diff --git a/.github/workflows/pr.yml b/.github/workflows/pr.yml index 13fd112067..c1d29fc96b 100644 --- a/.github/workflows/pr.yml +++ b/.github/workflows/pr.yml @@ -36,6 +36,17 @@ jobs: run: yarn install --frozen-lockfile - name: Build the Docusaurus site run: yarn build + deploy-to-review: + uses: SumoLogic/sumologic-documentation/.github/workflows/build_and_deploy.yml@main + with: + hostname: https://d2t1s0ah22jxsa.cloudfront.net + base_url: /${{ github.ref_name }}/ + environment: review/${{ github.ref_name }} + secrets: + S3_BUCKET_NAME: ${{ secrets.REVIEW_S3_BUCKET_NAME }} + CLOUDFRONT_DISTRIBUTION_ID: ${{ secrets.REVIEW_CLOUDFRONT_DISTRIBUTION_ID }} + AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} + AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} spellcheck: runs-on: ubuntu-latest steps: diff --git a/.github/workflows/review.yml b/.github/workflows/review.yml new file mode 100644 index 0000000000..1d8a610c4e --- /dev/null +++ b/.github/workflows/review.yml @@ -0,0 +1,19 @@ +name: deploy-to-review + +on: workflow_dispatch + +permissions: + contents: read + +jobs: + deploy-to-review: + uses: SumoLogic/sumologic-documentation/.github/workflows/build_and_deploy.yml@main + with: + hostname: https://d2t1s0ah22jxsa.cloudfront.net + base_url: /${{ github.ref_name }}/ + environment: review/${{ github.ref_name }} + secrets: + S3_BUCKET_NAME: ${{ secrets.REVIEW_S3_BUCKET_NAME }} + CLOUDFRONT_DISTRIBUTION_ID: ${{ secrets.REVIEW_CLOUDFRONT_DISTRIBUTION_ID }} + AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} + AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} diff --git a/docs/alerts/index.md b/docs/alerts/index.md index 70c294d347..a22cb23375 100644 --- a/docs/alerts/index.md +++ b/docs/alerts/index.md @@ -11,19 +11,19 @@ Sumo Logic offers several alerting features. See the topics below for details on
Create saved searches that are executed continuously on a schedule you set, monitoring your stack.
Learn about the feature differences between Monitors and Scheduled Searches.
Use Alert Variables as parameters to customize the JSON payload object of your alert notifications.
Get contextual insights about triggered alerts to minimize the time needed to investigate and resolve application failures.
This topic lists the common FAQs regarding Alert Response.
Customize how your alerts are generated from monitors by specifying a grouping condition based on specific fields.
Pause alert notifications from monitors according to the schedule that you define.
Add Scheduled Searches that monitor log ingestion and send alerts.
Learn how to use Automation Service playbooks with monitors.
Learn how to add alerts and schedule search to run it at a regular scheduled time.
Learn how to create a Scheduled Search email alert.
Learn how to edit or cancel a Scheduled Search at any time.
Learn how to save the results to an Index after creating a Scheduled Search email alert.
Learn how to save the results of a Scheduled Search to a Lookup Table.
Learn how to create a Scheduled Search that will trigger a Cloud SIEM Signal.
Learn how to set up a ServiceNow Security Incident Webhook connection and create scheduled searches.
Learn how to launch ad hoc investigations directly from search results in Sumo Logic.
Learn how to set up scheduled searches for ServiceNow integration.
Learn how to set up connections for ServiceNow integration.
Get your API credentials and endpoint URL to start using the Sumo Logic APIs.
Learn how to send Traces to Sumo Logic in AWS, Kubernetes, and other environments.
OpenTelemetry provides a wide range of componentry to get you started with distributed tracing.
Understand how users interact with the digital interfaces of your business.
Learn how to collect Traces and RUM metrics from a browser using a RUM HTTP Traces Source.
Use RUM Dashboards to gain visibility into application performance and end-user activity.
Link your traces and logs to better understand your environment.
Create and apply custom rules to filter and shape your tracing data.
Learn how to modify the attributes of your spans.
Learn how to install an OpenTelemetry Collector and collect traces in AWS environments.
Learn how to install the Sumo Logic Kubernetes Collection and send traces using OpenTelemetry.
Learn how to leverage OpenTelemetry standards and start collecting Traces.
Linking together your Sumo Logic traces and logs will provide you a broad and deep understanding of your environment.
Learn how to create and apply custom rules to shape tracing data and specify which data to send to Sumo Logic.
Learn how to modify span attributes to enhance diagnostic data details, remove redundant information, and mask sensitive information before they leave your site.
Get up and running quickly with and explore how your application is behaving with Trace analytics.
Learn how to search and investigate your traces, trace views, and trace events.
View your application topology and investigate microservice interactions.
Explore and create Tracing dashboards, install apps, and more.
Learn how to use the Spans page to explore your span data.
Use our Search Query Language to gain valuable insight into your traces.
Learn how to link logs and traces, modify span attributes, and mask sensitive site information.
Provides an introduction to Cloud SOAR for analysts and administrators.
Compare the features of Cloud SOAR with the Automation Service.
Setup and configuration options for the Cloud SOAR platform.
Learn about features of the legacy Cloud SOAR architecture.
Learn about features of the legacy Cloud SOAR Global Functions menu.
Learn about features of the legacy Cloud SOAR main menu.
Learn about features of the legacy Cloud SOAR automated real-time incident management and threat response.
Learn about features of legacy Cloud SOAR automation.
Full-featured instance of legacy Cloud SOAR designed for internal MSSP use.
Learn how to access legacy Cloud SOAR APIs and API documentation.
Learn about network blocks, their purpose, and instructions for setting them up and using them.
+Learn about Network Blocks, their purpose, and instructions for setting them up and using them.
Learn how to create a custom tag schema in Cloud SIEM.
Learn how manage custom threat intelligence sources.
Learn how to issue a notification to another service when certain events occur in Cloud SIEM.
Learn to query an external system for details about an entity, IOC, or data encountered in a record.
Learn about retention periods for different types of Cloud SIEM data.
Learn how to search the Audit Event Index for Cloud SIEM log events.
Learn how to create and manage user accounts and roles for Cloud SIEM.
Learn how to extract Inventory Data from logs in Sumo Logic and send it to Cloud SIEM.
Learn how to use a saved Sumo Logic search to populate a Lookup Table with Cloud SIEM inventory data.
Learn how to create and manage custom insight resolutions.
Learn how to create and manage custom insight statuses.
Learn how to use Sensor Zones to distinguish between Cloud SIEM entities that have the same IP address.
Learn about Inventory Sources and the Inventory Data they collect.
Learn how well you are prepared to detect adversary attacks based on the tactics and techniques in the MITRE ATT&CK Enterprise Matrix.
Get an overview of how the Automation Service allows you to automate smart actions, including enrichments and notifications.
Learn how to create automations that run playbooks to add enrichments and create notifications for either insights or entities.
See examples that show you how to create automations for different situations.
Learn basic concepts about Cloud SIEM for security analysts.
Learn basic concepts about Cloud SIEM for administrators.
Learn how to use the Heads Up Display to perform threat investigations.
Learn how Cloud SIEM correlates signals by entity to create insights.
Learn about the contents of the insights UI in Cloud SIEM.
See the out-of-the-box rules, schema, mappings, and parsers for Cloud SIEM.
Get up and running quickly with Cloud SIEM administrator tasks.
Learn how to start using Cloud SIEM for threat hunting.
Learn about Insight generation, working with Entities, and how to query Cloud SIEM Records.
Cloud SIEM integration with Sumo Logic and threat intel sources, and leveraging the Cloud SIEM Insight Enrichment Server.
Learn about creating a Match list and their usage in rules.
Learn how to configure automations to create notifications and enrichments in Cloud SIEM.
Learn how to set up user accounts and roles, Actions, Network Blocks, custom Insight status and sub-resolutions, and more.
Learn how to send Sumo Logic Source or Cloud-to-Cloud Connector log messages to Cloud SIEM to be transformed into records.
See the product and services that Cloud SIEM supports with log mappings and parsers.
Learn how to find what mappers Cloud SIEM provides for a product or service.
Configure Sumo Logic to send log messages to be processed by Cloud SIEM's system mapper.
Learn the sources available for ingesting data to Cloud SIEM.
Configure collection and ingestion of AWS ALB log messages from an S3 bucket to be parsed by Cloud SIEM.
Configure a CloudTrail source on a hosted collector to ingest CloudTrail log messages to be parsed by Cloud SIEM.
Configure an HTTP source to ingest AWS GuardDuty log messages and send them to Cloud SIEM's system parser.
Configure collection and ingestion of AWS Network Firewall log messages from an S3 bucket to be parsed by Cloud SIEM.
Configure collection and ingestion of VPC Flow logs from an S3 bucket to be parsed by Cloud SIEM.
Configure collection of Carbon Black Cloud logs messages from an S3 bucket to be parsed by Cloud SIEM.
Configure a syslog source to ingest Check Point Firewall log messages to be parsed by Cloud SIEM.
Configure a syslog source to ingest Cisco Meraki log messages to be parsed by Cloud SIEM Cisco.
Configure a syslog source to ingest Corelight Zeek log messages and send them to Cloud SIEM's log mapper.
Configure a syslog source to ingest Fortigate Firewall log messages to be parsed by Cloud SIEM.
Collect log messages from G Suite Alert Center to be parsed by Cloud SIEM.
Configure a syslog source to ingest Kemp LoadMaster messages to be parsed by Cloud SIEM.
Configure a syslog source to ingest Linux OS log messages to be parsed by Cloud SIEM.
Configure collection of Microsoft 365 log messages to be parsed by Cloud SIEM.
Configure an HTTP Source to ingest Microsoft Azure Activity Log messages and to be parsed by Cloud SIEM.
Configure collection of Windows Event Log messages and send them to the Cloud SIEM mapper.
Configure a syslog source to ingest Nginx Access log messages to be parsed by Cloud SIEM.
Configure collection of Palo Alto Firewall log messages to be parsed by Cloud SIEM's system parser.
Learn how to collect SentinelOne log messages and send them to be ingested by Cloud SIEM.
Lean how to collect Signal Sciences WAF log messages and sending them to Sumo Logic to be ingested by Cloud SIEM.
Configure a Syslog source to collect and send Symantec Proxy Secure Gateway (ProxySG) log messages to Cloud SIEM.
Configure collection of ZScaler NSS log messages to be parsed by Cloud SIEM's system parser for ZScaler NSS.
Configure an HTTP source to ingest Zscaler Private Access log messages and send them to Cloud SIEM's system parser.
Learn how to automatically enrich Cloud SIEM insights.
Learn how to enrich signals based on queries it runs against VirusTotal.
Learn to install and configure the integration between Sumo Logic Cloud SIEM and ServiceNow's SIR.
Learn how enrichments can add information to signals, entities, and insights.
Learn about match lists, their purpose, usage, and how to create them.
Learn how to define custom columns for use in match lists.
Learn what record fields a match list with a given target column will be compared to.
Learn how to identify specific entities that should be treated differently during Cloud SIEM rule processing.
Learn to suppress signals that contain a particular indicator value in any of the signal's records.
Learn how to configure the detection window and the threshold activity score for insight generation.
Learn how to triage and prioritize insights.
Learn about all the entities in Cloud SIEM and their activity scores.
Learn how to adjust the severity of signals for specific entities.
Learn how to automatically group entities in terms of criteria like name or IP address.
Learn how to normalize the names of users and hosts (machines) in your environment.
Learn how to view records associated with a signal in Cloud SIEM.
Learn about ways to suppress and exclude Cloud SIEM signals from the insight generation process.
Learn to search the Sumo Logic platform for records and signals that have been forwarded from Cloud SIEM.
Learn how to add context to Cloud SIEM items, and search and filter items by tag.
Learn about Cloud SIEM rules, rules syntax, and how to write rules.
Learn about Cloud SIEM rules statuses and how to address rules in a degraded or failed state.
Learn how to plan a custom rule and prototype rule expressions.
Detect activities that compromise accounts using authentication logs.
Learn about Cloud SIEM’s built-in normalized threat rules.
Learn how to tailor global (built-in) rules in Cloud SIEM.
Learn how Cloud SIEM transforms incoming raw messages into records.
Learn about Cloud SIEM schema attributes.
Learn what Cloud SIEM schema attributes you can map to records.
Parsing is the first step in the Cloud SIEM record processing pipeline.
Set up schema fields with an enforced, Cloud SIEM-defined output.
Set up field mappings for messages that you want to be processed by Cloud SIEM's normalized threat rules.
Learn how to use the Parser Editor to configure and test a custom parser.
Learn how to import YARA rules from GitHub into Cloud SIEM.
Learn how to troubleshoot problems with parsers.
+Learn how to collect Zeek (Bro) logs and ingest them to Cloud SIEM.
Learn about where to download the Cloud SIEM Network Sensor that's specific to your Cloud SIEM deployment.
Learn about how to deploy and configure a Cloud SIEM Network Sensor.
Learn how to troubleshoot problems with the Cloud SIEM Network Sensor.
Learn how to collect Log Sensor status and data to support troubleshooting efforts.
Learn about the benefits of Sumo Logic dashboards and how they seamlessly integrate logs, metrics, and traces data.
Create your own custom dashboards and add charts.
Learn how to migrate data from our legacy dashboards solution.
Learn about the various Dashboard panels and the types of data best suited for each.
Learn how to quickly link dashboards together to view related data.
Monitoring dashboards give you an easy way to view and navigate the hierarchy of your environment.
Learn how to set dashboard and panel time ranges.
Use dashboards to investigate root causes of a spike of interest.
Learn how to create charts that locate deviations and outliers in a time series.
Learn about the restrictions when you use operators with dashboards.
Learn how to share a custom dashboard outside your organization.
Before diving in, check out our Sumo Logic overview and micro lessons.
Account settings and credentials.
+Account settings, access keys, and credentials.
A guide to the Sumo Logic integration for Amazon AppStream 2.0.
A guide to the Sumo Logic integration for AWS Certificate Manager.
A guide to the Sumo Logic integration for AWS Private Certificate Authority.
A guide to the Sumo Logic app Amazon EKS Control Plane.
A guide to the Sumo Logic app for Amazon GuardDuty Benchmark.
A guide to the Sumo Logic app for GI for Amazon GuardDuty.
A guide to the Sumo Logic app for Amazon Inspector App Classic.
A guide to our app for Amazon Kinesis - Streams.
Learn about the collection process for the Amazon OpenSearch Service.
A guide to the Sumo Logic app for AWS Network Load Balancer.
A guide to our app for Route53 Resolver Security.
A guide to our PCI app for VPC Flow Logs.
A guide to the GI for AWS CloudTrail SecOps app.
A guide to the GI for AWS CloudTrail DevOps app.
A guide to the Sumo Logic app for AWS Security Hub CSPM.
A guide to our CIS AWS Foundations Benchmark app.
A guide to the Sumo Logic app for AWS Threat Intel.
A guide to Amazon GuardDuty Cloud Security Monitoring and Analytics.
A guide to the Sumo Logic app for Amazon CloudTrail - Cloud Security Monitoring and Analytics
A guide to the Sumo Logic app for Linux Cloud Security Monitoring and Analytics via OpenTelemetry filelog receiver.
A guide to the Sumo Logic app for Palo Alto Firewall 9 - Cloud Security Monitoring and Analytics.
A guide to the Sumo Logic app for Palo Alto Firewall 10 - Cloud Security Monitoring and Analytics.
A guide to Sumo Logic app for Docker Community Edition.
A guide to the Sumo Logic app for Kubernetes Control Pane.
A guide to the Sumo Logic app for VMware Tanzu Application Service.
Monitor the availability, performance, health, and resource utilization of your Cassandra clusters.
+Monitor the availability, performance, health, and resource utilization of your Cassandra clusters.
+Monitor Couchbase cluster activity, errors, and health.
+ +Monitor Couchbase cluster activity, errors, and health.
+Monitor the availability, performance, health, and resource utilization of your Elasticsearch clusters.
-Monitor the availability, performance, and resource utilization of your MariaDB clusters.
-Monitor the availability, performance, health, and resource utilization of your Memcached clusters.
-Insight into overall system health, queries, logins, connections, errors and warnings, replication, and sharding.
-Visibility into the security posture of your clusters, performance KPIs, and database operational activities.
-Gain insight into the health of your MySQL servers, replication status, and errors.
-Track your performance, logins, connections, errors, and overall system health.
-Monitor the state of your Redis database cluster.
-A guide to the Sumo Logic app for GI for Apache.
A guide to the Sumo Logic app for GI for Apache Tomcat.
A guide to the Sumo Logic app for GI for Kubernetes DevOps.
A guide to the Sumo Logic app for GI for Nginx.
A guide to the Sumo Logic app for GI for Security Insights (Cloud SIEM).
A guide to the Sumo Logic app for GI for AWS CloudTrail DevOps.
A guide to the Sumo Logic app for GI for AWS CloudTrail SecOps.
A guide to the Sumo Logic app for GI for Amazon GuardDuty.
A guide to the Sumo Logic app for Google Cloud AlloyDB for PostgreSQL.
A guide to the Sumo Logic app for Google Cloud API Gateway.
A guide to the Sumo Logic app for Google Cloud Auto Scaler.
A guide to the Sumo Logic app for Google Cloud Backup for GKE.
A guide to the Sumo Logic app for Google Cloud BigQuery BI Engine.
A guide to the Sumo Logic app for Google Cloud Bigtable.
A guide to the Sumo Logic app for Google Cloud Certificate Authority Service.
A guide to the Sumo Logic app for Google Cloud Certificate Manager.
A guide to the Sumo Logic app for Google Cloud Composer.
A guide to the Sumo Logic app for Google Cloud Dataflow.
A guide to the Sumo Logic app for Google Cloud Dataproc Metastore.
A guide to the Sumo Logic app for Google Cloud Dataproc.
A guide to the Sumo Logic app for Google Cloud Datastore.
A guide to the Sumo Logic app for Google Cloud Datastream.
A guide to the Sumo Logic app for Google Cloud Filestore.
A guide to the Sumo Logic app for Google Cloud Firebase.
A guide to the Sumo Logic app for Google Cloud Firestore.
A guide to the Sumo Logic app for Google Cloud Fleet Engine.
A guide to the Sumo Logic app for Google Cloud Interconnect.
A guide to the Sumo Logic app for Google Cloud Logging.
A guide to the Sumo Logic app for Google Cloud Memorystore for Redis.
A guide to the Sumo Logic app for Google Cloud Net App Cloud Volumes Service.
A guide to the Sumo Logic app for Google Cloud Network Topology.
A guide to the Sumo Logic app forGoogle Cloud Pub Sub.
A guide to the Sumo Logic app for Google Cloud Security Command Center.
A guide to the Sumo Logic app for Google Cloud Spanner.
A guide to the Sumo Logic app for Google Cloud Traffic Director.
A guide to the Sumo Logic app for Google Cloud Vertex AI.
A guide to the Sumo Logic app for Google Cloud Firewall.
A guide to the Sumo Logic app for Google Cloud Bigtable.
A guide to the Sumo Logic app for Google Cloud Functions.
A guide to the Sumo Logic app for Google Cloud Load Balancing.
A guide to the Sumo Logic app for Google Cloud Storage.
A guide to the Sumo Logic app for Google Compute Engine.
A guide to the Sumo Logic app for Google Kubernetes Engine.
A guide to the Sumo Logic app for Host and Process Metrics.
A guide to the Sumo Logic app for Linux Performance.
Monitor your platforms and tools that support software development and automation.
A guide to Sumo Logic apps for container management, such as Kubernetes and Docker.
A guide to Sumo Logic apps for cloud security data source.
A guide to Sumo Logic apps for database servers, such as Oracle and MongoDB.
Sumo Logic apps for Global Intelligence provide valuable real-time security intelligence.
Learn about Sumo apps for Security and Threat Detection.
Use these apps to monitor your Sumo Logic org activities and data volume.
A guide to Sumo Logic apps for web servers, such as Apache, Nginx, and Squid Proxy.
Apps for various Sumo Logic account plans.
Community Ecosystem Apps Listing and program description.
Third-party Sumo Logic apps for partners including Auth0, CircleCI, and more.
Sumo Logic Partner Integrations are provided and supported by our partner network.
A guide to the Sumo Logic app for Active Directory JSON.
A guide to the Sumo Logic app for Active Directory (Legacy).
A guide to the Sumo Logic app for Active Directory Azure.
A guide to the Sumo Logic integration for Azure Analysis Services.
A guide to the Sumo Logic integration for Azure API Management.
A guide to the Sumo Logic integration for Azure App Configuration.
A guide to the Sumo Logic integration for Azure App Service Environment.
A guide to the Sumo Logic integration for Azure App Service Plan.
A guide to the Sumo Logic integration for Azure Application Gateway.
A guide to the Sumo Logic integration for Azure Cache for Redis.
A guide to the Sumo Logic integration for Azure Cognitive Search.
A guide to the Sumo Logic integration for Azure Cosmos DB for PostgreSQL.
A guide to the Sumo Logic integration for Azure Data Explorer.
A guide to the Sumo Logic integration for Azure Data Factory.
A guide to the Sumo Logic integration for Azure Database for MariaDB.
A guide to the Sumo Logic integration for Azure Database for MySQL.
A guide to the Sumo Logic integration for Azure Database for PostgreSQL.
A guide to the Sumo Logic integration for Azure Load Balancer.
A guide to the Sumo Logic integration for Azure Machine Learning.
A guide to the Sumo Logic integration for Azure Network Interface.
A guide to the Sumo Logic integration for Azure Notification Hubs.
A guide to the Sumo Logic integration for Azure IP Addresses.
A guide to the Sumo Logic integration for Azure Service Bus.
A guide to the Sumo Logic integration for Azure SQL Elastic Pool.
A guide to the Sumo Logic integration for Azure SQL Managed Instance.
A guide to the Sumo Logic integration for Azure Stream Analytics.
A guide to the Sumo Logic integration for Azure Synapse Analytics.
A guide to the Sumo Logic integration for Azure Virtual Network.
A guide to the Sumo Logic app for Azure Kubernetes Service Control Plane.
A guide to the Sumo Logic app for Azure Network Watcher.
A guide to the Sumo Logic app for Microsoft Dynamics 365 Customer Insights.
A guide to the Sumo Logic app for Microsoft Graph Identity Protection.
A guide to the Sumo Logic app for Microsoft Office Audit 365.
A guide to the Sumo Logic app for Microsoft SQL Server.
A guide to the Sumo Logic app for PCI Compliance for Windows JSON.
A guide to the Sumo Logic app for PCI Compliance for Linux.
A guide to the Sumo Logic app for PCI Compliance for Windows JSON using OpenTelemetry.
A guide to the Sumo Logic app for PCI Compliance for AWS CloudTrail(Legacy).
A guide to the Sumo Logic app for PCI Compliance for Amazon VPC Flow Logs.
A guide to the Sumo Logic app for PCI Compliance for Linux.
A guide to the Sumo Logic app for PCI Compliance for Palo Alto Networks 9.
A guide to the Sumo Logic app for PCI Compliance for Palo Alto Networks 10(Legacy).
A guide to the Sumo Logic app for PCI Compliance for Windows JSON.
List of vendors and products A-L that Sumo Logic integrates with.
List of vendors and products M-Z that Sumo Logic integrates with.
A guide to the Sumo Logic app for Akamai Security Events.
A guide to the Sumo Logic app for CrowdStrike.
A guide to the Sumo Logic app for Netskope Legacy Collection.
A guide to the Sumo Logic app for Palo Alto Networks 9.
A guide to the Sumo Logic app for Threat Intel Quick Analysis.
A guide to the Sumo Logic app for Trend Micro Deep Security.
A guide to the Sumo Logic app for Zscaler Internet Access.
A guide to the Sumo Logic app for Zscaler Private Access.
Provides a summary and detailed views of your account's data usage volume.
A guide to the Sumo Logic app for Enterprise Audit.
A guide to the Sumo Logic Log Analysis QuickStart app.
The Apache Tomcat app monitors server operations, assists in troubleshooting issues, and provides insight into website visitor behavior patterns across entire web server farms.
The Nginx Ingress app is a unified logs and metrics app that helps you monitor the availability, performance, health, and resource utilization of your Nginx Ingress web servers.
The Nginx Plus app is an unified logs and metrics app that helps you monitor the availability, performance, health and resource utilization of your Nginx Plus web servers.
The Nginx Plus Ingress app is a unified logs and metrics app that helps you monitor the availability, performance, health and resource utilization of your Nginx Plus Ingress web servers.
The Squid Proxy app is a unified logs and metrics app that helps you monitor activity in Squid Proxy.
Learn how to control your content and add important items to the Admin Recommended folder.
Learn how to modify or turn off alerts created by another user.
Learn how to parse the common fields in your Akamai Cloud Monitor log.
Learn how to parse the common fields in your Apache Access log.
Learn how to parse the common fields in your Apache Tomcat Access log.
Learn how to parse the Remote IP address, Method, Requested URL path, HTTP status code, Time Taken, and Bytes Sent.
Learn how to parse the common fields in your AWS CloudTrail log.
Learn how to parse the common fields in your AWS Elastic Load Balancing log.
Learn how to parse the common fields in your Amazon S3 Usage log.
Learn how to parse the common fields in your Cisco ASA log.
Learn how to create field extraction rules for CISCO FWSM.
Learn how to parse the common fields in your Microsoft IIS log.
Learn how to parse the common fields in your Palo Alto Networks log.
Learn how to parse the common fields in your Varnish log.
Learn about the recommended naming conventions for standard fields in Sumo Logic.
Learn how to instruct Sumo Logic to parse out fields automatically.
Learn how to change Field Extraction Rules.
Learn how to use FER Templates to parse common fields for various applications.
Learn how to create Field Extraction Rules for Safend.
Accelerates the search process by parsing fields as log messages are ingested.
Accelerate the search process by allowing Admins to filter a subset of the log messages in an index.
Learn about Sumo Logic account plans and types and about how to manage yours.
Allows you collaborate on apps, dashboards, and searches with specific users or roles.
Allows you to forward selected data to an external server or Amazon S3.
Learn how to archive selected data to an external server or Amazon S3.
Learn how to manage the ingestion of data by Sumo Logic.
Accelerate the search process for data subsets by functioning as a pre-aggregated index.
Get to know how much data your account is ingesting.
Get to know the volume of metric data points your account is ingesting.
Get a visual snapshot of the message history of your deployment.
Learn how to get visibility into how much data you are sending to Sumo Logic.
Learn how to control the daily volume of log data sent to Sumo Logic.
Add scheduled searches that monitor ingestion and send alerts.
Learn how to create and edit a Partition in an Index.
Learn how to view details about a Sumo Logic Partition.
Learn how to setup and configure the Flex app.
Learn how to create and edit a Partition in an Index.
Learn how to view details about a Sumo Logic partition.
Learn how to pause view stops new data from being Indexed.
Learn how to run a search against Indexed data in a Scheduled View.
Learn how to view data that's not up to date in the Scheduled View.
Get to know some tips for setting up Scheduled View queries.
Learn how to view a list of Scheduled Views configured for your org.
Collect event logs in plain text on account activities, such as account management, user activity, scheduled searches, and alerting.
Collect event logs in JSON format on account activities for a wide range of actions.
See Audit Event Log Definitions documentation for audited events.
Learn how to enhance security and secure sensitive data stored in Sumo Logic.
Learn how to set up and manage 2-Step Verification across your organization.
Learn how to set up and use 2-Step Verification for your user account.
Learn how to use Access Keys to securely register new Collectors or access Sumo Logic APIs.
Learn how to get event logs in JSON format on account activities.
Learn how to explicitly grant access to specific IP OR CIDR Addresses.
Learn how to set all newly created dashboards to run with the viewer's role access filter.
Learn how to address support issues when they arise.
Learn how to use Installation Tokens to register Installed Collectors.
Learn how to enable event logs on search usage and activities for your account.
Learn how to query the Search Audit Index for search usage and activities for your account.
Learn how to set the account password policy for any user in your organization.
Learn how to limit the number of open concurrent sessions by a user.
Learn how to specify the maximum web session timeout period that users in your org can select.
Learn how to enable SSO for users to access Sumo Logic.
Learn how to integrate Bitium with Sumo Logic's SAML for SSO login.
Learn how to integrate Sumo Logic SAML with Google Apps IAM for SSO login.
Learn how to integrate Sumo Logic’s SAML 2.0 API with Okta for SSO login.
Learn how to integrate Sumo Logic with OneLogin for SSO login.
Learn how to configure AWS Single Sign-On for Sumo Logic.
Learn how to enable SSO for user access to Sumo Logic using Azure AD.
Learn how to manage Sumo Logic user permissions using ADFS and SAML.
Learn how to configure ADFS to authenticate Sumo Logic users.
Learn how to use the Debug Mode to troubleshoot SAML issues.
Learn how to use roles to determine the functions that users can perform in Sumo Logic and the data they can view.
Learn how to grant access and capabilities to data in Sumo Logic using roles.
Learn how to create custom roles for your users.
Learn how to assign various capabilities while creating user roles.
Learn how to define a search filter for a role.
Learn how to change the default assignment of roles to users.
Learn how to change a user's email address.
Learn how to unlock a user's locked account.
Learn how to manually unlock an account before the expiry of the default lockout period.
Learn how to deactivate a user without removing the user account or reactivate a deactivated user.
Learn how to remove a user permanently by deleting the user account.
Learn the steps to take when removing a user from your Org's Sumo Logic Account.
Learn how to log into multiple Sumo Logic accounts using a single username and password.
Get to know several links in the Help menu that securely connect to third-party services.
Use Metrics for monitoring, troubleshooting, and identifying root causes.
Metric ingestion and storage, metric data limits, and metrics throttling.
The Metrics rules editor allows you to tag metrics with data derived from the metric identifier.
Control how long raw metrics are retained.
View detailed information about your metrics data consumption.
Kubernetes metrics are collected when you deploy our Kubernetes collection.
Get to know the volume of metrics that you are ingesting into Sumo Logic.
Learn how to remove the limits set on the number of ingested time series.
Learn about how Sumo Logic stores raw and rolled up metrics data.
Get information on how Sumo Logic throttles metric when metrics ingestion exceeds your DPM limit.
Learn how to fill empty time slices in metric query results with a derived data point.
Learn how to calculate the φ-quantile from the buckets of a histogram.
Learn how to set up an autocomplete dropdown dialog that makes query writing easier.
Learn to add comments to a metrics query and comment out parts of the query using comment formatting.
Learn to display a tip for how to use an aggregation clause to produce more readable results.
Learn about warnings and error messages presented for long-running metric queries and metric queries.
Learn about the features, benefits, and resources created by the AWS Observability solution.
Learn how to simplify the monitoring and troubleshooting of your AWS cloud infrastructure.
Learn about adding a new AWS service, updating existing host metrics, and using AWS Control Tower.
Familiarize yourself with information about the AWS Observability Solution apps.
Learn how to get insights into API Gateway tasks while accepting and processing concurrent API calls.
Learn how to gain visibility into the health of your Application Load Balancer and target groups.
Learn how to gain visibility into the health of your Classic Load Balancer.
Learn how to get operational insights into DynamoDB instances across your infrastructure.
Learn how to display your EC2 instance metrics (CloudWatch) using predefined dashboards.
Learn to collect local host metrics and display them using predefined search queries and dashboards.
Learn how to utilize Lambda Logs and Metrics from CloudWatch, and CloudTrail Lambda Data Events.
Learn how to get insights to ensure that your Network Load-Balancers are operating as expected.
Learn how to get visibility into your Amazon RDS metrics collected with a CloudWatch metrics source.
Learn to manage your clusters, and monitor capacity and resource utilization of ECS components.
Learn to set up, run, and scale popular open-source compatible in-memory data stores in the cloud.
Learn how to get insights into the operations and utilization of your SNS service.
A guide to the Sumo Logic app for GI for AWS CloudTrail DevOps.
Learn how to update the AWS Observability view hierarchy and existing host metrics.
Learn how to update the AWS Observability solution with AWS Control Tower-managed Accounts.
Use collectors to start sending critical signals to Sumo Logic.
Simplify monitoring and troubleshooting of your AWS Cloud infrastructure.
End-to-end solution for deploying and monitoring your K8s environment.
Create Reliability Management dashboards, configure queries, set SLIs, and more.
Overview of Kubernetes collection process for Kubernetes environments, and configuring logs and metrics collection.
Sumo Logic provides Kubernetes apps across a variety of platforms, each with a set of predefined dashboards.
Sumo Logic monitors provide you with out-of-box alerts ensure that your Kubernetes cluster is available and performing well.
Learn more about effectively monitoring your Kubernetes environment architecture with Sumo Logic.
Learn which Kubernetes metrics are collected when you deploy our [sumologic-kubernetes-collection](/docs/send-data/kubernetes/install-helm-chart).
Kubernetes views allow you to quickly locate an object in your physical K8s stack that needs to be debugged.
This page provides instruction for setting up the Software Development Optimization Solution including manual, Terraform, and Atlassian Marketplace.
Learn how to install the SDO app and use pre-configured searches and dashboards that provide insights into your DevOps pipeline.
Learn how to send build and deploy events to Sumo Logic from Jenkins Pipeline.
Learn which Tools and Schema are supported by Software Development Optimization Solution.
Learn how to integrate other tools with the Software Development Optimization Solution.
Learn how to use App Central to get new applications and tools.
Learn about the available playbooks in App Central.
Learn how to configure authentication for integrations.
See all the integrations available for installation in App Central.
Get an overview of how the Automation Service allows you to automate actions.
Learn how integrations are connectors to applications from industry-leading network and security vendors.
Learn how to search the Audit Event Index for log events in the Automation Service and Cloud SOAR.
Learn how to install a bridge for the Automation Service to allow running custom actions or integrations in an on-premise environment.
Learn how to use the Automation Service to automate actions.
Compare log data from different time periods to detect major changes or anomalies.
Allows you to quickly assess activity patterns for things like a range of devices or traffic on a website.
Group messages with similar structures and patterns, providing insight into specific keywords or time range.
Clusters JSON logs based on keys providing an at-a-glance summary of patterns in logs based on their schema while ignoring specific values.
Displays a numerical score for a signature, predicting which signatures could be most meaningful.
Influence the algorithm by editing a signature to increase or decrease your results granularity.
Learn to get the most out of searches using these easy-to-follow rules.
Learn how to view fields from JSON logs without having to manually specify parsing logic.
Learn how to define the scope of data for the query.
Learn about query syntax and how to construct a search.
Learn how to simplify searches for your users by giving them a few easy input choices.
Learn how to adjust the time range for searches and metrics to get the most useful information.
Learn how to display search data in the order that Collectors received the messages.
Learn how to create a custom URL to launch a log search in Sumo Logic.
Sumo Logic search syntax uses logical and familiar operators allowing you to create ad hoc queries quickly and efficiently.
Details on building a search - best practices, syntax, time range, and efficient searches.
Understand the basic components of the Search window and how they can help you investigate your issues.
Sumo Logic queries can help track and diagnose common IT issues. Take a look at these Sumo Logic suggested searches.
Sumo Logic search syntax, based on a funnel concept, uses logical and familiar operators allowing you to create queries quickly.
Metadata tags are attached to your log messages at ingest, which is quite useful when you're searching log data.
In the Aggregates tab, you can view search results as a chart, such as a bar or column chart.
Learn how to add comments to a search query and comment out lines for notes.
Up to 100,000 rows can be exported as a CSV text file.
When a search is in progress, the options to Cancel or Pause the search appear.
Quickly start a search for a Collector, Source, or Source Category from the Manage Collection page.
Reference a field name that contains a special character.
The search autocomplete dropdown dialog offers suggestions to make query writing easier.
Learn how to search large log messages, which Sumo Logic slices into smaller message chunks.
Investigate events surrounding a message in your Messages list.
Learn how to share a link to search query results via email or IM.
Learn how to add a time range expression in the time range field when building a search query.
If your search results contain JSON logs, you can show or hide JSON format from the Messages tab.
Open and review traces from search log results.
Drilling down into a field from the Field Browser is seamless for non-aggregate queries.
Change the fields that are displayed in search results by showing or hiding in the Field Browser.
You can mark a saved search as a favorite so it appears in your Library.
Learn how to filter results based on a histogram time range.
Explore specific fields of interest in a search by displaying or hiding selected fields without having to parse them.
View the filter log-level distribution in your Histogram results.
Know about Log Message Inspector to view information for all the parameter values associated with the query.
Modify past searches by selecting text displayed in the Messages tab.
When you run a search query, messages display in the Message, Aggregates, and Summarize tabs.
When your search results are returned, your search terms are highlighted in the Messages tab.
Learn how to reduce system load by making your queries more specific.
The Preferences menu allows you to customize how messages are displayed.
You can use wildcards in full text searches.
Analyze and parse Apache access logs to gather insights on website visitor activity and server performance. Learn more.
Analyzes Apache error logs and extracts information to help diagnose and resolve application performance problems. Learn more.
Monitor and analyze Cisco ASA firewall log files to identify security threats and troubleshoot performance issues. Learn more.
Analyzes logs to monitor application and server performance, detect security threats, and troubleshoot issues. Learn more.
Monitors server performance, detects security threats, and resolves issues through event log analysis. Learn more.
Start here to begin exploring your data in Sumo Logic.
The extensive Sumo Logic query options help you gain valuable insight into your log messages.
Cheat sheets provide examples of useful search queries for different use cases.
Gain behavioral insight of your environment using LogReduce operators.
Learn about Lookup tables and the search operators you can use with them.
Learn how Logs Query Assist makes it easier to discover relevant fields and minimize errors.
Learn how to accelerate the search process to get query results in less time and improve productivity for forensic analysis and log management.
Optimize your search with partitions, which store your data in an index separate from the rest of your account's data.
Filter and evaluate conditions for a query when you may not be sure of the exact filter.
See a real-time live feed of log events for development and troubleshooting.
Allows you to start and use a Live Tail session from the command line.
Highlight keywords that appear in your running Live Tail.
You can change the preferences for Live Tail line spacing, message text size, and message color.
Start a Live Tail session from the Search page or the Live Tail page.
You can run two Live Tail sessions at a time per browser tab.
Troubleshooting tips for Sumo Logic Live Tail.
Learn about Lookup Tables and how to create and manage them.
Learn how to update, export, and share Lookup Tables.
Start here to begin exploring your data in Sumo Logic.
This cheat sheet helps you move from grep to searching with Sumo.
Learn about all available parsers, aggregators, search operators, and mathematical expressions.
View examples of useful IIS search queries for various use cases.
Use with a group operator and field name.
Select the most or least recent value within a group.
Available search operators in the Sumo Logic search query language.
Sumo Logic provides a number of ways to parse fields in your log messages.
Evaluate messages and place them into groups.
Overview of the expressions that create user-defined numeric, boolean, or string fields.
Use general mathematical expressions on numerical data extracted from log lines.
These operators check a numeric string and return a boolean value.
Allows you to extract nested fields and other complex data from log lines.
Allows you to extract values from JSON logs with most JSONPath expressions.
Parses strings and labels anchors as fields for use in subsequent aggregation functions.
Parses on previously extracted fields, or initial parsing on a metadata field value, like a collector or source.
Allows you to split strings into multiple strings and parse delimited log entries.
Allows you to get values from a log message by specifying the key paired with each value.
Forces results to also include messages that do not match any segment of the parse expression.
Extracts a date or time from a string and provides a timestamp in milliseconds.
Allows you to parse CSV-formatted log entries using a comma as the default delimiter.
Allows you to parse specified fields from an XML log using an XPath reference.
Use this to look up an Autonomous System Number (ASN) and organization name by IP address.
The `base64Decode` operator takes a base64 string and converts it to an ASCII string.
The `base64Encode` operator takes an ASCII string and converts it to a base64 string.
The `compare` operator can be used with the Time Compare button in the Sumo UI, which generates correct syntax and adds it to your aggregate query.
+The `compare` operator can be used with the Time Compare button in the Sumo UI, which generates correct syntax and adds it to your aggregate query.
The `fillmissing` operator allows you to specify groups that should be represented in data output.
The `formatDate` operator formats dates in log files as a string in a different format, such as U.S. or European date formatting.
With the Geo Lookup (Map) operator, Sumo Logic can match a parsed IPv4 or IPv6 address to its geographical location on a map.
The `hexToAscii` operator converts a hexadecimal string to an ASCII string.
The `ipv4ToNumber` operator converts an Internet Protocol version 4 (IPv4) IP address from the octet dot-decimal format to a decimal format.
The `isNull` operator checks a string and returns a boolean value, `isEmpty` if a string contains no characters, and `isBlank` if a string contains no characters, is only whitespace, and is null.
The `isPrivateIP` operator checks if an IPv4 address is private and returns a boolean.
The `isPublicIP` operator checks if an IPv4 address is public and returns a boolean.
The `isReservedIP` operator checks if an IPv4 address is reserved as defined by RFC 5735 and returns a boolean.
The `isValidIP` operator checks if the value is a valid IP address. The `isValidIPv4` and `isValidIPv6` operators check if the value is a valid IPv4 or IPv6 address, respectively.
Use the `jsonArrayContains` operator to determine whether a JSON array contains a particular item.
Use the `jsonArraySize` operator to determine the size of a JSON array.
The `lookup` (Classic) operator maps data in your log messages to meaningful information saved in Sumo or on an HTTPS server.
Use the `lookupContains` operator to determine whether a key exists in a lookup table. It will return a boolean value.
Most data in Sumo Logic is stored as a string data type. Metadata fields are stored as string data and parsed fields are by default parsed as string type data.
The `queryEndTime()` operator returns the end time of the search time range in milliseconds.
The `queryStartTime()` operator returns the start time of the search time range in milliseconds.
The `queryTimeRange()` operator returns the time duration for the query being executed in milliseconds.
The `rollingstd` operator finds the rolling standard deviation of a field, allowing you to identify changes over time.
The `save` (classic) operator works with the classic Lookup Tables feature.
The `sessionize` operator uses an extracted value from one log message to find correlating values in log messages from other systems.
The `substring` operator allows you to specify an offset that will output only part of a string, referred to as a substring.
The `timeslice` operator aggregates data by time period, so you can create bucketed results based on a fixed interval.
When you gather data using a join operator, you can slice data by time period using the `timeslice` operator.
The `toLowerCase` operator takes a string and converts it to all lower case letters.
Reduces a stream of events to a single event using a specified merge strategy.
Analyze transaction data such as website sign-ups and e-commerce activity.
Groups log messages that match on any fields you specify.
Learn basic concepts about Cloud Infrastructure Security.
Learn about our Cloud Infrastructure Security for AWS app.
Get an introduction to basic concepts of using Sumo Logic for security use cases.
Learn how to monitor security data and investigate incidents.
Learn about using your Sumo Logic environment as a security data lake.
Learn how to use Sumo Logic apps to assist with audit and compliance.
Learn about using Sumo Logic for application security.
Learn how to secure your cloud infrastructure.
Learn about event-based pipeline to ship block blob data from Azure Blob Storage to an HTTP source.
Learn about event-based pipeline to ship append blob data from Azure Blob Storage to an HTTP source.
Learn why log data is not flowing into Sumo Logic from Azure Blob Storage.
Configure Telegraf plugins to fetch metrics from your applications and send them to Sumo Logic.
Install Telegraf on a Kubernetes and Non-Kubernetes environment.
Configure Telegraf input plugins to collect metrics from an application or service.
Configure the Telegraf output plugin to send metrics to Sumo Logic.
Collect custom JMX metrics using the Jolokia agent and Telegraf.
Collect logs using a Collector Script, Lambda function, Amazon Kinesis, and CloudFormation.
Learn how to configure metrics collection for Amazon MSK.
Collect log events from CloudWatch Logs in real-time.
Collect application container logs from AWS ECS clusters launched with AWS Fargate.
Learn how to collect AWS Lambda logs using CloudWatch Logs.
Learn how to collect AWS Lambda logs, metrics, and spans.
Learn how AWS Lambda Extensions impact the performance and execution time of AWS Lambda functions.
Learn about event-based pipeline to ship monitoring data from Azure Blob Storage to an HTTP source.
Learn how to pull security event logs from Halo into Sumo Logic.
Export OCI Service logs, Audit logs, Application logs and Security logs.
Learn how to collect Logs from the Palo Alto Networks Cortex Data Lake.
Learn how to collect Prometheus Metrics in or outside Kubernetes using Telegraf.
Learn how to collect complex application logs generated by Ruby on Rails.
Learn about open-source solutions and resources for customers via GitHub.
Provides visibility for monitoring enterprise mobility management in your deployment.
Learn how to identify and solve emerging issues with predictive analysis and smart alerts.
Configure log collection for VMware vRealize Log Insight.
Search for a collector or source on the manage collection page.
Start/stop a collector and check collector status.
Pause sources from sending data to Sumo Logic.
Limit the amount of CPU processing a collector uses.
Processing rules filter and can forward data sent to Sumo Logic from a Source.
Data Forwarding rules forward data collected from an Installed Collector to non-Sumo Logic destinations.
With a hash rule, an expression you choose will be replaced by a hash code.
Use include and exclude processing rules to specify what kind of data is sent to Sumo Logic.
Use metrics processing rules to specify what metrics a metrics source are sen to Sumo Logic.
Get started configuring AWS Sources for Sumo Logic ingestion.
Before configuring your Source, enable access to your AWS product.
Sample path expressions you can use to collect data from Amazon Sources.
Add the Amazon S3 Audit Source to upload messages to Sumo Logic.
Define the waiting time between scans of the objects in your S3 bucket.
Distribute content to end-users with low latency and high data transfer speeds.
Gather metrics data from an Amazon resource.
Add the AWS ELB Source to upload messages to Sumo Logic.
Ingest logs from Amazon Kinesis Data Firehose.
Ingest CloudWatch metrics from Amazon Kinesis Data Firehose.
AWS GovCloud are specific regions authorized to a FedRAMP-High baseline.
Use CloudFormation to set up AWS products.
Add a Google Workspace Apps Audit Source to ingest audit logs from Google apps.
Export data collected by Stackdriver to Google Cloud Pub/Sub.
Get visibility into Google Cloud Platform infrastructure and managed services.
An HTTP Logs and Metrics Source is an endpoint for receiving log and metric data uploaded to a unique URL generated for the Source.
This guide provides instructions on uploading logs to an HTTP Source.
This guide provides instructions on uploading metrics to an HTTP Source.
You can generate a new URL for an HTTP Source at any time. Generating a new URL completely invalidates the old URL.
Set up Hosted Collectors so you can move data to Sumo Logic.
Collect from one of the many AWS products that we support.
Collect logs and events directly from SaaS and Cloud platforms.
Collect Audit Log content types to track and monitor usage of MS 365.
Configure a cloud syslog source to send data to Sumo Logic.
Our OpenTelemetry Distribution is a single unified agent to send Logs, Metrics, Traces, and more.
Installed collector is our proprietary agent that you can deploy in your environment to collect logs and some metrics sources.
Set up a Hosted Collector to collect data directly from cloud sources like AWS, GCP, and more without installing an agent.
Collect logs and metrics from a variety of other data sources.
Learn how to configure Installed and Hosted Collectors sources using JSON files.
Use wildcards in Source paths to collect all files of a certain type.
Static URLs provide download links to the most recent Collector versions.
Test access and connectivity from an installed Collector to the Sumo Logic service.
Parameters available when using the Collector's command line installer.
Define the waiting time between scans of the objects in your S3 bucket.
Troubleshoot issues that arise during collector installation.
Build a Collector into a Linux machine image.
Build a Collector into a Windows machine image.
Advanced settings for the UI installer.
Use the clobber flag when you're creating a new Collector that will use a name that is already in use.
Pass Collector config parameters during installation if the Debian or RPM option is used.
RUN_AS_USER
for a CollectorRUN_AS_USER
for a CollectorSpecify the user under whose account the Collector will run.
Enable SNI on Collectors to support third-party transparent proxy services.
Install a Collector on macOS or Windows if you need to use a specific JRE version.
Protect the log cache and configuration files for Installed Collectors.
Flag a Collector as ephemeral to delete it after being offline for 12 hours.
Install and configure a collector to gather and send data to Sumo Logic.
Customize your Installed Collector with these configuration parameters and options.
Track and collect forwarded events from a Windows Event Collector.
Collect log messages from the same machine where a collector is installed.
Collect local performance data from the Windows Performance Monitor.
Find Windows event channels to collect with a Local Windows Event Source.
Collect local performance data from the Windows Performance Monitor.
Add a streaming metrics source to collect Graphite, Carbon 2.0, or Prometheus metrics.
Detect when a log message spans multiple lines and then index it as a single message.
Configure a system for remote access by a Remote Windows Event Log Source.
Collect log messages remotely from where a collector is installed.
Collect inventory data from Active Directory Database.
Collect Windows event log entries from multiple remote systems.
Collect remote performance data from the Windows Performance Monitor.
This Script Action passes the results of a scheduled search to a script or program that runs on a machine.
Instructions for collecting metrics with the OpenTelemetry collector.
Instructions for collecting tracing data with the OpenTelemetry collector.
More OpenTelemetry collector configurations.
Step-by-step instructions for installing the OpenTelemetry collector on Linux, Windows, macOS, and more.
Find solutions to common issues with the OpenTelemetry collector.
Install the OpenTelemetry collector on Linux.
Install the OpenTelemetry collector on macOS.
Install the OpenTelemetry collector on Windows.
Install the OpenTelemetry collector on Ansible.
Install the OpenTelemetry collector on Puppet.
Install the OpenTelemetry collector on Chef.
Learn how to create and modify your OpenTelemetry Remote Management source templates to optimize data collection and configuration.
Discover how to apply processing rules for an OpenTelemetry agent using remote management source templates to enhance data handling.
Find solutions to common issues with the OpenTelemetry collector remote management.
Use OTRM include and exclude processing rules to specify which data you want to send to Sumo Logic.
Create an OTRM mask rule to replace an expression with a mask string.
Create an OTRM Windows source template mask rule to replace an expression with a mask string.
Learn how to create and modify OTel remote management source templates.
+Learn how to create and modify OTel remote management source templates.
Learn how to configure our OTel Elasticsearch source template.
+Learn how to configure our OTel Elasticsearch source template.
Learn how to configure our OTel Local File source template.
+Learn how to configure our OTel Local File source template.
Learn how to configure our OTel PostgreSQL source template.
+Learn how to configure our OTel PostgreSQL source template.
Manage timestamps, time zones, time and date ranges, and more.
Use wildcards in the Source path to collect all files of a certain type.
Detect log boundaries automatically or with a regular expression.
Establish naming conventions for your deployment's sources, collectors, and metadata.
The log encoding supported by Sumo Logic depends on the Source that you use.