at these Sumo Logic suggested searches.

diff --git a/docs/search/get-started-with-search/search-basics/index.md b/docs/search/get-started-with-search/search-basics/index.md index 76f0ac3753..6062dfb9aa 100644 --- a/docs/search/get-started-with-search/search-basics/index.md +++ b/docs/search/get-started-with-search/search-basics/index.md @@ -13,97 +13,97 @@ In this section, we'll introduce the following concepts:
- icon

About Search Basics

+ icon

About Search Basics

Sumo Logic search syntax, based on a funnel concept, uses logical and familiar operators allowing you to create queries quickly.

- icon

Built-in Metadata

+ icon

Built-in Metadata

Metadata tags are attached to your log messages at ingest, which is quite useful when you're searching log data.

- icon

Chart Search Results

+ icon

Chart Search Results

In the Aggregates tab, you can view search results as a chart, such as a bar or column chart.

- icon

Comments in Search Queries

+ icon

Comments in Search Queries

Learn how to add comments to a search query and comment out lines for notes.

- icon

Export Search Results

+ icon

Export Search Results

Up to 100,000 rows can be exported as a CSV text file.

- icon

Pause or Cancel a Search

+ icon

Pause or Cancel a Search

When a search is in progress, the options to Cancel or Pause the search appear.

- icon

Quick Search for Collectors and Sources

+ icon

Quick Search for Collectors and Sources

Quickly start a search for a Collector, Source, or Source Category from the Manage Collection page.

- icon

Reference a Field with Special Characters

+ icon

Reference a Field with Special Characters

Reference a field name that contains a special character.

- icon

Save a Search

+ icon

Save a Search

Save your favorite searches to run them again later.

- icon

Search Autocomplete

+ icon

Search Autocomplete

The search autocomplete dropdown dialog offers suggestions to make query writing easier.

- icon

Search Large Messages

+ icon

Search Large Messages

Learn how to search large log messages, which Sumo Logic slices into smaller message chunks.

- icon

Search Surrounding Messages

+ icon

Search Surrounding Messages

Investigate events surrounding a message in your Messages list.

- icon

Share a Link to a Search

+ icon

Share a Link to a Search

Learn how to share a link to search query results via email or IM.

- icon

Time Range Expressions

+ icon

Time Range Expressions

Learn how to add a time range expression in the time range field when building a search query.

- icon

View Search Results for JSON Logs

+ icon

View Search Results for JSON Logs

If your search results contain JSON logs, you can show or hide JSON format from the Messages tab.

- icon

View Traces Search Results

+ icon

View Traces Search Results

Open and review traces from search log results.

diff --git a/docs/search/get-started-with-search/search-page/field-browser/index.md b/docs/search/get-started-with-search/search-page/field-browser/index.md index 050c75319f..d1ef43f4c8 100644 --- a/docs/search/get-started-with-search/search-page/field-browser/index.md +++ b/docs/search/get-started-with-search/search-page/field-browser/index.md @@ -76,13 +76,13 @@ In this section, we'll introduce the following concepts:
- icon

Search from the Field Browser

+ icon

Search from the Field Browser

Drilling down into a field from the Field Browser is seamless for non-aggregate queries.

- icon

Show and Hide Fields in the Field Browser

+ icon

Show and Hide Fields in the Field Browser

Change the fields that are displayed in search results by showing or hiding in the Field Browser.

diff --git a/docs/search/get-started-with-search/search-page/index.md b/docs/search/get-started-with-search/search-page/index.md index f6e7402874..8e4aaefd1a 100644 --- a/docs/search/get-started-with-search/search-page/index.md +++ b/docs/search/get-started-with-search/search-page/index.md @@ -54,79 +54,79 @@ In this section, we'll introduce the following concepts:
- icon

Add a Saved Search to Favorites

+ icon

Add a Saved Search to Favorites

You can mark a saved search as a favorite so it appears in your Library.

- icon

Pin a Search

+ icon

Pin a Search

You can pin a search so that it runs in the background independent of the browser session.

- icon

Change the Time Range in the Histogram

+ icon

Change the Time Range in the Histogram

Learn how to filter results based on a histogram time range.

- icon

Field Browser

+ icon

Field Browser

Explore specific fields of interest in a search by displaying or hiding selected fields without having to parse them.

- icon

View log-level distribution

+ icon

View log-level distribution

View the filter log-level distribution in your Histogram results.

- icon

View Log Message Inspector

+ icon

View Log Message Inspector

Know about Log Message Inspector to view information for all the parameter values associated with the query.

- icon

Modify a Search from the results table

+ icon

Modify a Search from the results table

Modify past searches by selecting text displayed in the Messages tab.

- icon

Navigate Messages in Search Results

+ icon

Navigate Messages in Search Results

When you run a search query, messages display in the Message, Aggregates, and Summarize tabs.

- icon

Search Highlighting

+ icon

Search Highlighting

When your search results are returned, your search terms are highlighted in the Messages tab.

- icon

Search Load Indicator

+ icon

Search Load Indicator

Learn how to reduce system load by making your queries more specific.

- icon

Search Modes

+ icon

Search Modes

Learn about the new search modes of our Log Search page.

- icon

Set Messages Tab Preferences

+ icon

Set Messages Tab Preferences

The Preferences menu allows you to customize how messages are displayed.

- icon

Wildcards in Full Text Searches

+ icon

Wildcards in Full Text Searches

You can use wildcards in full text searches.

diff --git a/docs/search/get-started-with-search/suggested-searches/index.md b/docs/search/get-started-with-search/suggested-searches/index.md index 1675d633f5..5d54fa04c0 100644 --- a/docs/search/get-started-with-search/suggested-searches/index.md +++ b/docs/search/get-started-with-search/suggested-searches/index.md @@ -4,6 +4,8 @@ title: Suggested Searches description: Sumo Logic queries can help track and diagnose common IT issues. Take a look at these Sumo Logic suggested searches. --- +import useBaseUrl from '@docusaurus/useBaseUrl'; + Sumo Logic queries can help track and diagnose common IT issues. Take a look at these Sumo Logic suggested searches. @@ -14,31 +16,31 @@ In this section, we'll introduce the following concepts:
-

Apache Access Parser

+

Apache Access Parser

Analyze and parse Apache access logs to gather insights on website visitor activity and server performance. Learn more.

-

Apache Errors Parser

+

Apache Errors Parser

Analyzes Apache error logs and extracts information to help diagnose and resolve application performance problems. Learn more.

-

Cisco ASA Parser

+

Cisco ASA Parser

Monitor and analyze Cisco ASA firewall log files to identify security threats and troubleshoot performance issues. Learn more.

-

Microsoft IIS Parser

+

Microsoft IIS Parser

Analyzes logs to monitor application and server performance, detect security threats, and troubleshoot issues. Learn more.

-

Windows Event

+

Windows Event

Monitors server performance, detects security threats, and resolves issues through event log analysis. Learn more.

diff --git a/docs/search/index.md b/docs/search/index.md index 06655c574c..39216ad7dd 100644 --- a/docs/search/index.md +++ b/docs/search/index.md @@ -19,79 +19,79 @@ In this section, we'll introduce the following concepts:
- icon

Getting started with Log Search

+ icon

Getting started with Log Search

Start here to begin exploring your data in Sumo Logic.

- icon

Mobot

+ icon

Mobot

Accelerate log investigations and troubleshooting with Sumo Logic Mobot, our AI-powered assistant that enables you to ask natural language questions and get contextual suggestions, helping first responders get to answers faster.

- icon

Search Query Language

+ icon

Search Query Language

The extensive Sumo Logic query options help you gain valuable insight into your log messages.

- icon

Search Cheat Sheets

+ icon

Search Cheat Sheets

Cheat sheets provide examples of useful search queries for different use cases.

- icon

Behavior Insights

+ icon

Behavior Insights

Gain behavioral insight of your environment using LogReduce operators.

- icon

Live Tail

+ icon

Live Tail

Real-time live feed of log events associated with a Source or Collector.

- icon

Time Compare

+ icon

Time Compare

Run a compare operation automatically from your search results.

- icon

Lookup Tables

+ icon

Lookup Tables

Learn about Lookup tables and the search operators you can use with them.

- icon

Logs Query Assist

+ icon

Logs Query Assist

Learn how Logs Query Assist makes it easier to discover relevant fields and minimize errors.

- icon

Optimize Search Performance

+ icon

Optimize Search Performance

Learn how to accelerate the search process to get query results in less time and improve productivity for forensic analysis and log management.

- icon

Optimize Your Search with Partitions

+ icon

Optimize Your Search with Partitions

Optimize your search with partitions, which store your data in an index separate from the rest of your account's data.

- icon

Subqueries

+ icon

Subqueries

Filter and evaluate conditions for a query when you may not be sure of the exact filter.

- icon

FAQ

+ icon

FAQ

Get answers to frequently asked questions about Log Search.

diff --git a/docs/search/live-tail/index.md b/docs/search/live-tail/index.md index 9fe08f3029..6140b875aa 100644 --- a/docs/search/live-tail/index.md +++ b/docs/search/live-tail/index.md @@ -13,49 +13,49 @@ In this section, we'll introduce the following concepts:
- icon

About Live Tail

+ icon

About Live Tail

See a real-time live feed of log events for development and troubleshooting.

- icon

Filter Live Tail

+ icon

Filter Live Tail

To find specific information, you can filter by keyword.

- icon

Live Tail CLI

+ icon

Live Tail CLI

Allows you to start and use a Live Tail session from the command line.

- icon

Live Tail Highlighting

+ icon

Live Tail Highlighting

Highlight keywords that appear in your running Live Tail.

- icon

Live Tail Preferences

+ icon

Live Tail Preferences

You can change the preferences for Live Tail line spacing, message text size, and message color.

- icon

Show Live Tail in Search

+ icon

Show Live Tail in Search

Start a Live Tail session from the Search page or the Live Tail page.

- icon

Multiple Live Tails

+ icon

Multiple Live Tails

You can run two Live Tail sessions at a time per browser tab.

- icon

Troubleshooting Live Tail

+ icon

Troubleshooting Live Tail

Troubleshooting tips for Sumo Logic Live Tail.

diff --git a/docs/search/lookup-tables/index.md b/docs/search/lookup-tables/index.md index 7aa2359fe7..c8c786cd36 100644 --- a/docs/search/lookup-tables/index.md +++ b/docs/search/lookup-tables/index.md @@ -15,13 +15,13 @@ In this section, we'll introduce the following concepts:
- icon

Create a Lookup Table

+ icon

Create a Lookup Table

Learn about Lookup Tables and how to create and manage them.

- icon

Manage and Update Lookup Tables

+ icon

Manage and Update Lookup Tables

Learn how to update, export, and share Lookup Tables.

diff --git a/docs/search/mobot-multiturn-beta.md b/docs/search/mobot-multiturn-beta.md index e5b389c962..d255778bb1 100644 --- a/docs/search/mobot-multiturn-beta.md +++ b/docs/search/mobot-multiturn-beta.md @@ -9,7 +9,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Beta

+

Beta

:::info This feature is in Beta. For more information, contact your Sumo Logic account executive. diff --git a/docs/search/mobot-unstructured-logs-beta.md b/docs/search/mobot-unstructured-logs-beta.md index dfc99b6e97..baca6759fb 100644 --- a/docs/search/mobot-unstructured-logs-beta.md +++ b/docs/search/mobot-unstructured-logs-beta.md @@ -10,7 +10,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Beta

+

Beta

diff --git a/docs/search/search-cheat-sheets/index.md b/docs/search/search-cheat-sheets/index.md index 7f9617a565..596e33c06f 100644 --- a/docs/search/search-cheat-sheets/index.md +++ b/docs/search/search-cheat-sheets/index.md @@ -11,25 +11,25 @@ Use cheat sheets as a quick reference guide or get up to speed quickly with our
- icon

General Search examples

+ icon

General Search examples

Start here to begin exploring your data in Sumo Logic.

- icon

grep to Searching with Sumo

+ icon

grep to Searching with Sumo

This cheat sheet helps you move from grep to searching with Sumo.

- icon

Log Operators

+ icon

Log Operators

Learn about all available parsers, aggregators, search operators, and mathematical expressions.

- icon

IIS Search Query examples

+ icon

IIS Search Query examples

View examples of useful IIS search queries for various use cases.

diff --git a/docs/search/search-cheat-sheets/log-operators.md b/docs/search/search-cheat-sheets/log-operators.md index 12b49662a7..10a709abbe 100644 --- a/docs/search/search-cheat-sheets/log-operators.md +++ b/docs/search/search-cheat-sheets/log-operators.md @@ -20,37 +20,37 @@ Sumo provides a number of ways to [parse](/docs/search/search-query-language/pa Example - parse (anchor) + [parse (anchor)](/docs/search/search-query-language/parse-operators/parse-predictable-patterns-using-an-anchor) The parse operator, also called parse anchor, parses strings according to specified start and stop anchors, and then labels them as fields for use in subsequent aggregation functions in the query such as sorting, grouping, or other functions. | parse "User=*:" as user - parse regex + [parse regex](/docs/search/search-query-language/parse-operators/parse-variable-patterns-using-regex) The parse regex operator (also called the extract operator) enables users comfortable with regular expression syntax to extract more complex data from log lines. Parse regex can be used, for example, to extract nested fields. | parse regex field=url "[0-9A-Za-z-]+\.(?<domain>[A-Za-z-]+\.(?:co\.uk|com|com\.au))/.*" - keyvalue + [keyvalue](/docs/search/search-query-language/parse-operators/parse-keyvalue-formatted-logs) Typically, log files contain information that follow a key-value pair structure. The keyvalue operator allows you to get values from a log message by specifying the key paired with each value. | keyvalue "module", "thread" - csv + [csv](/docs/search/search-query-language/parse-operators/parse-csv-formatted-logs) The csv operator allows you to parse Comma Separated Values (CSV) formatted log entries. It uses a comma as the default delimiter.csv operator allows you to parse Comma Separated Values (CSV) formatted log entries. It uses a comma as the default delimiter. | csv_raw extract 1 as user, 2 as id, 3 as name - JSON + [JSON](/docs/search/search-query-language/parse-operators/parse-json-formatted-logs) The JSON operator is a search query language operator that allows you to extract values from JSON input. Because JSON supports both nested keys and arrays that contain ordered sequences of values, the Sumo Logic JSON operator allows you to extract single top-level fields, multiple fields, nested keys, and keys in arrays. | parse "explainJsonPlan] *" as jsonobject
| json field=jsonobject "sessionId"
| json auto
- split + [split](/docs/search/search-query-language/parse-operators/parse-delimited-logs-using-split) The split operator allows you to split strings into multiple strings, and parse delimited log entries, such as space-delimited formats. Full query example:
_sourceCategory=colon
| parse "] * *" as log_level, text
| split text delim=':' extract 1 as user, 2 as account_id, 3 as session_id, 4 as result
- xml + [xml](/docs/search/search-query-language/parse-operators/parse-xml-formatted-logs) The XML operator uses a subset of the XPath 1.0 specification to provide a way for you to parse fields from XML documents. Using it, you can specify what to extract from an XML document using an XPath reference. | parse xml "/af/minimum/@requested_bytes" @@ -84,66 +84,66 @@ Instead, use separate steps: Example - avg + [avg](/docs/search/search-query-language/group-aggregate-operators/avg) The averaging function (avg) calculates the average value of the numerical field being evaluated within the time range analyzed. _avg | avg(request_received) by _timeslice - count, count_distinct, and count_frequent + [count, count_distinct, and count_frequent](/docs/search/search-query-language/group-aggregate-operators/count-count-distinct-and-count-frequent) Aggregating (group-by) functions are used in conjunction with the group operator and a field name. Only the word by is required to represent the group operator. The count function is also an operator in its own right and therefore can be used with or without the word by. _count
_count_distinct
_approxcount - count_frequent can return up to 100 results when used in dashboard panels. + [count_frequent](/docs/search/search-query-language/group-aggregate-operators/count-count-distinct-and-count-frequent) can return up to 100 results when used in dashboard panels. Example 1:
| count by url

Example 2:
| count_distinct(referrer) by status_code - fillmissing - When you run a standard group-by query, Sumo Logic only returns non-empty groups in the results. For example, if you are grouping by timeslice, then only the timeslices that have data are returned.
This operator allows you to specify groups to present in the output, even if those groups have no data. + [fillmissing](/docs/search/search-query-language/search-operators/fillmissing) + When you run a standard [group-by](/docs/search/search-query-language/group-aggregate-operators) query, Sumo Logic only returns non-empty groups in the results. For example, if you are grouping by timeslice, then only the timeslices that have data are returned.
This operator allows you to specify groups to present in the output, even if those groups have no data. Not supported in Auto Refresh Dashboards or any continuous query. error
| count by _sourceCategory
| fillmissing values("backend", "database", "webapp") in _sourceCategory
- first and last + [first and last](/docs/search/search-query-language/group-aggregate-operators/first-last) First finds the earliest occurrence in search results, and last finds the result that follows all others, based on the sort order for the query. _first
_last Not supported in auto refresh dashboards or any continuous query. | sort by _timeslice
| first(error_message) by hostname
- min and max + [min and max](/docs/search/search-query-language/group-aggregate-operators/min-max) Use the min and max functions to find the smallest or largest value in a set of values. _min
_max | max(request_received) by hour - most_recent and least_recent + [most_recent and least_recent](/docs/search/search-query-language/group-aggregate-operators/most-recent-least-recent) The most_recent and least_recent operators, used with the withtime operator, allow you to order data from newest to oldest. _most_recent
_least_recent *ip* OR *address*
| parse regex "(?<IP>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
| lookup latitude, longitude, country_code from geo://location on ip=IP
| where !isNull(country_code)
| withtime IP
| most_recent(ip_withtime) by country_code
- pct + [pct](/docs/search/search-query-language/group-aggregate-operators/pct-percentile) The percentile function (pct) finds the percentile of a given field. Multiple pct functions can be included in one query. _<fieldname>_pct_<percentile> | parse "value=*" as value
| pct(value, 95) as value_95pct
- stddev + [stddev](/docs/search/search-query-language/group-aggregate-operators/stddev) The standard deviation function (stddev) finds the standard deviation value for a distribution of numerical values within the time range analyzed and associated with a group designated by the "group by" field. _stddev ... | stddev(request_received) group by hour | sort by _stddev - sum + [sum](/docs/search/search-query-language/group-aggregate-operators/sum) Sum adds the values of the numerical field being evaluated within the time range analyzed. _sum @@ -164,203 +164,203 @@ This section provides detailed syntax, rules, and examples for Sumo Logic Opera Example - accum + [accum](/docs/search/search-query-language/search-operators/accum) The accum operator calculates the cumulative sum of a field. It can be used to find a count by a specific time interval, and can be used to find a total running count across all intervals. _accum Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. _sourceCategory=IIS (Wyatt OR Luke)
| parse "[user=*]" as cs_username
| timeslice by 1m
| count as requests by _timeslice,cs_username
| sort by _timeslice asc,cs_username
| accum requests as running_total
- asn lookup + [asn lookup](/docs/search/search-query-language/search-operators/asn-lookup) Sumo Logic can lookup an Autonomous System Number (ASN) and organization name by an IP address. Any IP addresses that do not have an ASN will return null values. _sourceCategory=stream "remote_ip="
| parse regex "(?<ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
| lookup organization, asn from asn://default on ip = ip
- backshift + [backshift](/docs/search/search-query-language/search-operators/backshift) The backshift operator compares values as they change over time. Backshift can be used with rollingstd, smooth, or any other operators whose results could be affected by spikes of data (where a spike could possibly throw off future results). _backshift Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. _sourceCategory=katta
| timeslice by 1m
| count by _timeslice,_sourcehost
| sort + _timeslice
| backshift _count,1 by _sourcehost
- base64Decode + [base64Decode](/docs/search/search-query-language/search-operators/base64decode) The base64Decode operator takes a base64 string and converts it to an ASCII string. | base64Decode("aHR0cDovL2NvZGVjLmFwYWNoZS5vcmcvY29tbW1vbnM=") as V - base64Encode + [base64Encode](/docs/search/search-query-language/search-operators/base64encode) The base64Encode operator takes an ASCII string and converts it to a base64 string. | base64Encode("hello world") as base64 - bin + [bin](/docs/search/search-query-language/search-operators/bin) Use the bin operator to sort results in a histogram. _bin_label
_bin_lower
_bin_upper _sourceCategory=analytics
| parse "ms: *" as time
| bin time width=10, min = 0, max = 500
| count by _bin, _bin_upper
| sort by _bin_upper
- CIDR + [CIDR](/docs/search/search-query-language/search-operators/cidr) The CIDR operator allows you to leverage Classless Inter-Domain Routing (CIDS) notations to analyze IP network traffic in order to narrow analysis to specific subnets. CIDR notations specify the routing prefix of IP addresses. (denied OR rejected AND _sourcecategory=firewall
| parse "ip=*," as ip_address
| where compareCIDRPrefix("10.10.1.32", ip_address, toInt(27))
| count by ip_address
- concat + [concat](/docs/search/search-query-language/search-operators/concat) The Concat operator allows you to concatenate or join multiple strings, numbers, and fields into a single user-defined field. It concatenates strings end-to-end and joins them into a new string that you define. Not supported in Dashboards. ... | concat(octet1, ".", octet2, ".",octet3, ".",octet4) as ip_address - contains - The contains operator compares string values of two parsed fields and returns a boolean result based on whether the second field's value exists in the first. + [contains](/docs/search/search-query-language/search-operators/contains) + The contains operator compares string values of two [parsed](/docs/search/search-query-language/search-operators/contains) fields and returns a boolean result based on whether the second field's value exists in the first. ... | contains("hello world", "hello") as containing - decToHex + [decToHex](/docs/search/search-query-language/search-operators/dectohex) The decToHex operator converts a long value of 16 or fewer digits to a hexadecimal string using Two's Complement for negative values. ... | decToHex("4919") as V - diff + [diff](/docs/search/search-query-language/search-operators/diff) The diff operator calculates the rate of change in a field between consecutive rows. To produce results, diff requires that a specified field contain numeric data; any non-numerical values are removed from the search results. _diff Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. * | parse "bytes transmitted: '*'" as bytes
| timeslice 1m
| sum(bytes) as bytes by _timeslice
| sort _timeslice
| diff bytes as diff_bytes
- fields + [fields](/docs/search/search-query-language/search-operators/fields) The fields operator allows you to choose which fields are displayed in the results of a query. Use a fields operator to reduce the "clutter" of a search output that contains fields that aren't completely relevant to your query. _sourceCategory=access_logs
| parse "[status=*]" as status_code
| fields method, status_code
- filter + [filter](/docs/search/search-query-language/search-operators/filter) The filter operator can filter the output of a search using the results of a different search based on the filtering criteria of a subquery. The filter operator keeps only the records that match the filter criteria, allowing you to restrict search results to the most relevant information. The operator can process up to 100,000 data points for a single query. It automatically drops the data points that exceed the limit and issues a warning. _sourceCategory=HttpServers
| timeslice 1m
| count by _timeslice, _sourceHost
| filter _sourcehost in (outlier _count by _sourceHost | where _count_violation > 0)
| transpose row _timeslice column _sourcehost
- format + [format](/docs/search/search-query-language/search-operators/format) The format operator allows you to format and combine data from fields in message logs—including numbers, strings, and dates—into a single user-defined string. This allows data in message logs, such as dates or currency amounts, to be formatted as human readable, when otherwise it would be hard to decipher. error
| parse "fiveMinuteRate=*," as rate
| format("%s : %s","Five Minute Rate is" , rate) as formattedVal
- formatDate + [formatDate](/docs/search/search-query-language/search-operators/formatdate) The formatDate operator allows you to format dates in log files as a string in the format you require, such as US date formatting, European formatting, timestamps, etc. * | formatDate(now(), "yyyy-MM-dd") as today - geo lookup + [geo lookup](/docs/search/search-query-language/search-operators/geo-lookup-map) Sumo Logic can match a parsed IPv4 or IPv6 address to its geographical location on a map. To create the map the lookup operator matches parsed IP addresses to their physical location based on the latitude and longitude of where the addresses originated. latitude
longitude
_count
continent
country_code
country_name
region
city
state
postal_code
connection_type
country_cf
state_cf
city_cf | parse "remote_ip=*]" as remote_ip
| lookup latitude, longitude, country_code, country_name, region, city, postal_code from geo://location on ip = remote_ip
| count by latitude, longitude, country_code, country_name, region, city, postal_code
| sort _count
- haversine + [haversine](/docs/search/search-query-language/search-operators/haversine) The haversine operator returns the distance between latitude and longitude values of two coordinates in kilometers. Coordinates need to be positive or negative values based on being north/south or east/west, instead of using the terms N/S, E/W. | haversine(39.04380, -77.48790, 45.73723, -119.81143) as distanceKMs - hexToDec + [hexToDec](/docs/search/search-query-language/search-operators/hextodec) The hexToDec operator converts a hexadecimal string of 16 or fewer characters to long using Two's Complement for negative values. | hexToDec("0000000000001337") as V - if + [if](/docs/search/search-query-language/search-operators/if) There are two forms of ternary expression you can use in Sumo Logic queries: one is constructed using the IF operator, and the other uses the question mark (?) operator. These expressions are used to evaluate a condition as either true or false, with values assigned for each outcome. It is a shorthand way to express an if-else condition. | if(status_code matches "5*", 1, 0) as server_error
Or
| status_code matches "5*" ? 1 : 0 as server_error
- in + [in](/docs/search/search-query-language/search-operators/in) The In operator returns a Boolean value: true if the specified property is in the specified object, or false if it is not. | if (status_code in ("500", "501", "502", "503", "504", "505", "506", "401", "402", "403", "404"), "Error", "OK") as status_code_type - ipv4ToNumber + [ipv4ToNumber](/docs/search/search-query-language/search-operators/ipv4tonumber) The ipv4ToNumber operator allows you to convert an Internet Protocol version 4 (IPv4) IP address from the octet dot-decimal format to a decimal format. This decimal format makes it easier to compare one IP address to another, rather than relying on IP masking. _sourceCategory=service remote_ip
| parse "[remote_ip=*]" as ip
| ipv4ToNumber(ip) as num
| fields ip, num
- isBlank + [isBlank](/docs/search/search-query-language/search-operators/isnull-isempty-isblank) The isBlank operator checks to see that a string contains text. Specifically, it checks to see if a character sequence is whitespace, empty ("") ,or null. It takes a single parameter and returns a Boolean value: true if the variable is indeed blank, or false if the variable contains a value other than whitespace, empty, or null. | where isBlank(user) - isEmpty + [isEmpty](/docs/search/search-query-language/search-operators/isnull-isempty-isblank) The isEmpty operator checks to see that a string contains text. Specifically, it checks to see whether a character sequence is empty ("") or null. It takes a single parameter and return a Boolean value: true if the variable is indeed empty, or false if the variable contains a value other than empty or null. | if(isEmpty(src_ip),1,0) as null_ip_counts - isNull + [isNull](/docs/search/search-query-language/search-operators/isnull-isempty-isblank) The isNull operator takes a single parameter and returns a Boolean value: True if the variable is indeed null, or false if the variable contains a value other than null. | where isNull(src_ip) - isNumeric + [isNumeric](/docs/search/search-query-language/search-operators/isnumeric) The isNumeric operator checks whether a string is a valid Java number. | isNumeric(num) - isPrivateIP + [isPrivateIP](/docs/search/search-query-language/search-operators/isprivateip) The isPrivateIP operator checks if an IPv4 address is private and returns a boolean. | isPrivateIP(hostip) - isPublicIP + [isPublicIP](/docs/search/search-query-language/search-operators/ispublicip) The isPublicIP operator checks if an IPv4 address is public and returns a boolean. | isPublicIP("10.255.255.255") as isPublic - isValidIP + [isValidIP](/docs/search/search-query-language/search-operators/isvalidip) The isValidIP operator checks if the value is a valid IP address. The isValidIPv4 and isValidIPv6 operators check if the value is a valid IPv4 or IPv6 address respectively. | isValidIP("10.255.255.255") as isIP - join + [join](/docs/search/search-query-language/search-operators/join) The join operator combines records of two or more data streams. Results are admitted on-the-fly to allow real time tables to be built. Values common to each table are then delivered as search results. Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. @@ -368,106 +368,106 @@ This section provides detailed syntax, rules, and examples for Sumo Logic Opera ("starting stream from" OR "starting search")
| join
(parse "starting stream from *" AS a) AS T1,
(parse "starting search * from parent stream *" AS b, c) AS T2
on T1.a = T2.c
- length + [length](/docs/search/search-query-language/search-operators/length) The length operator returns the number of characters in a string. You can use it in where clauses or to create new fields. It returns 0 if the string is null. | where length(query) <= 20 - limit + [limit](/docs/search/search-query-language/search-operators/limit) The limit operator reduces the number of raw messages or aggregate results returned. If you simply query for a particular term, for example "error" without using an aggregation operator such as group by, limit will reduce the number of raw messages returned. If you first use group-by or other aggregation operator, the limit operator will reduce the number of grouped results instead. Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. | count by _sourceCategory
| sort by _count
| limit 5
- logcompare + [logcompare](/docs/search/behavior-insights/logcompare) The logcompare operator allows you to compare two sets of logs: baseline (historical) and target (current). To run a LogCompare operation, you can use the LogCompare button on the Messages tab to generate a properly formatted query. _count
_deltaPercentage
_anomalyScore
_isNew Not supported in Dashboards. | logcompare timeshift -24h - logexplain + [logexplain](/docs/search/behavior-insights/logexplain) The logexplain operator allows you to compare sets of structured logs based on events you're interested in. Structured logs can be in JSON, CSV, key-value, or any structured format. _explanation
_relevance
_test_coverage
_control_coverage - Time Compare and the compare operator are not supported against LogExplain results. + [Time Compare](/docs/search/time-compare) and the [compare operator](/docs/search/search-query-language/search-operators/compare) are not supported against LogExplain results. _sourceCategory=stream
| if(_raw matches "error", 1, 0) as hasError
| logexplain hasError == 1 on _sourceHost
- logreduce + [logreduce](/docs/search/behavior-insights/logreduce) The LogReduce algorithm uses fuzzy logic to cluster messages together based on string and pattern similarity. Use the LogReduce button and operator to quickly assess activity patterns for things like a range of devices or traffic on a website. (Formerly Summarize.) Not supported in Dashboards. | logreduce - logreduce keys + [logreduce keys](/docs/search/behavior-insights/logreduce/logreduce-keys) The logreduce keys operator allows you to quickly explore JSON or key-value formatted logs by schemas. _signature_id
_schema
_count _sourcecategory="Labs/AWS/GuardDuty_V8"
| json keys "region", "partition", "resource"
| logreduce keys field=resource
- logreduce values + [logreduce values](/docs/search/behavior-insights/logreduce/logreduce-values) The logreduce values operator allows you to quickly explore structured logs by known keys. Structured logs can be in JSON, CSV, key-value, or any structured format. _cluster_id
_signature
_count _sourceCategory= *cloudtrail* errorCode
| json field=_raw "eventSource" as eventSource
| json field=_raw "eventName" as eventName
| json field=_raw "errorCode" as errorCode
| logreduce values on eventSource, eventName, errorCode
- lookup + [lookup](/docs/search/search-query-language/search-operators/lookup) Using a lookup operator, you can map data in your log messages to meaningful information. For example, you could use a lookup operator to map "userID" to a real user's name. Or, you could use a lookup operator to find black-listed IP addresses. | parse "name=*, phone number=*," as (name, phone)
| count by name, phone
//We recommend doing a lookup after an aggregation
| lookup email from https://compay.com/userTable.csv on name=userName, phone=cell
- luhn (credit card validator) + [luhn (credit card validator)](/docs/search/search-query-language/search-operators/luhn) The Luhn operator uses Luhn’s algorithm to check message logs for strings of numbers that may be credit card numbers, and then validates them. It takes a string as an input, strips out all characters that are not numerals, and checks if the resulting string is a valid credit card number, returning true or false accordingly. | parse regex "(?<maybecc>\d{4}-\d{4}-\d{4}-\d{4})" nodrop
| parse regex "(?<maybecc>\d{4}\s\d{4}\s\d{4}\s\d{4})" nodrop
| parse regex "(?<maybecc>\d{16})" nodrop
| if (luhn(maybecc), true, false) as valid
- matches - The matches operator can be used to match a string to a wildcard pattern or an RE2 compliant regex. The return of the operator is Boolean; the operator can be used with where or if expressions. + [matches](/docs/search/search-query-language/search-operators/matches) + The matches operator can be used to match a string to a wildcard pattern or an RE2 compliant regex. The return of the operator is Boolean; the operator can be used with [where](/docs/search/search-query-language/search-operators/where) or [if](/docs/search/search-query-language/search-operators/if) expressions. | if (agent matches "*MSIE*","Internet Explorer","Other") as Browser
| if (agent matches "*Firefox*","Firefox",Browser) as Browser
- median - In order to calculate the median value for a particular field, you can utilize the Percentile (pct) operator with a percentile argument of 50. + [median](/docs/search/search-query-language/group-aggregate-operators/median) + In order to calculate the median value for a particular field, you can utilize the Percentile ([pct](/docs/search/search-query-language/group-aggregate-operators/pct-percentile)) operator with a percentile argument of 50. | parse "value=*" as value
| pct(value, 50) as median
- merge - The merge operator reduces a stream of events to a single event using a specified merge strategy. It is particularly useful as a subquery for the Transactionize operator. + [merge](/docs/search/search-query-language/transaction-analytics/merge-operator) + The merge operator reduces a stream of events to a single event using a specified merge strategy. It is particularly useful as a subquery for the [Transactionize](/docs/search/search-query-language/transaction-analytics/transactionize-operator) operator. | parse "BytesSentPersec = \"*\"" as BytesPersec
| merge BytesPersec join with "--", _messageTime takeLast
- now - The now operator returns the current epoch time in milliseconds. It can be used with the formatDate operator to get the formatted current time. + [now](/docs/search/search-query-language/search-operators/now) + The now operator returns the current epoch time in milliseconds. It can be used with the [formatDate](/docs/search/search-query-language/search-operators/formatdate) operator to get the formatted current time. Can be used in Dashboard Panels, but the now() time presented in Live mode (the time the data is processed) doesn't match the search time, so the results are different.
The results for search could be hours or days later than the time presented in Live mode. | now() as current_date - num + [num](/docs/search/search-query-language/search-operators/num) The num operator converts a field to a number. Using Num in a query is useful for sorting results by number instead of alphabetically, which is the default. You can also use double as the operator, as an alias equivalent, if you prefer. | parse "Execution duration: * s" as duration
| num(duration)
| sort by duration
- outlier + [outlier](/docs/search/search-query-language/search-operators/outlier) Given a series of time-stamped numerical values, using the outlier operator in a query can identify values in a sequence that seem unexpected, and would identify an alert or violation, for example, for a scheduled search. <field>_error
<field>_lower
<field>_upper
<field>_indicator
<field>_violation @@ -475,14 +475,14 @@ This section provides detailed syntax, rules, and examples for Sumo Logic Opera _sourceCategory=IIS/Access
| parse regex "\d+-\d+-\d+ \d+:\d+:\d+ (?<server_ip>\S+) (?<method>\S+) (?<cs_uri_stem>/\S+?) \S+ \d+ (?<user>\S+) (?<client_ip>[\.\d]+) "
| parse regex "\d+ \d+ \d+ (?<response_time>\d+)$"
| timeslice 1m
| max(response_time) as response_time by _timeslice
| outlier response_time window=5,threshold=3,consecutive=2,direction=+-
- parseHex + [parseHex](/docs/search/search-query-language/parse-operators/parsehex) The parseHex operator allows you to convert a hexadecimal string of 16 or fewer characters to a number. | parseHex("12D230") as decimalValue - predict + [predict](/docs/search/search-query-language/search-operators/predict) The predict operator uses a series of time stamped numerical values to predict future values. For example, you could use this operator to take your current disk space capacity numbers, and predict when your system might run out of disk space. _<agg field>
_<agg field>_predicted
_<agg field>_error
_<agg field>_linear @@ -490,112 +490,112 @@ This section provides detailed syntax, rules, and examples for Sumo Logic Opera _sourceCategory=taskmanager
| jobState=InQueue
| timeslice 1m
| count by _timeslice
| toDouble(_count)
| predict _count by 1m forecast=5
- replace + [replace](/docs/search/search-query-language/search-operators/replace) The replace operator allows you to replace all instances of a specified string with another string. You can specify the string to replace with a matching regex or literal text. You might use it to find all instances of a name and change it to a new name or to replace punctuation in a field with different punctuation. This operator is useful anytime you need to rename something. | replace(query, ".","->") as query - rollingstd + [rollingstd](/docs/search/search-query-language/search-operators/rollingstd) The rollingstd (rolling standard) operator provides the rolling standard deviation of a field over a defined window. Rollingstd displays this value in a new column named _rollingstd. _rollingstd Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. | rollingstd _count,1 by _sourcehost - save + [save](/docs/search/search-query-language/search-operators/save) Using the Save operator allows you to save the results of a query into the Sumo Logic file system. Later, you can use the lookup operator to access the saved data. The Save operator saves data in a simple format to a location you choose. Not supported in Dashboards. | save /shared/lookups/daily_users - sessionize + [sessionize](/docs/search/search-query-language/search-operators/sessionize) The sessionize operator allows you to use an extracted value from one log message (generated from one system) to find correlating values in log messages from other systems. After you run Sessionize, these related events are displayed on the same page. The thread of logs woven together is called a session. Not supported in auto refresh dashboards or any continuous query. Full query example:
(SearchServiceImpl Creating Query) or (Stream SessionId using searchSessionId) or (Started search with sessionId)
| sessionize "session: '*', streamSessionID: '*'" as (serviceSessionId, streamSessionId),
"Stream SessionId=$streamSessionId using searchSessionId=* and rawSessionId=*" as (searchSessionId, rawSessionId),
"Started search with sessionId: $searchSessionId, customerId: *, query: *" as (customerId, query)
- smooth + [smooth](/docs/search/search-query-language/search-operators/smooth) The smooth operator calculates the rolling (or moving) average of a field, measuring the average of a value to "smooth" random variation. Smooth operator reveals trends in the data set you include in a query. _smooth Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. | smooth _count,1 by _sourcehost - sort - The sort operator orders aggregated search results. The default sort order is descending. Then you can use the top or limit operators to reduce the number of sorted results returned. + [sort](/docs/search/search-query-language/search-operators/sort) + The sort operator orders aggregated search results. The default sort order is descending. Then you can use the [top](/docs/search/search-query-language/search-operators/top) or [limit](/docs/search/search-query-language/search-operators/limit) operators to reduce the number of sorted results returned. Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. | count as page_hits by _sourceHost
| sort by page_hits asc
- substring + [substring](/docs/search/search-query-language/search-operators/substring) The substring operator allows you to specify an offset that will output only part of a string, referred to as a substring. You can use this operator to output just a part of a string instead of the whole string, for example, if you wanted to output an employee’s initials instead of their whole name. | substring("Hello world!", 6) - timeslice + [timeslice](/docs/search/search-query-language/search-operators/timeslice) The timeslice operator segregates data by time period, so you can create bucketed results based on a fixed width in time, for example, five minute periods. Timeslice also supports bucketing by a fixed number of buckets across the search results, for example, 150 buckets over the last 60 minutes. An alias for the timeslice field is optional. When an alias is not provided, a default _timeslice field is created. _timeslice Timeslices greater than 1 day cannot be used in Dashboard Live mode. | timeslice 1h
//You can further aggregate your data by these time groupings
| count by _timeslice
- toLowerCase and toUpperCase + [toLowerCase and toUpperCase](/docs/search/search-query-language/search-operators/tolowercase-touppercase) As the name implies, the toLowerCase operator takes a string and converts it to all lower case letters. The toUpperCase operator takes a string and converts it to all upper case letters. | toUpperCase(_sourceHost) as _sourceHost
| where _sourceHost matches "*NITE*"
- topk + [topk](/docs/search/search-query-language/search-operators/topk) Select the top values from fields and group them by other fields. _rank | topk(5, _count) - top + [top](/docs/search/search-query-language/search-operators/top) Use the top operator with the sort operator, to reduce the number of sorted results returned. Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. | top 5 _sourcecategory - total + [total](/docs/search/search-query-language/search-operators/total) The total operator calculates the grand total of a field and injects that value into every row. It also supports grouping rows by a set of fields. _total Can be used in Dashboard Panels, but in the search they must be included after the first group-by phrase. | total gbytes as total_memory - trace + [trace](/docs/search/search-query-language/search-operators/trace) A trace operator acts as a highly sophisticated filter to connect the dots across different log messages. You can use any identifying value with a trace operator (such as a user ID, IP address, session ID, etc.) to retrieve a comprehensive set of activity associated to that original ID. Not supported in Auto Refresh Dashboards or any continuous query. | trace "ID=( [0-9a-fA-F] {4} )" "7F92" - transaction + [transaction](/docs/search/search-query-language/transaction-analytics/transaction-operator) The transaction operator is used to analyze related sequences of logs. No matter what type of data you're analyzing, from tracking web site sign ups, to e-commerce data, to watching system activity across a distributed system, the transaction operator can be used in a variety of use cases. _start_time
_end_time Tables generated with unordered data can be added to Dashboards, but Flow Diagrams cannot be added to Dashboards.
Transaction by flow cannot be used with Dashboards. | transaction on sessionid fringe=10m
with "Starting session *" as init,
with "Initiating countdown *" as countdown_start,
with "Countdown reached *" as countdown_done,
with "Launch *" as launch
results by transaction
- transactionize + [transactionize](/docs/search/search-query-language/transaction-analytics/transactionize-operator) The transactionize operator groups logs that match on any fields you specify. Unlike other "group by" operators, where the logs in a group must match on all defined fields, transactionize just needs one field to match in order to assign logs to the same group. _group
_group_duration
_group_size
_group_orphaned | parse "[system=001] [sessionId=*]" as system1Id nodrop
| parse "[system=002][sessionId=*]" as system2Id nodrop
| parse "[system=003][sessionId=*]" as system3Id nodrop
| parse "system=001 with sessionId=*" as system1Id nodrop
| transactionize system1Id, system2Id, system3Id
- transpose + [transpose](/docs/search/search-query-language/search-operators/transpose) The transpose operator dynamically creates columns for aggregate search results. The dynamic functionality allows for changing the output of a query, turning search results into fields. It also means that queries can be designed without first knowing the output schema. @@ -603,21 +603,21 @@ This section provides detailed syntax, rules, and examples for Sumo Logic Opera _sourceCategory=service
| parse "Successful login for user '*', organization: '*'" as user, org_id
| timeslice 1d
| count _timeslice, user
| transpose row _timeslice column user
- urldecode + [urldecode](/docs/search/search-query-language/search-operators/urldecode) The urldecode operator decodes a URL you include in a query, returning the decoded (unescaped) URL string. | urldecode(url) as decoded - urlencode + [urlencode](/docs/search/search-query-language/search-operators/urlencode) The urlencode operator encodes the URL into an ASCII character set. | urlencode(url) as encoded - where + [where](/docs/search/search-query-language/search-operators/where) To filter results in a search query, use "where" as a conditional operator. The where operator must appear as a separate operator distinct from other operators, delimited by the pipe symbol ("|"). In other words, the following construct will not work and will generate a syntax error: @@ -641,42 +641,42 @@ You can use general mathematical expressions on numerical data extracted from lo - abs + [abs](/docs/search/search-query-language/math-expressions/abs) The absolute function calculates the absolute value of x. | abs(-1.5) as v
// v = 1.5
- round + [round](/docs/search/search-query-language/math-expressions/round) The round function returns the closest integer to x. | round((bytes/1024)/1024) as MB - ceil + [ceil](/docs/search/search-query-language/math-expressions/ceil) The ceiling function rounds up to the smallest integer value. Returns the smallest integral value that is not less than x. | ceil(1.5) as v
// v = 2
- floor + [floor](/docs/search/search-query-language/math-expressions/floor) The floor function rounds down to the largest previous integer value. Returns the largest integer not greater than x. | floor(1.5) as v
// v = 1
- max + [max](/docs/search/search-query-language/group-aggregate-operators/min-max) The maximum function returns the larger of two values. | max(1, 2) as v
// v = 2
- min + [min](/docs/search/search-query-language/group-aggregate-operators/min-max) The minimum function returns the smaller of two values. | min(1, 2) as v
// v = 1
- sqrt + [sqrt](/docs/search/search-query-language/math-expressions/sqrt) The square root function returns the square root value of x. | sqrt(4) as v
// v = 2
- cbrt + [cbrt](/docs/search/search-query-language/math-expressions/cbrt) The cube root function returns the cube root value of x. | cbrt(8) as v
// v = 2
@@ -686,27 +686,27 @@ You can use general mathematical expressions on numerical data extracted from lo - exp + [exp](/docs/search/search-query-language/math-expressions/exp) The exponent function returns Euler's number e raised to the power of x. | exp(1) as v
// v = 2.7182818284590455
- expm1 + [expm1](/docs/search/search-query-language/math-expressions/expm1) The expm1 function returns value of x in exp(x)-1, compensating for the roundoff in exp(x). | expm1(0.1) as v
// v = 0.10517091807564763
- log + [log](/docs/search/search-query-language/math-expressions/log) The logarithm function returns the natural logarithm of x. | log(2) as v
// v = 0.6931471805599453
- log10 + [log10](/docs/search/search-query-language/math-expressions/log10) The log10 function returns the base 10 logarithm of x. | log10(2) as v
// v = 0.3010299956639812
- log1p + [log1p](/docs/search/search-query-language/math-expressions/log1p) The log1p function computes log(1+x) accurately for small values of x. | log1p(0.1) as v
// v = 0.09531017980432487
@@ -716,52 +716,52 @@ You can use general mathematical expressions on numerical data extracted from lo - sin + [sin](/docs/search/search-query-language/math-expressions/sin) Sine of argument in radians. | sin(1) as v
// v = 0.8414709848078965
- cos + [cos](/docs/search/search-query-language/math-expressions/cos) Cosine of argument in radians. | cos(1) as v
// v = 0.5403023058681398
- tan + [tan](/docs/search/search-query-language/math-expressions/tan) Tangent of argument in radians. | an(1) as v
// v = 1.5574077246549023
- asin + [asin](/docs/search/search-query-language/math-expressions/asin) Inverse sine; result is in radians. | asin(1) as v
// v = 1.5707963267948966
- acos + [acos](/docs/search/search-query-language/math-expressions/acos) Inverse cosine; result is in radians. | acos(x)\ - atan + [atan](/docs/search/search-query-language/math-expressions/atan) Inverse tangent; result is in radians. | atan(x) - atan2 + [atan2](/docs/search/search-query-language/math-expressions/atan2) Four-quadrant inverse tangent. | atan2(0, -1) as v
// v = pi
- sinh + [sinh](/docs/search/search-query-language/math-expressions/sinh) Hyperbolic sine of argument in radians. | sinh(x) - cosh + [cosh](/docs/search/search-query-language/math-expressions/cosh) Hyperbolic cosine of argument in radians. | cosh(x) - tanh + [tanh](/docs/search/search-query-language/math-expressions/tanh) Hyperbolic tangent of argument in radians. | tanh(x) @@ -771,17 +771,17 @@ You can use general mathematical expressions on numerical data extracted from lo - hypot + [hypot](/docs/search/search-query-language/math-expressions/hypot) Returns the square root of the sum of an array of squares. | hypot(1, 0) as v
// v = 1
- toDegrees + [toDegrees](/docs/search/search-query-language/math-expressions/todegrees) Converts angles from radians to degrees. | toDegrees(asin(1)) as v
// v = 90
- toRadians + [toRadians](/docs/search/search-query-language/math-expressions/toradians) Converts angles from degrees to radians. | toRadians(180) as v
// v = pi
diff --git a/docs/search/search-query-language/group-aggregate-operators/index.md b/docs/search/search-query-language/group-aggregate-operators/index.md index 110a094c97..2458a0fa54 100644 --- a/docs/search/search-query-language/group-aggregate-operators/index.md +++ b/docs/search/search-query-language/group-aggregate-operators/index.md @@ -11,67 +11,67 @@ In this section, we'll introduce the following concepts:
- icon

avg

+ icon

avg

Calculates the avg value of a numerical field being evaluated.

- icon

first, last

+ icon

first, last

Return the first or last result relative to the sort order.

- icon

median

+ icon

median

Calculates the median value for a particular field.

- icon

min, max

+ icon

min, max

Use these functions to find the smallest or largest value in a set of values.

- icon

most_recent, least_recent

+ icon

most_recent, least_recent

Select the most or least recent value within a group.

- icon

pct

+ icon

pct

Finds the specified percentiles of a given field.

- icon

pct_sampling

+ icon

pct_sampling

Finds the percentile of a given field.

- icon

stddev

+ icon

stddev

Finds the standard deviation for numerical values within a time range.

- icon

sum

+ icon

sum

Adds values of a numerical field being evaluated within a time range.

- icon

values

+ icon

values

Provides all the distinct values of a field.

diff --git a/docs/search/search-query-language/index.md b/docs/search/search-query-language/index.md index ce7f0235a8..1897c00d6d 100644 --- a/docs/search/search-query-language/index.md +++ b/docs/search/search-query-language/index.md @@ -13,37 +13,37 @@ In this section, we'll introduce the following concepts:
- icon showing magnifying glass hovering over a data symbol

Search Operators

+ icon showing magnifying glass hovering over a data symbol

Search Operators

Available search operators in the Sumo Logic search query language.

- icon showing magnifying glass hovering over a data symbol

Parse Operators

+ icon showing magnifying glass hovering over a data symbol

Parse Operators

Sumo Logic provides a number of ways to parse fields in your log messages.

- icon showing magnifying glass hovering over a data symbol

Group or Aggregate Operators

+ icon showing magnifying glass hovering over a data symbol

Group or Aggregate Operators

Evaluate messages and place them into groups.

- icon showing magnifying glass hovering over a data symbol

Field Expressions

+ icon showing magnifying glass hovering over a data symbol

Field Expressions

Overview of the expressions that create user-defined numeric, boolean, or string fields.

- icon showing magnifying glass hovering over a data symbol

Math Expressions

+ icon showing magnifying glass hovering over a data symbol

Math Expressions

Use general mathematical expressions on numerical data extracted from log lines.

- icon showing magnifying glass hovering over a data symbol

Transaction Analytics

+ icon showing magnifying glass hovering over a data symbol

Transaction Analytics

Find and group related log data.

diff --git a/docs/search/search-query-language/math-expressions/index.md b/docs/search/search-query-language/math-expressions/index.md index d315b74a4e..387ec39d75 100644 --- a/docs/search/search-query-language/math-expressions/index.md +++ b/docs/search/search-query-language/math-expressions/index.md @@ -49,151 +49,151 @@ In this section, we'll introduce the following concepts:
- icon

abs

+ icon

abs

Calculates the absolute value of x.

- icon

acos

+ icon

acos

Returns the inverse cosine of the argument.

- icon

asin

+ icon

asin

Returns the inverse sine of the argument.

- icon

atan

+ icon

atan

Returns the inverse tangent of the argument.

- icon

atan2

+ icon

atan2

Returns the four-quadrant inverse tangent of the two arguments b and c.

- icon

cbrt

+ icon

cbrt

The cube root function returns the cube root value of x.

- icon

ceil

+ icon

ceil

Rounds up a field value to the nearest integer value.

- icon

cos

+ icon

cos

Cosine of argument in radians.

- icon

cosh

+ icon

cosh

Hyperbolic cosine of argument in radians.

- icon

exp

+ icon

exp

The exponent function returns Euler's number e raised to the power of x.

- icon

expm1

+ icon

expm1

Returns a value of x in exp(x)-1, compensating for the roundoff in exp(x).

- icon

floor

+ icon

floor

Rounds down to the largest previous integer value.

- icon

hypot

+ icon

hypot

Returns the square root of the sum of an array of squares.

- icon

isNaN, isInfinity

+ icon

isNaN, isInfinity

These operators check a numeric string and return a boolean value.

- icon

log

+ icon

log

The logarithm function returns the natural logarithm of x.

- icon

log10

+ icon

log10

The log10 function returns the base 10 logarithm of x.

- icon

log1p

+ icon

log1p

Computes log(1+x) accurately for small values of x.

- icon

round

+ icon

round

The round function returns the closest integer to x.

- icon

sin

+ icon

sin

Sine of argument in radians.

- icon

sinh

+ icon

sinh

Hyperbolic sine of argument in radians.

- icon

sqrt

+ icon

sqrt

The square root function returns the square root value of x.

- icon

tan

+ icon

tan

Tangent of argument in radians.

- icon

tanh

+ icon

tanh

Hyperbolic tangent of argument in radians.

- icon

toDegrees

+ icon

toDegrees

Converts angles from radians to degrees.

- icon

toRadians

+ icon

toRadians

Converts angles from degrees to radians.

diff --git a/docs/search/search-query-language/parse-operators/index.md b/docs/search/search-query-language/parse-operators/index.md index b3fc24b384..3bc2ec3588 100644 --- a/docs/search/search-query-language/parse-operators/index.md +++ b/docs/search/search-query-language/parse-operators/index.md @@ -15,67 +15,67 @@ In this section, we'll introduce the following concepts:
- icon

Parse Variable Patterns Using Regex

+ icon

Parse Variable Patterns Using Regex

Allows you to extract nested fields and other complex data from log lines.

- icon

Parse JSON Formatted Logs

+ icon

Parse JSON Formatted Logs

Allows you to extract values from JSON logs with most JSONPath expressions.

- icon

Parse Predictable Patterns Using an Anchor

+ icon

Parse Predictable Patterns Using an Anchor

Parses strings and labels anchors as fields for use in subsequent aggregation functions.

- icon

Parse Field option

+ icon

Parse Field option

Parses on previously extracted fields, or initial parsing on a metadata field value, like a collector or source.

- icon

Parse Delimited Logs Using Split

+ icon

Parse Delimited Logs Using Split

Allows you to split strings into multiple strings and parse delimited log entries.

- icon

Parse Keyvalue Formatted Logs

+ icon

Parse Keyvalue Formatted Logs

Allows you to get values from a log message by specifying the key paired with each value.

- icon

Parse nodrop option

+ icon

Parse nodrop option

Forces results to also include messages that do not match any segment of the parse expression.

- icon

parseDate operator

+ icon

parseDate operator

Extracts a date or time from a string and provides a timestamp in milliseconds. 

- icon

Parse CSV Formatted Logs

+ icon

Parse CSV Formatted Logs

Allows you to parse CSV-formatted log entries using a comma as the default delimiter.

- icon

Parse XML Formatted Logs

+ icon

Parse XML Formatted Logs

Allows you to parse specified fields from an XML log using an XPath reference.

- icon

parseHex

+ icon

parseHex

Allows you to convert a hexadecimal string of 16 or fewer characters to a number.

diff --git a/docs/search/search-query-language/search-operators/index.md b/docs/search/search-query-language/search-operators/index.md index 4189426fac..f0b42d4fed 100644 --- a/docs/search/search-query-language/search-operators/index.md +++ b/docs/search/search-query-language/search-operators/index.md @@ -14,457 +14,457 @@ In this section, we'll introduce the following concepts:
- icon

accum

+ icon

accum

The `accum` operator calculates the cumulative sum of a field. It can be used to find a count by a specific time interval and a total running count across all intervals.

- icon

as

+ icon

as

The `as` operator, typically used in conjunction with other operators, can also be used standalone to rename fields or to create new constant fields.

- icon

ASN lookup

+ icon

ASN lookup

Use this to look up an Autonomous System Number (ASN) and organization name by IP address.

- icon

backshift

+ icon

backshift

The `backshift` operator helps you compare values as they change over time.

- icon

base64Decode

+ icon

base64Decode

The `base64Decode` operator takes a base64 string and converts it to an ASCII string.

- icon

base64Encode

+ icon

base64Encode

The `base64Encode` operator takes an ASCII string and converts it to a base64 string.

- icon

bin

+ icon

bin

The `bin` operator assigns output results to user defined bins.

- icon

cat

+ icon

cat

You can use the `cat` operator to view the contents of a lookup table. Not supported in auto refresh dashboards or scheduled searches.

- icon

CIDR

+ icon

CIDR

Sumo Logic's three CIDR operators work with Classless Inter-Domain Routing, notation to narrow the analysis of IPv4 networks to specific subnets.

- icon

compare

-

The `compare` operator can be used with the Time Compare button in the Sumo UI, which generates correct syntax and adds it to your aggregate query.

+ icon

compare

+

The `compare` operator can be used with the [Time Compare button](/docs/search/time-compare) in the Sumo UI, which generates correct syntax and adds it to your aggregate query.

- icon

concat

+ icon

concat

The `concat` operator allows you to concatenate or join multiple strings, numbers, and fields into a single user-defined field.

- icon

contains

+ icon

contains

The `contains` operator compares string values of two parsed fields and returns a boolean result based on whether the second field's value exists in the first.

- icon

decToHex

+ icon

decToHex

The `decToHex` operator converts a long value of 16 or fewer digits to a hexadecimal string using Two's Complement for negative values.

- icon

dedup

+ icon

dedup

The `dedup` operator removes duplicate results. You have the option to remove consecutively and by specific fields.

- icon

diff

+ icon

diff

The `diff` operator calculates the rate of change in a field between consecutive rows.

- icon

fields

+ icon

fields

The `fields` operator allows you to specify which fields to display and their order in the results of a query.

- icon

fillmissing

+ icon

fillmissing

The `fillmissing` operator allows you to specify groups that should be represented in data output.

- icon

filter

+ icon

filter

Use the `filter` operator to filter the output of a search based on the filtering criteria of a child query.

- icon

format

+ icon

format

The `format` operator allows you to format and combine data from parsed fields.

- icon

formatDate

+ icon

formatDate

The `formatDate` operator formats dates in log files as a string in a different format, such as U.S. or European date formatting.

- icon

Geo Lookup (Map)

+ icon

Geo Lookup (Map)

With the Geo Lookup (Map) operator, Sumo Logic can match a parsed IPv4 or IPv6 address to its geographical location on a map.

- icon

geoip

+ icon

geoip

With the `geoip` operator, Sumo Logic can match a parsed IPv4 or IPv6 address to its geographical location on a map chart.

- icon

hash

+ icon

hash

The `hash` operator uses a cryptographic hash algorithm to obscure data into a random string value.

- icon

haversine

+ icon

haversine

The `haversine` operator returns the distance between latitude and longitude values of two coordinates in kilometers.

- icon

hexToAscii

+ icon

hexToAscii

The `hexToAscii` operator converts a hexadecimal string to an ASCII string.

- icon

hexToDec

+ icon

hexToDec

The `hexToDec` operator converts a hexadecimal string of 16 or fewer characters to a long data type using Two's Complement for negative values.

- icon

if, ?

+ icon

if, ?

The `if` and `?` expressions are used to evaluate a condition as either true or false, with values assigned for each outcome.

- icon

in

+ icon

in

The `in` operator returns a Boolean value: true if the specified property is in the specified object, or false if it is not.

- icon

ipv4ToNumber

+ icon

ipv4ToNumber

The `ipv4ToNumber` operator converts an Internet Protocol version 4 (IPv4) IP address from the octet dot-decimal format to a decimal format.

- icon

isNull, isEmpty, isBlank

+ icon

isNull, isEmpty, isBlank

The `isNull` operator checks a string and returns a boolean value, `isEmpty` if a string contains no characters, and `isBlank` if a string contains no characters, is only whitespace, and is null.

- icon

isNumeric

+ icon

isNumeric

The `isNumeric` operator checks whether a string is a valid Java number.

- icon

isPrivateIP

+ icon

isPrivateIP

The `isPrivateIP` operator checks if an IPv4 address is private and returns a boolean.

- icon

isPublicIP

+ icon

isPublicIP

The `isPublicIP` operator checks if an IPv4 address is public and returns a boolean.

- icon

isReservedIP

+ icon

isReservedIP

The `isReservedIP` operator checks if an IPv4 address is reserved as defined by RFC 5735 and returns a boolean.

- icon

isValidIP, isValidIPv4, isValidIPv6

+ icon

isValidIP, isValidIPv4, isValidIPv6

The `isValidIP` operator checks if the value is a valid IP address. The `isValidIPv4` and `isValidIPv6` operators check if the value is a valid IPv4 or IPv6 address, respectively. 

- icon

join

+ icon

join

The `join` operator combines records of two or more data streams.

- icon

jsonArrayContains

+ icon

jsonArrayContains

Use the `jsonArrayContains` operator to determine whether a JSON array contains a particular item.

- icon

jsonArraySize

+ icon

jsonArraySize

Use the `jsonArraySize` operator to determine the size of a JSON array.

- icon

length

+ icon

length

The `length` operator returns the number of characters in a string.

- icon

limit

+ icon

limit

The `limit` operator reduces the number of raw messages or aggregate results returned.

- icon

lookup

+ icon

lookup

The `lookup` operator returns one or more fields from a lookup table hosted by Sumo Logic and add the fields to the log messages returned by your query.

- icon

lookup (Classic)

+ icon

lookup (Classic)

The `lookup` (Classic) operator maps data in your log messages to meaningful information saved in Sumo or on an HTTPS server.

- icon

lookupContains

+ icon

lookupContains

Use the `lookupContains` operator to determine whether a key exists in a lookup table. It will return a boolean value.

- icon

luhn

+ icon

luhn

Uses Luhn’s algorithm to check message logs for strings of numbers that may be credit card numbers and then validates them.

- icon

Manually cast data to string or number

+ icon

Manually cast data to string or number

Most data in Sumo Logic is stored as a string data type. Metadata fields are stored as string data and parsed fields are by default parsed as string type data.

- icon

matches

+ icon

matches

The `matches` operator can be used to match a string to a wildcard pattern or an RE2 compliant regex.

- icon

now

+ icon

now

The `now` operator returns the current epoch time in milliseconds.

- icon

num

+ icon

num

The `num` operator converts a field to a double value, which is twice as accurate as a float value.

- icon

outlier

+ icon

outlier

The `outlier` operator identifies values in a sequence that seem unexpected and would trigger an alert/violation.

- icon

predict

+ icon

predict

The `predict` operator ses a series of time-stamped numerical values to predict future values.

- icon

queryEndTime()

+ icon

queryEndTime()

The `queryEndTime()` operator returns the end time of the search time range in milliseconds.

- icon

queryStartTime()

+ icon

queryStartTime()

The `queryStartTime()` operator returns the start time of the search time range in milliseconds.

- icon

queryTimeRange()

+ icon

queryTimeRange()

The `queryTimeRange()` operator returns the time duration for the query being executed in milliseconds.

- icon

replace

+ icon

replace

The `replace` operator allows you to replace all instances of a specified string with another string.

- icon

rollingstd

+ icon

rollingstd

The `rollingstd` operator finds the rolling standard deviation of a field, allowing you to identify changes over time.

- icon

save

+ icon

save

The `save` operator allows you to save the results of a query to a lookup table you've already created.

- icon

save (Classic)

+ icon

save (Classic)

The `save` (classic) operator works with the classic Lookup Tables feature.

- icon

sessionize

+ icon

sessionize

The `sessionize` operator uses an extracted value from one log message to find correlating values in log messages from other systems.

- icon

smooth

+ icon

smooth

The `smooth` operator calculates the rolling (or moving) average of a field, measuring the average of a value to "smooth" random variation.

- icon

sort

+ icon

sort

The `sort` operator orders aggregated search results.

- icon

substring()

+ icon

substring()

The `substring` operator allows you to specify an offset that will output only part of a string, referred to as a substring.

- icon

threatip

+ icon

threatip

Correlates threat intelligence data based on IP addresses from your log data, helping you detect threats in your environment.

- icon

timeslice()

+ icon

timeslice()

The `timeslice` operator aggregates data by time period, so you can create bucketed results based on a fixed interval.

- icon

Timeslice Join Results

+ icon

Timeslice Join Results

When you gather data using a join operator, you can slice data by time period using the `timeslice` operator.

- icon

toLowerCase, toUpperCase

+ icon

toLowerCase, toUpperCase

The `toLowerCase` operator takes a string and converts it to all lower case letters.

- icon

top

+ icon

top

Use the `top` operator with the sort operator to reduce the number of sorted results returned.

- icon

topk

+ icon

topk

The `topk` operator allows you to select the top values from fields and group them by fields.

- icon

total

+ icon

total

The `total` operator inserts the sum of a set of fields into every row of the set.

- icon

tourl

+ icon

tourl

The `tourl` operator provides you the ability to assign a short name that describes the URL.

- icon

trace

+ icon

trace

The `trace` operator acts as a highly sophisticated filter to connect the dots across different log messages.

- icon

transpose

+ icon

transpose

Similar to a Pivot Table in Excel, the `transpose` operator allows you to take a list and turn it into a table in the Aggregates tab.

- icon

trim()

+ icon

trim()

The `trim` operator eliminates leading and trailing spaces from a string field.

- icon

urldecode

+ icon

urldecode

The `urldecode` operator decodes a URL you include in a query, returning the decoded (unescaped) URL string.

- icon

urlencode

+ icon

urlencode

The `urlencode` operator encodes the URL into an ASCII character set.

- icon

where()

+ icon

where()

The `where` operator allows you to filter results based on a boolean expression.

diff --git a/docs/search/search-query-language/search-operators/macro.md b/docs/search/search-query-language/search-operators/macro.md index 0ccd4468f1..02393ddbf3 100644 --- a/docs/search/search-query-language/search-operators/macro.md +++ b/docs/search/search-query-language/search-operators/macro.md @@ -9,7 +9,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; -

Beta

+

Beta

diff --git a/docs/search/search-query-language/transaction-analytics/index.md b/docs/search/search-query-language/transaction-analytics/index.md index 4462fd45cf..03a0ce3579 100644 --- a/docs/search/search-query-language/transaction-analytics/index.md +++ b/docs/search/search-query-language/transaction-analytics/index.md @@ -18,25 +18,25 @@ In this section, we'll introduce the following concepts:
- icon

Merge Operator

+ icon

Merge Operator

Reduces a stream of events to a single event using a specified merge strategy.

- icon

Transaction Operator

+ icon

Transaction Operator

Analyze transaction data such as website sign-ups and e-commerce activity.

- icon

Flow Diagrams

+ icon

Flow Diagrams

Flow Diagrams can show the flow within a distributed system.

- icon

Transactionize Operator

+ icon

Transactionize Operator

Groups log messages that match on any fields you specify.

diff --git a/docs/security/additional-security-features/cloud-infrastructure-security/index.md b/docs/security/additional-security-features/cloud-infrastructure-security/index.md index fae02cefb5..4b1167cbf1 100644 --- a/docs/security/additional-security-features/cloud-infrastructure-security/index.md +++ b/docs/security/additional-security-features/cloud-infrastructure-security/index.md @@ -12,13 +12,13 @@ This section contains the following topics:
- Shield icon

Introduction to Cloud Infrastructure Security

+ Shield icon

Introduction to Cloud Infrastructure Security

Learn basic concepts about Cloud Infrastructure Security.

- AWS icon

Cloud Infrastructure Security for AWS

+ AWS icon

Cloud Infrastructure Security for AWS

Learn about our Cloud Infrastructure Security for AWS app.

diff --git a/docs/security/additional-security-features/index.md b/docs/security/additional-security-features/index.md index 75a56647bb..d6f255239f 100644 --- a/docs/security/additional-security-features/index.md +++ b/docs/security/additional-security-features/index.md @@ -12,37 +12,37 @@ This section contains the following topics:
- Shield icon

Introduction to Logs for Security

+ Shield icon

Introduction to Logs for Security

Get an introduction to basic concepts of using Sumo Logic for security use cases.

- Shield icon

Threat Detection and Investigation

+ Shield icon

Threat Detection and Investigation

Learn how to monitor security data and investigate incidents.

- Shield icon

Security Data Lake

+ Shield icon

Security Data Lake

Learn about using your Sumo Logic environment as a security data lake.

- Shield icon

Audit and Compliance

+ Shield icon

Audit and Compliance

Learn how to use Sumo Logic apps to assist with audit and compliance.

- Shield icon

Application Security

+ Shield icon

Application Security

Learn about using Sumo Logic for application security.

- Shield icon

Cloud Infrastructure Security

+ Shield icon

Cloud Infrastructure Security

Learn how to secure your cloud infrastructure.

diff --git a/docs/security/threat-intelligence/index.md b/docs/security/threat-intelligence/index.md index ed33a9e52c..bb0d7aa224 100644 --- a/docs/security/threat-intelligence/index.md +++ b/docs/security/threat-intelligence/index.md @@ -14,37 +14,37 @@ See the following articles to learn about Sumo Logic's threat intelligence capab
- icon

About Threat Intelligence

+ icon

About Threat Intelligence

Get an overview of Sumo Logic's threat intelligence capabilities.

- icon

Find Threats with Cloud SIEM

+ icon

Find Threats with Cloud SIEM

Learn how to use threat indicators in Cloud SIEM.

- icon

Find Threats with Log Queries

+ icon

Find Threats with Log Queries

Learn how to perform searches to find matches to data in threat intelligence indicators.

- icon

Manage Threat Intelligence Indicators

+ icon

Manage Threat Intelligence Indicators

Learn how to add and manage indicators from threat intelligence sources.

- icon

Upload Formats for Threat Intelligence Indicators

+ icon

Upload Formats for Threat Intelligence Indicators

Learn how to format upload files containing threat intelligence indicators.

- icon

Threat Intelligence Mapping

+ icon

Threat Intelligence Mapping

Learn about the mapping of threat intelligence schema from vendor sources to Sumo Logic schema.

diff --git a/docs/send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/collect-logs.md b/docs/send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/collect-logs.md index cabe622a5c..21cc617156 100644 --- a/docs/send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/collect-logs.md +++ b/docs/send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/collect-logs.md @@ -113,8 +113,8 @@ This section describes how to push logs from a network security group into Azure * Login to the Azure Portal. * Click **Network security groups > Select a network security group**. * Click on **NSG flow logs** when you see it under **Monitoring**, and click **Create**. -* Click on **Select resource** and choose a NSG that is present in the same region as the storage account configured in Step 1. -* Under **Subscription > Storage Accounts**, select the storage account configured in Step 1. +* Click on **Select resource** and choose a NSG that is present in the same region as the storage account configured in [Step 1](#step-1-configure-azure-storage-account). +* Under **Subscription > Storage Accounts**, select the storage account configured in [Step 1](#step-1-configure-azure-storage-account). * Specify the **Retention (days)** and click **Review + create**.
review+create * Review the configuration of the flow log and click **Create**.
review-configuration diff --git a/docs/send-data/collect-from-other-data-sources/azure-blob-storage/index.md b/docs/send-data/collect-from-other-data-sources/azure-blob-storage/index.md index 68a045d306..95adad3cc6 100644 --- a/docs/send-data/collect-from-other-data-sources/azure-blob-storage/index.md +++ b/docs/send-data/collect-from-other-data-sources/azure-blob-storage/index.md @@ -17,19 +17,19 @@ In this section, we'll introduce the following concepts:
- icon

Azure Blob Storage (block blobs)

+ icon

Azure Blob Storage (block blobs)

Learn about event-based pipeline to ship block blob data from Azure Blob Storage to an HTTP source.

- icon

Azure Blob Storage (append blobs)

+ icon

Azure Blob Storage (append blobs)

Learn about event-based pipeline to ship append blob data from Azure Blob Storage to an HTTP source.

- icon

Troubleshoot Azure Storage Log Collection

+ icon

Troubleshoot Azure Storage Log Collection

Learn why log data is not flowing into Sumo Logic from Azure Blob Storage.

diff --git a/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/index.md b/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/index.md index 61dc0448fd..f798f88364 100644 --- a/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/index.md +++ b/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/index.md @@ -14,31 +14,31 @@ In this section, we'll introduce the following concepts:
- icon

Telegraf Collection Architecture

+ icon

Telegraf Collection Architecture

Configure Telegraf plugins to fetch metrics from your applications and send them to Sumo Logic.

- icon

Installing Telegraf

+ icon

Installing Telegraf

Install Telegraf on a Kubernetes and Non-Kubernetes environment.

- icon

Configure Telegraf Input Plugins

+ icon

Configure Telegraf Input Plugins

Configure Telegraf input plugins to collect metrics from an application or service.

- icon

Configure Telegraf Output Plugin

+ icon

Configure Telegraf Output Plugin

Configure the Telegraf output plugin to send metrics to Sumo Logic.

- icon

Collect Custom JMX Metrics with Jolokia

+ icon

Collect Custom JMX Metrics with Jolokia

Collect custom JMX metrics using the Jolokia agent and Telegraf.

diff --git a/docs/send-data/collect-from-other-data-sources/index.md b/docs/send-data/collect-from-other-data-sources/index.md index 438d4b6ae8..5993cd8980 100644 --- a/docs/send-data/collect-from-other-data-sources/index.md +++ b/docs/send-data/collect-from-other-data-sources/index.md @@ -13,163 +13,163 @@ In this section, we'll introduce the following concepts:
- icon

Amazon CloudWatch Logs

+ icon

Amazon CloudWatch Logs

Collect logs using a Collector Script, Lambda function, Amazon Kinesis, and CloudFormation.

- icon

Amazon MSK Prometheus

+ icon

Amazon MSK Prometheus

Learn how to configure metrics collection for Amazon MSK.

- icon

Amazon Resource Names (ARNs)

+ icon

Amazon Resource Names (ARNs)

Collect log events from CloudWatch Logs in real-time.

- icon

AWS ECS Fargate

+ icon

AWS ECS Fargate

Collect application container logs from AWS ECS clusters launched with AWS Fargate.

- icon

AWS Fargate

+ icon

AWS Fargate

Learn how to collect logs from AWS Fargate.

- icon

AWS Lambda - Create Function

+ icon

AWS Lambda - Create Function

Learn how to collect AWS Lambda logs using CloudWatch Logs.

- icon

AWS Lambda Extension

+ icon

AWS Lambda Extension

Learn how to collect AWS Lambda logs, metrics, and spans.

- icon

AWS Lambda Performance

+ icon

AWS Lambda Performance

Learn how AWS Lambda Extensions impact the performance and execution time of AWS Lambda functions.

- icon

AWS OpsWorks

+ icon

AWS OpsWorks

Learn how to easily create and manage stacks and applications.

- icon

Azure Blob Storage

+ icon

Azure Blob Storage

Learn about event-based pipeline to ship monitoring data from Azure Blob Storage to an HTTP source.

- icon

Azure Monitoring

+ icon

Azure Monitoring

Learn how to collect logs and metrics for Azure services.

- icon

Docker

+ icon

Docker

Learn about methods for collecting logs and metrics from Docker.

- icon

Halo Event Log Integration

+ icon

Halo Event Log Integration

Learn how to pull security event logs from Halo into Sumo Logic.

- icon

Heroku

+ icon

Heroku

Upload data from the Heroku app by pointing a Heroku log drain to the URL for an HTTP Source.

- icon

Kubernetes

+ icon

Kubernetes

Learn how to collect Kubernetes logs, metrics, and events.

- icon

Oracle Cloud Infrastructure

+ icon

Oracle Cloud Infrastructure

Export OCI Service logs, Audit logs, Application logs and Security logs.

- icon

Palo Alto Networks Cortex Data Lake

+ icon

Palo Alto Networks Cortex Data Lake

Learn how to collect Logs from the Palo Alto Networks Cortex Data Lake.

- icon

Prometheus

+ icon

Prometheus

Learn how to collect Prometheus Metrics in or outside Kubernetes using Telegraf.

- icon

Splunk

+ icon

Splunk

Learn how to import raw data from Splunk.

- icon

StatsD

+ icon

StatsD

Learn how to perform a StatsD implementation.

- icon

Ruby on Rails

+ icon

Ruby on Rails

Learn how to collect complex application logs generated by Ruby on Rails.

- icon

SentinelOne

+ icon

SentinelOne

Learn how to ingest SentinelOne logs into Sumo Logic.

- icon

Telegraf

+ icon

Telegraf

Learn how to use Telegraf to obtain metrics from an application.

- icon

Sumo Logic Open Source Projects

+ icon

Sumo Logic Open Source Projects

Learn about open-source solutions and resources for customers via GitHub.

- icon

VMware AirWatch

+ icon

VMware AirWatch

Provides visibility for monitoring enterprise mobility management in your deployment.

- icon

VMware vRealize Operations Manager

+ icon

VMware vRealize Operations Manager

Learn how to identify and solve emerging issues with predictive analysis and smart alerts.

- icon

VMware vRealize Log Insight

+ icon

VMware vRealize Log Insight

Configure log collection for VMware vRealize Log Insight.

diff --git a/docs/send-data/collection/index.md b/docs/send-data/collection/index.md index e1652a977b..ce8530656f 100644 --- a/docs/send-data/collection/index.md +++ b/docs/send-data/collection/index.md @@ -70,67 +70,67 @@ In this section, we'll introduce the following concepts:
- icon

Search for a Collector or Source

+ icon

Search for a Collector or Source

Search for a collector or source on the manage collection page.

- icon

Start or Stop a Collector using Scripts

+ icon

Start or Stop a Collector using Scripts

Start/stop a collector and check collector status.

- icon

Restart a Collector

+ icon

Restart a Collector

Restart a collector from the collection page.

- icon

Edit a Collector

+ icon

Edit a Collector

Edit collector characteristics.

- icon

Edit a Source

+ icon

Edit a Source

Edit source characteristics.

- icon

Pause and Resume a Source

+ icon

Pause and Resume a Source

Pause sources from sending data to Sumo Logic.

- icon

Set a Collector CPU Usage Target

+ icon

Set a Collector CPU Usage Target

Limit the amount of CPU processing a collector uses.

- icon

Upgrade a Collector

+ icon

Upgrade a Collector

Deploy an upgrade to one or more collectors.

- icon

Collector Logs

+ icon

Collector Logs

Use log events to troubleshoot collection issues.

- icon

Processing Rules

+ icon

Processing Rules

Processing rules can help filter and forward data.

diff --git a/docs/send-data/collection/processing-rules/index.md b/docs/send-data/collection/processing-rules/index.md index b40a2b309c..d719eb50d6 100644 --- a/docs/send-data/collection/processing-rules/index.md +++ b/docs/send-data/collection/processing-rules/index.md @@ -49,37 +49,37 @@ In this section, we'll introduce the following concepts:
- icon

Create a Processing Rules

+ icon

Create a Processing Rules

Processing rules filter and can forward data sent to Sumo Logic from a Source.

- icon

Data Forwarding Rules

+ icon

Data Forwarding Rules

Data Forwarding rules forward data collected from an Installed Collector to non-Sumo Logic destinations.

- icon

Hash Rules

+ icon

Hash Rules

With a hash rule, an expression you choose will be replaced by a hash code.

- icon

Mask Rules

+ icon

Mask Rules

Create a mask rule to replace an expression with a mask string.

- icon

Include and Exclude Rules

+ icon

Include and Exclude Rules

Use include and exclude processing rules to specify what kind of data is sent to Sumo Logic.

- icon

Metrics Include and Exclude Rules

+ icon

Metrics Include and Exclude Rules

Use metrics processing rules to specify what metrics a metrics source are sen to Sumo Logic.

diff --git a/docs/send-data/hosted-collectors/amazon-aws/index.md b/docs/send-data/hosted-collectors/amazon-aws/index.md index b7f6c9e965..eeb8348cf7 100644 --- a/docs/send-data/hosted-collectors/amazon-aws/index.md +++ b/docs/send-data/hosted-collectors/amazon-aws/index.md @@ -19,91 +19,91 @@ In this section, we'll introduce the following concepts:
- icon

AWS Source Config

+ icon

AWS Source Config

Get started configuring AWS Sources for Sumo Logic ingestion.

- icon

Grant Access to an AWS Product

+ icon

Grant Access to an AWS Product

Before configuring your Source, enable access to your AWS product.

- icon

Amazon Path Expressions

+ icon

Amazon Path Expressions

Sample path expressions you can use to collect data from Amazon Sources.

- icon

Amazon S3 Audit

+ icon

Amazon S3 Audit

Add the Amazon S3 Audit Source to upload messages to Sumo Logic.

- icon

Amazon S3 Scan Interval

+ icon

Amazon S3 Scan Interval

Define the waiting time between scans of the objects in your S3 bucket.

- icon

Amazon S3

+ icon

Amazon S3

Add an Amazon S3 Source to upload messages to Sumo Logic.

- icon

Amazon CloudFront

+ icon

Amazon CloudFront

Distribute content to end-users with low latency and high data transfer speeds.

- icon

Amazon CloudWatch Metrics

+ icon

Amazon CloudWatch Metrics

Gather metrics data from an Amazon resource.

- Thumbnail icon

AWS CloudTrail

+ Thumbnail icon

AWS CloudTrail

AWS CloudTrail Source records API calls made to AWS.

- Thumbnail icon

AWS Elastic Load Balancing

+ Thumbnail icon

AWS Elastic Load Balancing

Add the AWS ELB Source to upload messages to Sumo Logic.

- icon

AWS Metadata (Tag)

+ icon

AWS Metadata (Tag)

Collect tags from EC2 instances running on AWS.

- icon

AWS Kinesis Firehose Logs

+ icon

AWS Kinesis Firehose Logs

Ingest logs from Amazon Kinesis Data Firehose.

- icon

AWS Kinesis Firehose Metrics

+ icon

AWS Kinesis Firehose Metrics

Ingest CloudWatch metrics from Amazon Kinesis Data Firehose.

- icon

AWS GovCloud

+ icon

AWS GovCloud

AWS GovCloud are specific regions authorized to a FedRAMP-High baseline.

- icon

AWS CloudFormation Configuration

+ icon

AWS CloudFormation Configuration

Use CloudFormation to set up AWS products.

diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md index bb437a93a2..f523f51abe 100644 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md +++ b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md @@ -56,601 +56,601 @@ In this section, we'll introduce the following concepts:
- Thumbnail icon

Cloud-to-Cloud Info

+ Thumbnail icon

Cloud-to-Cloud Info

Learn the basics of setting up Cloud-to-Cloud Integration Framework sources.

- Thumbnail icon

1Password

+ Thumbnail icon

1Password

Provides a secure endpoint to receive Sign-in Attempts and Item Usage from the 1Password Event API.

- icon

Abnormal Security Source

+ icon

Abnormal Security Source

Abnormal Security Source helps to collect abnormal threat log from the Abnormal Security platform.

- icon

Airtable Source

+ icon

Airtable Source

Airtable Source helps to retrieve Airtable audit logs into the Sumo Logic environment.

- icon

Akamai CPC Source

+ icon

Akamai CPC Source

Learn to fetch CPC-Configs, CPC-Alerts, and CPC-Alert Details from the Akamai platform.

- Thumbnail icon

Akamai SIEM API

+ Thumbnail icon

Akamai SIEM API

Provides a secure endpoint to receive security events generated on the Akamai platform.

- icon

Armis API Source

+ icon

Armis API Source

Armis API Source helps to fetch device and alert logs from the Armis platform and send it to Sumo Logic.

- icon

Asana Source

+ icon

Asana Source

Learn to retrieve Asana audit logs into the Sumo Logic environment.

- icon

Atlassian Source

+ icon

Atlassian Source

Learn how to retrieve Atlassian audit logs into the Sumo Logic environment.

- icon

Automox Source

+ icon

Automox Source

Learn how to retrieve all events objects, audit trail events, and device inventory details into the Sumo Logic environment.

- icon

AWS Cost Explorer

+ icon

AWS Cost Explorer

Learn to collect cost and usage reports from AWS Cost Explorer Source.

- icon

AWS IAM Users

+ icon

AWS IAM Users

Learn to collect the IAM User Inventory logs from the AWS SDK and send them to Sumo Logic for analysis.

- icon

Azure Event Hubs

+ icon

Azure Event Hubs

Provides a secure endpoint to receive data from Azure Event Hubs.

- icon

Bitwarden

+ icon

Bitwarden

Learn how to collect event logs from the Bitwarden API.

- box-logo.svg

Box

+ box-logo.svg

Box

The Box API integration ingests events from the GetEvents API.

- thumbnail icon

Carbon Black Cloud (Tag)

+ thumbnail icon

Carbon Black Cloud (Tag)

Provides a secure endpoint to receive data from the Carbon Black Cloud, Enriched Event Search, and Alerts APIs.

- thumbnail icon

Carbon Black Inventory

+ thumbnail icon

Carbon Black Inventory

Provides a secure endpoint to receive data from the CB Devices API.

- icon

Cato Networks

+ icon

Cato Networks

Cato Networks Source helps to retrieve Cato audit and security logs into the Sumo Logic environment.

- Thumbnail icon

ChatGPT Compliance

+ Thumbnail icon

ChatGPT Compliance

Securely collect and analyze ChatGPT Compliance platform conversation logs.

- icon

Cisco AMP

+ icon

Cisco AMP

Provides a secure endpoint to receive data from the Cisco Amp System Log API.

- icon

Cisco Meraki

+ icon

Cisco Meraki

Provides a secure endpoint to receive data from the Cisco Meraki API.

- icon

Cisco Vulnerability Management

+ icon

Cisco Vulnerability Management

Provides a secure endpoint to receive assets data from Asset API and vulnerabilities data from Vulnerability API.

- icon

Citrix Cloud Source

+ icon

Citrix Cloud Source

Provides a secure endpoint to receive System Log data from the Citrix Cloud System Log API.

- icon

Cloud SIEM AWS EC2 Inventory

+ icon

Cloud SIEM AWS EC2 Inventory

Provides a secure endpoint to receive event data from the EC2 describe instances API.

- icon

Cloud-to-Cloud Versions

+ icon

Cloud-to-Cloud Versions

Sources in the Cloud-to-Cloud Integration Framework need updates over time to maintain data collection.

- icon

Code42 Incydr

+ icon

Code42 Incydr

Learn how to collect alerts, file events, and audit logs from Code42 Incydr.

- icon

Confluent Cloud Metrics

+ icon

Confluent Cloud Metrics

Learn how to collect metrics from the Confluent Cloud Metrics platform and send them to Sumo Logic.

- thumbnail icon

Crowdstrike

+ thumbnail icon

Crowdstrike

Provides a secure endpoint to receive event data from the CrowdStrike Streams API.

- thumbnail icon

CrowdStrike FDR

+ thumbnail icon

CrowdStrike FDR

Provides a secure endpoint to ingest Falcon Data Replicator events using the S3 ingestion.

- thumbnail icon

CrowdStrike FDR Host Inventory

+ thumbnail icon

CrowdStrike FDR Host Inventory

Provides a secure endpoint to receive device data from the CrowdStrike Host and Host Group Management APIs.

- thumbnail icon

CrowdStrike FileVantage

+ thumbnail icon

CrowdStrike FileVantage

Learn how to collect file integrity monitoring logs from the CrowdStrike FileVantage platform.

- thumbnail icon

CrowdStrike Spotlight

+ thumbnail icon

CrowdStrike Spotlight

Learn how to collect combined endpoint vulnerabilities data from the CrowdStrike Spotlight platform.

- thumbnail icon

CrowdStrike Threat Intel

+ thumbnail icon

CrowdStrike Threat Intel

Learn how to collect combined endpoint indicators data from the CrowdStrike Threat Intel platform.

- icon

CyberArk EPM

+ icon

CyberArk EPM

Before configuring an AWS Source give Sumo Logic access to your AWS product

- icon

CyberArk Audit

+ icon

CyberArk Audit

Learn to collect audits using the CyberArk SIEM integrations API.

- icon

Cybereason

+ icon

Cybereason

Provides a secure endpoint to receive authentication logs from the Cybereason Malops API.

- Thumbnail icon

Digital Guardian

+ Thumbnail icon

Digital Guardian

Learn how to collect export data from the Digital Guardian and send it to Sumo Logic.

- Thumbnail icon

DocuSign

+ Thumbnail icon

DocuSign

Learn how to collect customer event data from the DocuSign and send it to Sumo Logic.

- Thumbnail icon

Dragos

+ Thumbnail icon

Dragos

Learn how to collect address, asset, vulnerability, notification, and zone details from the Dragos API and send them to Sumo Logic.

- dropbox-icon.png

Dropbox

+ dropbox-icon.png

Dropbox

Provides a secure endpoint to receive team events from the Get Events API.

- thumbnail icon

Druva

+ thumbnail icon

Druva

Learn how to configure the Druva C2C source setup in your Sumo Logic environment.

- thumbnail icon

Druva Cyber Resilience

+ thumbnail icon

Druva Cyber Resilience

Learn how to configure the Druva Cyber Resilience C2C source setup in your Sumo Logic environment.

- thumbnail icon

Duo

+ thumbnail icon

Duo

Provides a secure endpoint to receive authentication logs from the Duo Authentication Logs API.

- Gmail

Gmail Trace Logs

+ Gmail

Gmail Trace Logs

Pulls Gmail log data using BigQuery Library APIs.

- Thumbnail icon

Github Copilot

+ Thumbnail icon

Github Copilot

Learn to collect the organization metrics and team metrics from GitHub Copilot platform.

- Gmail

Google BigQuery

+ Gmail

Google BigQuery

Learn how to collect data using the BigQuery API.

- thumbnail icon

Google Workspace AlertCenter

+ thumbnail icon

Google Workspace AlertCenter

Configure Google Workspace AlertCenter Cloud-to-Cloud connector.

- thumbnail icon

Google Workspace

+ thumbnail icon

Google Workspace

Collects a list of users from the Google Workspace Users API.

- thumbnail icon

Intel471 Threat Intel

+ thumbnail icon

Intel471 Threat Intel

Learn to collect threat indicators from the Intel471 platform.

- icon

Jamf

+ icon

Jamf

Collect inventory data from the Jamf platform.

- icon

JFrog Xray

+ icon

JFrog Xray

Collect violation events from JFrog Xray.

- icon

JumpCloud Directory Insights

+ icon

JumpCloud Directory Insights

Collect events data from the JumpCloud Directory Insight.

- icon

Kaltura Source

+ icon

Kaltura Source

Learn how to collect Audit Trail and Base Entry events from Kaltura platform.

- icon

Kandji Source

+ icon

Kandji Source

Learn how to collect threat details, devices list, device activities, and device details from the Kandji platform.

- icon

KnowBe4 API Source

+ icon

KnowBe4 API Source

Collects user events data into Sumo Logic for storage, analysis, and alerting.

- icon

LastPass Source

+ icon

LastPass Source

Collects audit reporting events from the LastPass platform.

- thumbnail icon

Microsoft Azure AD Inventory (Tag)

+ thumbnail icon

Microsoft Azure AD Inventory (Tag)

Collects user and device data from the Microsoft Graph API Security endpoint.

- thumbnail icon

Mandiant Threat Intel

+ thumbnail icon

Mandiant Threat Intel

Learn to collect threat indicators from the Mandiant platform.

- icon

Microsoft Exchange Trace Logs

+ icon

Microsoft Exchange Trace Logs

Collects email trace logs from the Office 365 reporting web service.

- icon

Microsoft Graph Azure AD Reporting

+ icon

Microsoft Graph Azure AD Reporting

Collects Directory Audit, Sign-in, and Provisioning data from MS Graph API Azure AD activity reports.

- icon

Microsoft Graph Identity Protection

+ icon

Microsoft Graph Identity Protection

Collects Risk Detection and Risky User data from the Microsoft Graph Identity Protection API.

- icon

Microsoft Graph Security API

+ icon

Microsoft Graph Security API

Provides a secure endpoint to receive alerts from the Microsoft Graph Security API endpoint.

- icon

Mimecast

+ icon

Mimecast

Supports collecting SIEM, DLP, Audit, and Hold Message List data from the Mimecast API.

- icon

Miro

+ icon

Miro

Ingests audit logs obtained from the Audit log API.

- thumbnail icon

Netskope

+ thumbnail icon

Netskope

Provides a secure endpoint to receive event data from the Netskope API.

- thumbnail icon

Netskope WebTx

+ thumbnail icon

Netskope WebTx

The Netskope WebTx API integration ingests Web Transaction logs from Netskope Event Stream.

- Thumbnail icon

Okta

+ Thumbnail icon

Okta

Provides a secure endpoint to receive event data from the Okta System Log API and Users API.

- Thumbnail icon

OneLogin

+ Thumbnail icon

OneLogin

Provides a secure and centralized access to user lists from the OneLogin API.

- thumbnail icon

Palo Alto Cortex XDR

+ thumbnail icon

Palo Alto Cortex XDR

Allows you to ingest incidents from your Cortex XDR application.

- icon

Proofpoint On Demand

+ icon

Proofpoint On Demand

Collects data and uses the secure WebSocket protocol to stream logs.

- icon

Proofpoint TAP

+ icon

Proofpoint TAP

Provides a secure endpoint to receive data from the Proofpoint TAP SIEM API.

- qualys-icon.png

Qualys VMDR

+ qualys-icon.png

Qualys VMDR

The Qualys VMDR Source tracks errors, reports its health, and start-up progress.

-

Rapid7

+

Rapid7

Collects asset and vulnerabilities data from Rapid7 InsightVM.

-

SailPoint

+

SailPoint

Provides a secure endpoint to receive Events and User Inventory data from the IdentityNow V3 API.

- Thumbnail icon

Salesforce

+ Thumbnail icon

Salesforce

Provides a secure endpoint to receive event data from the Salesforce through its Rest API.

- sentinelone-icon.png

SentinelOne Mgmt API

+ sentinelone-icon.png

SentinelOne Mgmt API

Collects data from the SentinelOne Management Console.

- Thumbnail icon

Slack

+ Thumbnail icon

Slack

Learn about the Slack Source, part of Sumo Logic's Cloud-to-Cloud Integration Framework.

- Thumbnail icon

Smartsheet

+ Thumbnail icon

Smartsheet

Learn how to collect events from Smartsheet platform.

- Thumbnail icon

Snowflake Logs

+ Thumbnail icon

Snowflake Logs

Learn how to collect logs from Snowflake platform.

- icon

Sophos Central

+ icon

Sophos Central

Learn to receive authentication logs from the Sophos Central APIs.

- icon

STIX/TAXII 1 Client

+ icon

STIX/TAXII 1 Client

Learn how to set up a STIX/TAXII 1.x client to collect threat intelligence indicators into the Sumo Logic environment.

- icon

STIX/TAXII 2 Client

+ icon

STIX/TAXII 2 Client

Learn how to set up a STIX/TAXII 2.x client to collect threat intelligence indicators into the Sumo Logic environment.

- icon

Sumo Collection

+ icon

Sumo Collection

Learn how to collect the list of collectors and their sources using the Sumo Logic Collector API and Sources API.

- icon

Sumo Logic Kickstart Data

+ icon

Sumo Logic Kickstart Data

Learn how to collect audit reporting events using Sumo Logic sample data.

- icon

Symantec Endpoint Security Source

+ icon

Symantec Endpoint Security Source

Learn to collect incidents and incident events from the Symantec Endpoint Security platform.

- icon

Symantec Web Security Service

+ icon

Symantec Web Security Service

Learn to receive WSS Access logs from the Symantec WSS API.

- icon

Sysdig Secure

+ icon

Sysdig Secure

Collect the scan results from the scanner using the Sysdig API.

- icon

Tenable

+ icon

Tenable

Learn to ingest audit-log events, vulnerability, and asset data from the Tenable.io APIs.

- icon

Trellix mVision ePO

+ icon

Trellix mVision ePO

Learn how to collect event logs using the Trellix mVision ePO.

- Thumbnail icon

Trend Micro

+ Thumbnail icon

Trend Micro

Learn how to collect alert details from Trend Micro platform.

- trust-login-icon

Trust Login

+ trust-login-icon

Trust Login

Learn how to collect report logs from Trust Login platform.

- Thumbnail icon

Universal Connector Source

+ Thumbnail icon

Universal Connector Source

Learn how to set up a Universal Connector to collect data into the Sumo Logic environment.

- Thumbnail icon

Vectra

+ Thumbnail icon

Vectra

Learn to collect the list of threats detected in the Vectra platform.

- Thumbnail icon

VMware Workspace One

+ Thumbnail icon

VMware Workspace One

Learn how to collect the device details and corresponding list of applications for the devices from the VMware Workspace One platform.

- Thumbnail icon

Webex

+ Thumbnail icon

Webex

Learn to collect admin audit events using Webex API.

- Thumbnail icon

Workday

+ Thumbnail icon

Workday

Learn to create a Workday Source.

- Thumbnail icon

Zendesk

+ Thumbnail icon

Zendesk

Learn to collect audit logs from the Zendesk platform.

- Thumbnail icon

ZeroFox

+ Thumbnail icon

ZeroFox

Learn to collect threat indicators using the ZeroFox API and send them to Sumo Logic for analysis.

- Thumbnail icon

Zero Networks Segment

+ Thumbnail icon

Zero Networks Segment

Learn to collect audit logs and network activity data from Zero Networks Segment.

- Thumbnail icon

Zimperium MTD Source

+ Thumbnail icon

Zimperium MTD Source

Learn to collect the device logs from the Zimperium API and send it to Sumo Logic.

diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/qualys-vmdr-source.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/qualys-vmdr-source.md index 2fb410cc33..1d3a7dd870 100644 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/qualys-vmdr-source.md +++ b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/qualys-vmdr-source.md @@ -84,7 +84,7 @@ Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources. Computer Inventory /rest/2.0/search/am/asset/ - This collects the details for each asset/computer from Qualys. This data source is supported by Cloud SIEM as inventory data.
+ This collects the details for each asset/computer from Qualys. This data source is supported by Cloud SIEM as [inventory data](/docs/cse/administration/inventory-sources-and-data).
Permissions - User must have the GAV/CSAM module and the App API Enabled option enabled for that role. Additionally, the user must have the Allow user view access to all objects checkbox enabled under Roles And Scopes within the user settings.
API details are on page 27 in the this Qualys PDF. diff --git a/docs/send-data/hosted-collectors/configure-hosted-collector.md b/docs/send-data/hosted-collectors/configure-hosted-collector.md index e799c84872..181b6c2e8a 100644 --- a/docs/send-data/hosted-collectors/configure-hosted-collector.md +++ b/docs/send-data/hosted-collectors/configure-hosted-collector.md @@ -38,42 +38,42 @@ Once you've configured your Hosted Collector, the next step is to configure a So
Thumbnail icon -

Amazon Sources

+

Amazon Sources

Collect data from a variety of AWS products.

Thumbnail icon -

Microsoft Sources

+

Microsoft Sources

Collect data from Microsoft Office 365 Audit.

Thumbnail icon -

Google Sources

+

Google Sources

Collect data from Google products such as GCP.

Cloud icon -

Cloud-to-Cloud Integration Framework Sources

+

Cloud-to-Cloud Integration Framework Sources

Collect logs and events directly from your SaaS and Cloud platforms.

Cloud icon -

Cloud Syslog Sources

+

Cloud Syslog Sources

Configure a syslog client to send RFC 5424-compliant messages to Sumo.

Thumbnail icon -

HTTP Sources

+

HTTP Sources

Receive logs, metrics, traces, and OTLP data uploaded to a unique URL generated for the Source.

diff --git a/docs/send-data/hosted-collectors/google-source/index.md b/docs/send-data/hosted-collectors/google-source/index.md index 9fee3e02df..74895e28d2 100644 --- a/docs/send-data/hosted-collectors/google-source/index.md +++ b/docs/send-data/hosted-collectors/google-source/index.md @@ -12,19 +12,19 @@ In this section, we'll introduce the following concepts:
- icon

Google Workspace Apps Audit

+ icon

Google Workspace Apps Audit

Add a Google Workspace Apps Audit Source to ingest audit logs from Google apps.

- icon

Google Cloud Platform

+ icon

Google Cloud Platform

Export data collected by Stackdriver to Google Cloud Pub/Sub.

- icon

Google Cloud Platform Metrics

+ icon

Google Cloud Platform Metrics

Get visibility into Google Cloud Platform infrastructure and managed services.

diff --git a/docs/send-data/hosted-collectors/http-source/index.md b/docs/send-data/hosted-collectors/http-source/index.md index c41bf88607..0a3fca76a9 100644 --- a/docs/send-data/hosted-collectors/http-source/index.md +++ b/docs/send-data/hosted-collectors/http-source/index.md @@ -13,49 +13,49 @@ In this section, we'll introduce the following concepts:
- Thumbnail icon

HTTP Logs and Metrics

+ Thumbnail icon

HTTP Logs and Metrics

An HTTP Logs and Metrics Source is an endpoint for receiving log and metric data uploaded to a unique URL generated for the Source.

- Thumbnail icon

OTLP

+ Thumbnail icon

OTLP

Use an HTTP OTLP Source to collect OTLP formatted Logs, Metrics, and Traces data.

- Thumbnail icon

Upload Logs to HTTP Source

+ Thumbnail icon

Upload Logs to HTTP Source

This guide provides instructions on uploading logs to an HTTP Source.

- Thumbnail icon

Upload Metrics to HTTP Source

+ Thumbnail icon

Upload Metrics to HTTP Source

This guide provides instructions on uploading metrics to an HTTP Source.

- Thumbnail icon

Generate HTTP Source URL

+ Thumbnail icon

Generate HTTP Source URL

You can generate a new URL for an HTTP Source at any time. Generating a new URL completely invalidates the old URL.

- Thumbnail icon

HTTP Traces

+ Thumbnail icon

HTTP Traces

An HTTP Traces Source is an endpoint for receiving trace data.

- Thumbnail icon

RUM HTTP Traces Source

+ Thumbnail icon

RUM HTTP Traces Source

Learn how to configure a RUM HTTP Traces Source.

- Thumbnail icon

HTTP Source Troubleshooting

+ Thumbnail icon

HTTP Source Troubleshooting

Check the HTTP status codes.

diff --git a/docs/send-data/hosted-collectors/index.md b/docs/send-data/hosted-collectors/index.md index 5c0d608fd3..5009a8b467 100644 --- a/docs/send-data/hosted-collectors/index.md +++ b/docs/send-data/hosted-collectors/index.md @@ -44,49 +44,49 @@ The maximum number of Collectors allowed per organization is 10,000.
- icon

Configure a Hosted Collector

+ icon

Configure a Hosted Collector

Set up Hosted Collectors so you can move data to Sumo Logic.

- icon

Amazon and AWS Sources

+ icon

Amazon and AWS Sources

Collect from one of the many AWS products that we support.

- thumbnail icon

Google Sources

+ thumbnail icon

Google Sources

Collect data from your Google Cloud Platform and other products.

- Thumbnail icon

C2C Integration Sources

+ Thumbnail icon

C2C Integration Sources

Collect logs and events directly from SaaS and Cloud platforms.

- Thumbnail icon

HTTP Sources

+ Thumbnail icon

HTTP Sources

Upload logs, metrics, traces, and more to an HTTP Source.

- Thumbnail icon

Microsoft Sources

+ Thumbnail icon

Microsoft Sources

Collect data from your Microsoft platform and other products.

- thumbnail icon

Cloud Syslog Sources

+ thumbnail icon

Cloud Syslog Sources

Configure a cloud syslog source to send data to Sumo Logic.

- Thumbnail icon

Zoom Source

+ Thumbnail icon

Zoom Source

Learn how to create HTTP Zoom source and enable events subscriptions.

diff --git a/docs/send-data/hosted-collectors/microsoft-source/index.md b/docs/send-data/hosted-collectors/microsoft-source/index.md index 37f32a548d..d2f40d2fa0 100644 --- a/docs/send-data/hosted-collectors/microsoft-source/index.md +++ b/docs/send-data/hosted-collectors/microsoft-source/index.md @@ -15,13 +15,13 @@ In this section, we'll introduce the following concepts:
- icon

Azure Metrics Source

+ icon

Azure Metrics Source

Learn how to configure Azure Metrics Source for Sumo Logic ingestion.

- icon

Microsoft Office 365 Audit Source

+ icon

Microsoft Office 365 Audit Source

Learn how to configure Microsoft Office 365 Audit Source for Sumo Logic ingestion.

diff --git a/docs/send-data/index.md b/docs/send-data/index.md index 5e3a1cf260..27f95cbb6c 100644 --- a/docs/send-data/index.md +++ b/docs/send-data/index.md @@ -21,55 +21,55 @@ Learn how to send data to Sumo Logic and get started with our observability and
- Data collection icon

Sumo Logic Distro for OpenTelemetry

+ Data collection icon

Sumo Logic Distro for OpenTelemetry

Our OpenTelemetry Distribution is a single unified agent to send Logs, Metrics, Traces, and more.

- Data collection icon

Installed Collectors

+ Data collection icon

Installed Collectors

Installed collector is our proprietary agent that you can deploy in your environment to collect logs and some metrics sources.

- Data collection icon

Hosted Collectors

+ Data collection icon

Hosted Collectors

Set up a Hosted Collector to collect data directly from cloud sources like AWS, GCP, and more without installing an agent.

- Data collection icon

Kubernetes

+ Data collection icon

Kubernetes

Learn how to collect Kubernetes logs, metrics, and events.

- Data collection icon

Other Data Sources

+ Data collection icon

Other Data Sources

Collect logs and metrics from a variety of other data sources.

- Data collection icon

JSON Configuration

+ Data collection icon

JSON Configuration

Learn how to configure Installed and Hosted Collectors sources using JSON files.

- Data collection icon

Time Reference

+ Data collection icon

Time Reference

Learn about supported timestamps, date formatting, and more.

- Data collection icon

Wildcards in Paths

+ Data collection icon

Wildcards in Paths

Use wildcards in Source paths to collect all files of a certain type.

- Data collection icon

Troubleshooting

+ Data collection icon

Troubleshooting

Troubleshooting Sumo Logic data collection.

diff --git a/docs/send-data/installed-collectors/collector-installation-reference/index.md b/docs/send-data/installed-collectors/collector-installation-reference/index.md index 817272f863..b8d9d5293e 100644 --- a/docs/send-data/installed-collectors/collector-installation-reference/index.md +++ b/docs/send-data/installed-collectors/collector-installation-reference/index.md @@ -13,97 +13,97 @@ In this section, we'll introduce the following concepts:
- icon

Download Collector from Static URL

+ icon

Download Collector from Static URL

Static URLs provide download links to the most recent Collector versions.

- icon

user.properties

+ icon

user.properties

Pass Collector parameters for some installation methods.

- icon

Test Collector Connectivity

+ icon

Test Collector Connectivity

Test access and connectivity from an installed Collector to the Sumo Logic service.

- icon

Collector CLI Parameters

+ icon

Collector CLI Parameters

Parameters available when using the Collector's command line installer.

- icon

collector.properties

+ icon

collector.properties

Define the waiting time between scans of the objects in your S3 bucket.

- icon

Collector Installation Error Messages

+ icon

Collector Installation Error Messages

Troubleshoot issues that arise during collector installation.

- icon

Add Collector to Linux Machine Image

+ icon

Add Collector to Linux Machine Image

Build a Collector into a Linux machine image.

- icon

Add Collector to Windows Machine Image

+ icon

Add Collector to Windows Machine Image

Build a Collector into a Windows machine image.

- icon

Advanced UI Installer Settings

+ icon

Advanced UI Installer Settings

Advanced settings for the UI installer.

- icon

Force a Collector's Name with Clobber

+ icon

Force a Collector's Name with Clobber

Use the clobber flag when you're creating a new Collector that will use a name that is already in use.

- icon

sumo.conf for Legacy Collectors

+ icon

sumo.conf for Legacy Collectors

Pass Collector config parameters during installation if the Debian or RPM option is used.

- icon

Set the RUN_AS_USER for a Collector

+ icon

Set the RUN_AS_USER for a Collector

Specify the user under whose account the Collector will run.

- icon

Enabling SNI in a Collector to Support Transparent Proxy

+ icon

Enabling SNI in a Collector to Support Transparent Proxy

Enable SNI on Collectors to support third-party transparent proxy services.

- icon

Using the Binary Package

+ icon

Using the Binary Package

Install a Collector on macOS or Windows if you need to use a specific JRE version.

- icon

Enhanced File System Security

+ icon

Enhanced File System Security

Protect the log cache and configuration files for Installed Collectors.

- icon

Set Collector as Ephemeral

+ icon

Set Collector as Ephemeral

Flag a Collector as ephemeral to delete it after being offline for 12 hours.

diff --git a/docs/send-data/installed-collectors/index.md b/docs/send-data/installed-collectors/index.md index cbd917745d..6671f303cd 100644 --- a/docs/send-data/installed-collectors/index.md +++ b/docs/send-data/installed-collectors/index.md @@ -15,37 +15,37 @@ In this section, we'll introduce the following concepts:
- icon

Install and Configure a Collector

+ icon

Install and Configure a Collector

Install and configure a collector to gather and send data to Sumo Logic.

- icon

For macOS

+ icon

For macOS

Install or uninstall a Collector on a macOS system.

- icon

For Linux

+ icon

For Linux

Install or uninstall a Collector on a Linux system.

- icon

For Windows

+ icon

For Windows

Install or uninstall a Collector on a Windows system.

- icon

Sources

+ icon

Sources

Learn how to configure a variety of local and remote Sources for your Installed Collector.

- icon

Reference Guide

+ icon

Reference Guide

Customize your Installed Collector with these configuration parameters and options.

diff --git a/docs/send-data/installed-collectors/sources/index.md b/docs/send-data/installed-collectors/sources/index.md index 6b3576f25d..00f3dfef31 100644 --- a/docs/send-data/installed-collectors/sources/index.md +++ b/docs/send-data/installed-collectors/sources/index.md @@ -13,97 +13,97 @@ In this section, we'll introduce the following concepts:
- icon

Collect Windows Forwarded Events

+ icon

Collect Windows Forwarded Events

Track and collect forwarded events from a Windows Event Collector.

- icon

Docker Sources

+ icon

Docker Sources

Configure Docker Logs or a Docker Stats Source.

- icon

Host Metrics Source

+ icon

Host Metrics Source

Collect host metrics from a local host.

- icon

Local File Source

+ icon

Local File Source

Collect log messages from the same machine where a collector is installed.

- icon

Local Windows Event Log Source

+ icon

Local Windows Event Log Source

Collect local performance data from the Windows Performance Monitor.

- icon

Windows Event Source Custom Channels

+ icon

Windows Event Source Custom Channels

Find Windows event channels to collect with a Local Windows Event Source.

- icon

Local Windows Performance Monitor Log Source

+ icon

Local Windows Performance Monitor Log Source

Collect local performance data from the Windows Performance Monitor.

- icon

Streaming Metrics Source

+ icon

Streaming Metrics Source

Add a streaming metrics source to collect Graphite, Carbon 2.0, or Prometheus metrics.

- icon

Syslog Source

+ icon

Syslog Source

Obtain syslog messages by listening on a designated port.

- icon

Define Boundary Regex for Multiline Messages

+ icon

Define Boundary Regex for Multiline Messages

Detect when a log message spans multiple lines and then index it as a single message.

- icon

Preconfigure a Machine to Collect Remote Windows Events

+ icon

Preconfigure a Machine to Collect Remote Windows Events

Configure a system for remote access by a Remote Windows Event Log Source.

- icon

Windows Active Directory Inventory Source

+ icon

Windows Active Directory Inventory Source

Collect inventory data from Active Directory Database.

- icon

Remote Windows Event Log Source

+ icon

Remote Windows Event Log Source

Collect Windows event log entries from multiple remote systems.

- icon

Remote Windows Performance Monitor Log Source

+ icon

Remote Windows Performance Monitor Log Source

Collect remote performance data from the Windows Performance Monitor.

- icon

Script Action

+ icon

Script Action

This Script Action passes the results of a scheduled search to a script or program that runs on a machine.

diff --git a/docs/send-data/opentelemetry-collector/data-source-configurations/index.md b/docs/send-data/opentelemetry-collector/data-source-configurations/index.md index 36d84d22a6..fc97b6cc62 100644 --- a/docs/send-data/opentelemetry-collector/data-source-configurations/index.md +++ b/docs/send-data/opentelemetry-collector/data-source-configurations/index.md @@ -11,25 +11,25 @@ In this section, we'll cover data source configuration for the Sumo Logic OpenTe
- icon

Collect Logs

+ icon

Collect Logs

Instructions for collecting logs with the OpenTelemetry collector.

- icon

Collect Metrics

+ icon

Collect Metrics

Instructions for collecting metrics with the OpenTelemetry collector.

- icon

Collect Traces

+ icon

Collect Traces

Instructions for collecting tracing data with the OpenTelemetry collector.

- icon

Additional Configurations

+ icon

Additional Configurations

More OpenTelemetry collector configurations.

diff --git a/docs/send-data/opentelemetry-collector/index.md b/docs/send-data/opentelemetry-collector/index.md index 9e84dc41d2..10d8468884 100644 --- a/docs/send-data/opentelemetry-collector/index.md +++ b/docs/send-data/opentelemetry-collector/index.md @@ -37,14 +37,13 @@ In this section, we'll introduce the following concepts:
- OTel thumbnail icon

Install Collector

+ OTel thumbnail icon

Install Collector

Step-by-step instructions for installing the OpenTelemetry collector on Linux, Windows, macOS, and more.

- - OTel thumbnail icon + OTel thumbnail icon

Data Source and Configurations

Collect logs, metrics, and tracing data, as well as how to add configurations for the OpenTelemetry collector.

@@ -52,8 +51,7 @@ In this section, we'll introduce the following concepts:
- - OTel thumbnail icon + OTel thumbnail icon

Remote Management

Learn about remote management of OpenTelemetry collectors.

@@ -61,8 +59,7 @@ In this section, we'll introduce the following concepts:
- - OTel thumbnail icon + OTel thumbnail icon

View Details About an OpenTelemetry Collector

Learn how to view details about an OpenTelemetry Collector.

@@ -70,8 +67,7 @@ In this section, we'll introduce the following concepts:
- - OTel thumbnail icon + OTel thumbnail icon

Auto Discovery

Enable Auto Discovery to detect services that are installed on the server on which the collector is running.

@@ -79,14 +75,13 @@ In this section, we'll introduce the following concepts:
- OTel thumbnail icon

Performance Benchmarks

+ OTel thumbnail icon

Performance Benchmarks

Collect data to establish performance benchmarks.

- - OTel thumbnail icon + OTel thumbnail icon

String Hashing and Masking

Perform string hashing and masking operations using the Transform Processor and OTTL in OpenTelemetry.

@@ -94,19 +89,19 @@ In this section, we'll introduce the following concepts:
- OTel thumbnail icon

Troubleshooting

+ OTel thumbnail icon

Troubleshooting

Find solutions to common issues with the OpenTelemetry collector.

- OTel thumbnail icon

Sumo Logic OTel

+ OTel thumbnail icon

Sumo Logic OTel

Understand the relationship between the Sumo Logic OpenTelemetry Collector and the OpenTelemetry upstream project.

- OTel thumbnail icon

FAQ

+ OTel thumbnail icon

FAQ

Find answers to frequently asked questions about the OpenTelemetry collector.

diff --git a/docs/send-data/opentelemetry-collector/install-collector/index.md b/docs/send-data/opentelemetry-collector/install-collector/index.md index d81b6b71be..335cfea569 100644 --- a/docs/send-data/opentelemetry-collector/install-collector/index.md +++ b/docs/send-data/opentelemetry-collector/install-collector/index.md @@ -10,37 +10,37 @@ Learn how to install the Sumo Logic OpenTelemetry Collector on various platforms
- Thumbnail icon

Install Collector on Linux

+ Thumbnail icon

Install Collector on Linux

Install the OpenTelemetry collector on Linux.

- macOS

Install Collector on macOS

+ macOS

Install Collector on macOS

Install the OpenTelemetry collector on macOS.

- thumbnail icon

Install Collector on Windows

+ thumbnail icon

Install Collector on Windows

Install the OpenTelemetry collector on Windows.

- ansible

Install Collector on Ansible

+ ansible

Install Collector on Ansible

Install the OpenTelemetry collector on Ansible.

- puppet icon

Install Collector on Puppet

+ puppet icon

Install Collector on Puppet

Install the OpenTelemetry collector on Puppet.

- chef

Install Collector on Chef

+ chef

Install Collector on Chef

Install the OpenTelemetry collector on Chef.

diff --git a/docs/send-data/opentelemetry-collector/remote-management/index.md b/docs/send-data/opentelemetry-collector/remote-management/index.md index 410ec4655b..65703d692a 100644 --- a/docs/send-data/opentelemetry-collector/remote-management/index.md +++ b/docs/send-data/opentelemetry-collector/remote-management/index.md @@ -54,19 +54,19 @@ In this section, we'll introduce the following concepts:
- OTel thumbnail icon

Source Templates

+ OTel thumbnail icon

Source Templates

Learn how to create and modify your OpenTelemetry Remote Management source templates to optimize data collection and configuration.

- OTel thumbnail icon

Processing Rules

+ OTel thumbnail icon

Processing Rules

Discover how to apply processing rules for an OpenTelemetry agent using remote management source templates to enhance data handling.

- OTel thumbnail icon

Troubleshooting

+ OTel thumbnail icon

Troubleshooting

Find solutions to common issues with the OpenTelemetry collector remote management.

diff --git a/docs/send-data/opentelemetry-collector/remote-management/processing-rules/index.md b/docs/send-data/opentelemetry-collector/remote-management/processing-rules/index.md index a99b1cd0d2..51bb77c886 100644 --- a/docs/send-data/opentelemetry-collector/remote-management/processing-rules/index.md +++ b/docs/send-data/opentelemetry-collector/remote-management/processing-rules/index.md @@ -21,19 +21,19 @@ In this section, we'll introduce the following concepts:
- icon

OTRM Include and Exclude Rules

+ icon

OTRM Include and Exclude Rules

Use OTRM include and exclude processing rules to specify which data you want to send to Sumo Logic.

- icon

OTRM Mask Rules

+ icon

OTRM Mask Rules

Create an OTRM mask rule to replace an expression with a mask string.

- icon

OTRM Windows Source Template Mask Rules

+ icon

OTRM Windows Source Template Mask Rules

Create an OTRM Windows source template mask rule to replace an expression with a mask string.

diff --git a/docs/send-data/opentelemetry-collector/remote-management/source-templates/index.md b/docs/send-data/opentelemetry-collector/remote-management/source-templates/index.md index 4700be505d..2e83554791 100644 --- a/docs/send-data/opentelemetry-collector/remote-management/source-templates/index.md +++ b/docs/send-data/opentelemetry-collector/remote-management/source-templates/index.md @@ -13,88 +13,88 @@ In this section, we'll show you how to set up source templates for the following
- OTel thumbnail icon

Managing Source Templates

Learn how to create and modify OTel remote management source templates.

+ OTel thumbnail icon

Managing Source Templates

Learn how to create and modify OTel remote management source templates.

- Thumbnail icon

Apache

Learn how to configure our OTel Apache source template.

+ Thumbnail icon

Apache

Learn how to configure our OTel Apache source template.

- Thumbnail icon

Docker

Learn how to configure our OTel Docker source template.

+ Thumbnail icon

Docker

Learn how to configure our OTel Docker source template.

- Thumbnail icon

Elasticsearch

Learn how to configure our OTel Elasticsearch source template.

+ Thumbnail icon

Elasticsearch

Learn how to configure our OTel Elasticsearch source template.

- icon

Kafka

Learn how to configure our OTel Kafka source template.

+ icon

Kafka

Learn how to configure our OTel Kafka source template.

- Thumbnail icon

Linux

Learn how to configure our OTel Linux source template.

+ Thumbnail icon

Linux

Learn how to configure our OTel Linux source template.

- OTel thumbnail icon

Local File

Learn how to configure our OTel Local File source template.

+ OTel thumbnail icon

Local File

Learn how to configure our OTel Local File source template.

- Thumbnail icon

Mac

Learn how to configure our OTel Mac source template.

+ Thumbnail icon

Mac

Learn how to configure our OTel Mac source template.

- Thumbnail icon

MySQL

Learn how to configure our OTel MySQL source template.

+ Thumbnail icon

MySQL

Learn how to configure our OTel MySQL source template.

- Thumbnail icon

Nginx

Learn how to configure our OTel Nginx source template.

+ Thumbnail icon

Nginx

Learn how to configure our OTel Nginx source template.

- Thumbnail icon

PostgreSQL

Learn how to configure our OTel PostgreSQL source template.

+ Thumbnail icon

PostgreSQL

Learn how to configure our OTel PostgreSQL source template.

- Thumbnail icon

RabbitMQ

Learn how to configure our OTel RabbitMQ source template.

+ Thumbnail icon

RabbitMQ

Learn how to configure our OTel RabbitMQ source template.

- Thumbnail icon

Redis

Learn how to configure our OTel Redis source template.

+ Thumbnail icon

Redis

Learn how to configure our OTel Redis source template.

- OTel thumbnail icon

Syslog

Learn how to configure our OTel Syslog source template.

+ OTel thumbnail icon

Syslog

Learn how to configure our OTel Syslog source template.

- Thumbnail icon

Windows

Learn how to configure our OTel Windows source template.

+ Thumbnail icon

Windows

Learn how to configure our OTel Windows source template.

- Thumbnail icon

Timestamps, Time Zones, and Date Formats

Learn how Sumo Logic manages timestamps, time zones, and dates.

+ Thumbnail icon

Timestamps, Time Zones, and Date Formats

Learn how Sumo Logic manages timestamps, time zones, and dates.

- Thumbnail icon

Setting Environment Variables with Secret Values for Source Templates

Learn about the steps for setting environment variable with secret value.

+ Thumbnail icon

Setting Environment Variables with Secret Values for Source Templates

Learn about the steps for setting environment variable with secret value.

diff --git a/docs/send-data/reference-information/index.md b/docs/send-data/reference-information/index.md index 23d6b14f5f..db170a4d87 100644 --- a/docs/send-data/reference-information/index.md +++ b/docs/send-data/reference-information/index.md @@ -13,31 +13,31 @@ In this section, we'll introduce the following concepts:
- icon

Using Wildcards in Paths

+ icon

Using Wildcards in Paths

Use wildcards in the Source path to collect all files of a certain type.

- icon

Collecting Multiline Logs

+ icon

Collecting Multiline Logs

Detect log boundaries automatically or with a regular expression.

- icon

Metadata Naming Conventions

+ icon

Metadata Naming Conventions

Establish naming conventions for your deployment's sources, collectors, and metadata.

- icon

Source Log Encoding

+ icon

Source Log Encoding

The log encoding supported by Sumo Logic depends on the Source that you use.