diff --git a/blog-service/2025-04-21-manage.md b/blog-service/2025-04-21-manage.md new file mode 100644 index 0000000000..2727681c51 --- /dev/null +++ b/blog-service/2025-04-21-manage.md @@ -0,0 +1,21 @@ +--- +title: Sign in with Google SSO (Manage) +image: https://help.sumologic.com/img/sumo-square.png +keywords: + - onboarding + - authentication + - sign in + - trial + - sso +hide_table_of_contents: true +--- + +We’ve made it even easier to access Sumo Logic: you can now sign in using your Google account credentials. + +If your email address is linked to a Google account, just click **Continue with Google** on the sign-in page to authenticate. No setup required. + +You can also use Google SSO when signing up for a new Sumo Logic account. + +Organizations using SAML or other identity providers will continue to sign in as usual. + +[Learn more](/docs/get-started/sign-up/). diff --git a/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md b/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md index 324456175d..8ecc38e053 100644 --- a/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md +++ b/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md @@ -55,6 +55,6 @@ The injection allows you to click a link from the Trace View tab and launch a se ``` -## Additional information +## Additional resources * [NLog.DiagnosticSource | GitHub](https://github.com/NLog/NLog.DiagnosticSource) diff --git a/docs/dashboards/drill-down-to-discover-root-causes.md b/docs/dashboards/drill-down-to-discover-root-causes.md index deda42f7aa..1eecc7adba 100644 --- a/docs/dashboards/drill-down-to-discover-root-causes.md +++ b/docs/dashboards/drill-down-to-discover-root-causes.md @@ -19,7 +19,7 @@ Not all error states will provide related content links. To discover and view related content, do the following: -1. Log in to Sumo Logic and open the Dashboard. +1. Sign in to Sumo Logic and open the Dashboard. 1. Select the graph data point you are interested in. In the following screenshot, we selected a bar in a bar chart. A panel appears on the right of the window with details and a list of related content links.
details pane ## Summary tab diff --git a/docs/get-started/quickstart.md b/docs/get-started/quickstart.md index 0ec6f3583c..de7ddeb7e4 100644 --- a/docs/get-started/quickstart.md +++ b/docs/get-started/quickstart.md @@ -58,7 +58,7 @@ OpenTelemetry is our preferred collector unless you're configuring security data #### OpenTelemetry Collector -1. Log in to Sumo Logic. +1. Sign in to Sumo Logic. 1. In the main Sumo Logic menu, select **App Catalog**. 1. Click the app you'd like to install. 1. Click the **Add a New Collector** option during app installation. @@ -69,7 +69,7 @@ OpenTelemetry is our preferred collector unless you're configuring security data #### Installed and Hosted Collector -1. Log in to Sumo Logic. +1. Sign in to Sumo Logic. 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**. 1. Select **Add Collector**.
Add Collector 1. Choose from our [Hosted Collector](/docs/send-data/hosted-collectors) (web-hosted) or [Installed Collector](/docs/send-data/installed-collectors) (locally installed on your machine). @@ -137,14 +137,14 @@ From the Sumo Logic Home page, click the **Learn** tab to access: Don't just learn it - master it! Get recognized as a Sumo Logic expert by completing the courses in the [Sumo Logic Certification Program](/docs/get-started/training-certification-faq/#what-certifications-does-sumo-logic-offer). We’re happy to help you get certified right from the product. -## More Resources - -:::sumo Need help? -Contact us at the [Sumo Dojo Slack](https://sumodojo.slack.com/) or [submit a support ticket](https://support.sumologic.com/support/s). -::: +## Additional resources * [Choosing a Sumo Logic Collector and Source](/docs/send-data/choose-collector-source/) -* [Kubernetes Quickstart](/docs/observability/kubernetes/quickstart). Get up and running with the Sumo Logic Kubernetes solution in minutes. -* [Traces Quickstart](/docs/apm/traces/quickstart). This guide demonstrates how to measure application microservice performance. +* [Kubernetes Quickstart](/docs/observability/kubernetes/quickstart) +* [Traces Quickstart](/docs/apm/traces/quickstart) See more quickstart tutorials in the [Sumo Logic Training Portal](/docs/get-started/training-certification-faq/#how-do-i-access-the-training-portal). + +:::sumo Need help? +Contact us at the [Sumo Dojo Slack](https://sumodojo.slack.com/) or [submit a support ticket](https://support.sumologic.com/support/s). +::: diff --git a/docs/get-started/sign-up.md b/docs/get-started/sign-up.md index e2ee6e209b..81f8453bc9 100644 --- a/docs/get-started/sign-up.md +++ b/docs/get-started/sign-up.md @@ -7,44 +7,51 @@ description: Learn how to sign up with Sumo Logic and create your account. import useBaseUrl from '@docusaurus/useBaseUrl'; -Sumo Logic provides everything you need to conduct real-time forensics and log management for all of your IT data—without the hassle of managing or scaling hardware or storage. Start your 30-day trial and explore the full capabilities of our Continuous Intelligence Platform™, including elastic scalability and powerful analytics. +Sumo Logic provides everything you need to conduct real-time forensics and log management for all of your IT data—without the hassle of managing or scaling hardware or storage. Start your 30-day trial and explore the full capabilities of our Sumo Logic Log Analytics Platform, including elastic scalability and powerful analytics. -After your trial, your account will automatically convert to a [Free account](#upgrade-or-continue-with-free-account), allowing you to continue with limited features. You can [upgrade to a paid plan](https://www.sumologic.com/pricing) at any time to unlock premium features. Choose to sign up via the [Sumo Logic website](#sign-up-through-sumo-logic) or the [AWS Marketplace](#sign-up-through-aws-marketplace) and start using Sumo Logic in minutes. +After your trial, your account will automatically convert to a [Free account](#upgrade-or-continue-with-free-account), allowing you to continue with limited features. You can [upgrade to a paid plan](https://www.sumologic.com/pricing) at any time to unlock premium features. Choose to sign up through [Sumo Logic](#sign-up-through-sumo-logic) or the [AWS Marketplace](#sign-up-through-aws-marketplace) and start using Sumo Logic in minutes. ## Sign up through Sumo Logic To start your free trial: -1. Go to the [Sumo Logic Free Trial page](https://www.sumologic.com/sign-up). -1. Register with a business email address to create your account. -1. Check your inbox for the activation email and follow the steps below. +1. Head to the [Sumo Logic Free Trial page](https://www.sumologic.com/sign-up). +1. Register for an account using either Google single sign-on (SSO) or your business email address. -### Activate your account +### Register using Google SSO -:::note -The activation link expires after 3 days. If it expires, you’ll need to complete the sign-up process again. -::: +1. Click **Continue with Google** and select a Google account to use. +1. Fill out the **Complete Your Account** form, then click **Activate**. +1. Follow the setup guide to install a data collector and start ingesting data. + +### Register using your email address -1. Open the activation email and click **Activate Now**. (If you do not see it, check your spam and trash folders.) -1. Fill out the **Activate Your Account** form, then click **Activate**. +1. Click **Continue with email** and enter your business email address. +1. Check your inbox for an activation email and click **Activate Now**. + :::note + The activation link expires after 3 days. If it expires, you’ll need to complete the sign-up process again. + ::: +1. Fill out the **Complete Your Account** form, then click **Activate**. 1. Follow the setup guide to install a data collector and start ingesting data. -:::tip -Get started with Sumo Logic effortlessly using **Kickstart Data**, preloaded sample data and dashboards designed to help you explore and understand the platform’s capabilities. You can immediately dive into our features like log search and alerts prior to setting up your own data collection. Whether you're new to Sumo Logic or evaluating its features, Kickstart Data offers a hands-on way to experience the platform's power. [Learn more](/docs/get-started/quickstart/#getting-started-with-kickstart-data-in-your-trial). -::: +## Sign in to Sumo Logic + +Once you're registered for an account, you can sign in using your Google SSO, email address and password, or-if configured by your organization-an [identity provider](/docs/manage/security/saml). ### Set up data collection -Upon first logging in, you'll be asked to select the platform (AWS, Kubernetes, Linux, Windows, macOS) from which you want to collect data. This will install the OpenTelemetry collector and relevant dashboards. -* For AWS, you'll deploy a single account with a CloudFormation Template, CLI, or Terraform. -* For Kubernetes, Linux, Windows, or macOS, you'll need to run the provided command in your Terminal or PowerShell. +The first step is collecting data. Our [Kickstart Data](/docs/get-started/quickstart/#getting-started-with-kickstart-data-in-your-trial) provides preloaded sample data and dashboards, giving you an easy way to explore Sumo Logic’s features like log search and alerts before setting up your own data. It’s perfect for getting familiar with our platform and evaluating its capabilities. -You'll also see an option to bypass setup and explore our [App Catalog](/docs/integrations), where you'll find a wide range of apps and easy-to-follow setup guides for installation.
Data onboarding screen showing platform collection options like AWS, Kubernetes, Windows, macOS +To start collecting your own data: -When the installation is complete, click **Start using Sumo**. +1. Select the platform you want to collect data from (AWS, Kubernetes, Linux, Windows, or macOS). This will install the OpenTelemetry collector and relevant dashboards.
Data onboarding screen showing platform collection options like AWS, Kubernetes, Windows, macOS +1. For AWS, deploy a single account with a CloudFormation Template, CLI, or Terraform. For Kubernetes, Linux, Windows, or macOS, run the provided command in your Terminal or PowerShell. When the installation is complete, click **Start using Sumo**. Your data will start flowing in a couple of minutes. Next, you'll be taken to a step-by-step onboarding guide, where you can visualize your data via dashboards, run your first log search, set up alerts, install apps, and more. +Alternatively, you can skip setup for now and browse our [App Catalog](/docs/integrations) to install prebuilt apps with easy-to-follow setup guides. + + ### Upgrade or continue with Free account After your trial ends, if you've not purchased a plan, your account will automatically convert to a Free account. This account lets you continue using Sumo Logic monitoring and log analytics services with limited features. To unlock premium features and scale as your needs grow, you can upgrade to a paid plan at any time. @@ -74,7 +81,7 @@ For information on plan types and pricing, see [Sumo Logic Pricing](https://www. #### Essentials plans -Using our self-service checkout, you can sign up for a Sumo Logic Essentials plan in just minutes using a credit card—no need to interact with the sales team. +Using our self-service checkout, you can sign up for a Sumo Logic Essentials plan in just minutes using a credit card—no need to interact with the sales team. - [Learn how to upgrade your plan with Credits account](/docs/manage/manage-subscription/upgrade-account/upgrade-credits-account). - [Learn how to upgrade your plan with Flex account](/docs/manage/manage-subscription/upgrade-account/upgrade-sumo-logic-flex-account). @@ -99,7 +106,7 @@ To sign up through AWS Marketplace: - **Email**. Enter a business email address for your account (personal email addresses such as Gmail are not supported). If you have an existing Sumo Logic account, use a different email address. Signing up through AWS Marketplace requires a new email to create a separate Sumo Logic organization. - **Region**. Select your region: North America, Europe, or Australia. - **Service License Agreement**. Review and accept the [Service License Agreement](https://www.sumologic.com/service-agreement/) to proceed. -1. Click **Sign Up**. Sumo Logic will send you an email to activate your account. Follow the instructions in the email to complete the [activation process](#activate-your-account) +1. Click **Sign Up**. Sumo Logic will send you an email to activate your account. Follow the instructions in the email to complete the activation process. 1. At the end of the 30-day trial period for the Sumo Logic Log Analytics Platform (Pay-As-You-Go with 30-day Free Trial), the subscription converts to the paid subscription billed monthly based on actual usage. ### Upgrade your account diff --git a/docs/get-started/sumo-logic-ui-classic.md b/docs/get-started/sumo-logic-ui-classic.md index 1e8a0f542d..86b9265cca 100644 --- a/docs/get-started/sumo-logic-ui-classic.md +++ b/docs/get-started/sumo-logic-ui-classic.md @@ -137,7 +137,7 @@ To launch a search, metrics visualization, or live tail session, do the followin ### View recent dashboards and searches  -You see the Home landing page when you first log in to Sumo Logic. The Home page provides an at-a-glance view of the following: +You see the Home landing page when you first sign in to Sumo Logic. The Home page provides an at-a-glance view of the following: * Recently opened dashboards * Recently run searches diff --git a/docs/get-started/training-certification-faq.md b/docs/get-started/training-certification-faq.md index 3699fb8a12..c024077e4b 100644 --- a/docs/get-started/training-certification-faq.md +++ b/docs/get-started/training-certification-faq.md @@ -21,7 +21,7 @@ Our self-paced training, micro lessons, and scheduled instructor-led training ar ### How do I access the Training Portal? -1. First, log in to Sumo Logic. +1. Sign in to Sumo Logic. 1. From the **Home** page, click the **Learn** tab. 1. Click **Get Certified**. You'll be redirected to the portal page, where you can access all courses and certifications.
Get Certified diff --git a/docs/integrations/app-development/jfrog-artifactory.md b/docs/integrations/app-development/jfrog-artifactory.md index 90e71fc227..4ff28e2dbd 100644 --- a/docs/integrations/app-development/jfrog-artifactory.md +++ b/docs/integrations/app-development/jfrog-artifactory.md @@ -203,7 +203,7 @@ If you do not have an existing Sumo Logic account and it is your first time here If you already have an existing Sumo Logic account created outside of Artifactory Online: 1. Select **Connection URL** and copy and paste the URL of an existing Sumo Logic [HTTP Logs and Metrics Source](/docs/send-data/hosted-collectors/http-source/logs-metrics) in the **Connection URL** text box.
![jfrog 7](/img/connection-and-integration/jfrog7.png) -1. Log in to Sumo Logic and verify that your logs are flowing in as expected. +1. Sign in to Sumo Logic and verify that your logs are flowing in as expected. 1. Go to our **Apps Catalog**, search for **Artifactory**, then install the [Sumo Logic app for Artifactory 7](/docs/integrations/app-development/jfrog-artifactory) to get instant insight into your Artifactory logs.  ### If you have an existing connection diff --git a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md index 02f1e93eb2..14dad7e50e 100644 --- a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md +++ b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md @@ -52,7 +52,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi To configure a hosted collector with a Cloud Syslog source, do the following: -1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). +1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). 2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following: * Enter a Source Name. * Provide a Source Category: **NW/PAN/V10** @@ -103,7 +103,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm To verify the logs in Palo Alto Networks, do the following: 1. In the Palo Alto Networks UI, select **Monitor** > **Logs**. -2. Once the setup is done, log in to Sumo Logic. +2. Once the setup is done, sign in to Sumo Logic. 3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as: `_sourceCategory = NW/PAN/V10`. @@ -179,4 +179,4 @@ import AppUpdate from '../../reuse/apps/app-update.md'; import AppUninstall from '../../reuse/apps/app-uninstall.md'; - \ No newline at end of file + diff --git a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md index 6152fd207d..3607eaa57f 100644 --- a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md +++ b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md @@ -62,7 +62,7 @@ In this step, you configure a hosted collector with a Cloud Syslog source that w To configure a hosted collector with a Cloud Syslog source, do the following: -1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). +1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). 2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following: * Enter a Source Name. * Provide a Source Category: **NW/PAN/V9** @@ -121,7 +121,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm To verify the logs in Palo Alto Networks, do the following: 1. In the Palo Alto Networks UI, select **Monitor** > **Logs**. -2. Once the setup is done, log in to Sumo Logic. +2. Once the setup is done, sign in to Sumo Logic. 3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as: `_sourceCategory = NW/PAN/V9`. @@ -199,4 +199,4 @@ import AppUpdate from '../../reuse/apps/app-update.md'; import AppUninstall from '../../reuse/apps/app-uninstall.md'; - \ No newline at end of file + diff --git a/docs/integrations/pci-compliance/palo-alto-networks-10.md b/docs/integrations/pci-compliance/palo-alto-networks-10.md index 11c8135750..4140e21ce5 100644 --- a/docs/integrations/pci-compliance/palo-alto-networks-10.md +++ b/docs/integrations/pci-compliance/palo-alto-networks-10.md @@ -46,7 +46,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi To configure a hosted collector with a Cloud Syslog source, do the following: -1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector.md). +1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector.md). 2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following: 1. Enter a Source Name. 2. Provide a Source Category: **NW/PAN/V10** @@ -88,7 +88,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm To verify the logs in Palo Alto Networks, do the following: 1. In the Palo Alto Networks UI, select **Monitor** > **Logs**. -2. Once the setup is done, log in to Sumo Logic. +2. Once the setup is done, sign in to Sumo Logic. 3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as: `_sourceCategory = NW/PAN/V10` @@ -209,4 +209,4 @@ import AppUpdate from '../../reuse/apps/app-update.md'; import AppUninstall from '../../reuse/apps/app-uninstall.md'; - \ No newline at end of file + diff --git a/docs/integrations/pci-compliance/palo-alto-networks-9.md b/docs/integrations/pci-compliance/palo-alto-networks-9.md index 2d8b29c8b3..d79796aebc 100644 --- a/docs/integrations/pci-compliance/palo-alto-networks-9.md +++ b/docs/integrations/pci-compliance/palo-alto-networks-9.md @@ -39,7 +39,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi To configure a hosted collector with a Cloud Syslog source, do the following: -1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector/). +1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector/). 2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following: 1. Enter a Source Name. 2. Provide a Source Category: **NW/PAN/V9** diff --git a/docs/integrations/saas-cloud/pagerduty-v2.md b/docs/integrations/saas-cloud/pagerduty-v2.md index e1ee60ca58..18f388b3e3 100644 --- a/docs/integrations/saas-cloud/pagerduty-v2.md +++ b/docs/integrations/saas-cloud/pagerduty-v2.md @@ -51,7 +51,7 @@ A **Hosted Collector** is not installed on a local system in your deployment. In An **HTTP Source** is an endpoint for receiving log and metric data uploaded to a unique URL generated for the Source. The URL securely encodes the Collector and Source information. You can add as many HTTP Logs and Metrics Sources as you'd like to a single Hosted Collector. To configure Hosted Collector and HTTP Source, do the following: -1. Log in to Sumo Logic. +1. Sign in to Sumo Logic. 2. Follow the instructions for configuring a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). 3. Follow the instructions for configuring an [HTTP Source](/docs/send-data/hosted-collectors/http-source/logs-metrics). diff --git a/docs/integrations/saas-cloud/pagerduty-v3.md b/docs/integrations/saas-cloud/pagerduty-v3.md index 2492d34215..a9f0d4c087 100644 --- a/docs/integrations/saas-cloud/pagerduty-v3.md +++ b/docs/integrations/saas-cloud/pagerduty-v3.md @@ -59,7 +59,7 @@ An **HTTP Source** is an endpoint for receiving log and metric data uploaded to To configure Hosted Collector and HTTP Source, do the following: -1. Log in to Sumo Logic. +1. Sign in to Sumo Logic. 2. Follow the instructions for configuring a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). 3. Follow the instructions for configuring an [HTTP Source](/docs/send-data/hosted-collectors/http-source/logs-metrics). diff --git a/docs/integrations/security-threat-detection/palo-alto-networks-9.md b/docs/integrations/security-threat-detection/palo-alto-networks-9.md index 6fa56bd2bf..f629e3cea4 100644 --- a/docs/integrations/security-threat-detection/palo-alto-networks-9.md +++ b/docs/integrations/security-threat-detection/palo-alto-networks-9.md @@ -98,7 +98,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi To configure a hosted collector with a Cloud Syslog source, do the following: -1. Log in to Sumo Logic and create a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). +1. Sign in to Sumo Logic and create a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). 2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following: 1. Enter a Source Name. 2. Provide a Source Category. **NW/PAN/V9**. @@ -163,7 +163,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm To verify the logs in Palo Alto Networks, do the following: 1. In the Palo Alto Networks UI, select **Monitor** > **Logs**. -2. Once the setup is done, log in to Sumo Logic. +2. Once the setup is done, sign in to Sumo Logic. 3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as: ```sql _sourceCategory = NW/PAN/V9 @@ -329,4 +329,4 @@ import AppUpdate from '../../reuse/apps/app-update.md'; import AppUninstall from '../../reuse/apps/app-uninstall.md'; - \ No newline at end of file + diff --git a/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md b/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md index 1ab708f5fe..7a9e5d7e8c 100644 --- a/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md +++ b/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md @@ -165,7 +165,7 @@ The following visual indicators apply: To switch between views and time interval displays, do the following: -1. Log in to Sumo Logic. +1. Sign in to Sumo Logic. 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Account > Account Overview**.
[**New UI**](/docs/get-started/sumo-logic-ui/). In the top menu select **Administration**, and then under **Account** select **Account Overview**. You can also click the **Go To...** menu at the top of the screen and select **Account Overview**.
The Account page appears with the Account Overview tab shown by default. The top panel shows account details and the bottom panel displays usage analytics.
![CloudFlex-AccountPage.png](/img/manage/subscriptions/pqs.png) 1. To change the type of analytics you are viewing, in the **Usage (Daily Capacity)** panel click the arrow next to the view name and select the analytics type from the dropdown list. The display data changes accordingly. Repeat as needed to monitor all the areas of your account usage. 1. To view data from a different billing period, click the arrow next the the **Billing period** and choose another period from the dropdown list.
![CloudFlex_Usage_BillingPeriod_menu.png](/img/manage/subscriptions/uage-billing-period.png) diff --git a/docs/manage/security/saml/integrate-aws-sso.md b/docs/manage/security/saml/integrate-aws-sso.md index 9d83050e06..6eaa665d37 100644 --- a/docs/manage/security/saml/integrate-aws-sso.md +++ b/docs/manage/security/saml/integrate-aws-sso.md @@ -36,7 +36,7 @@ AWS Single Sign-On does not currently support sending assigned group names in a This section has instructions for configuring basic SAML in Sumo Logic. 1. Open a new browser window and login to your Sumo Logic account.  -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. 1. Click **Add Configuration**.
Add Configuration button on the Configure List page     1. The **Add Configuration** page appears.
Add Configuration page 1. **Configuration Name**. Enter a name for the configuration, for example “AWS Single Sign-On”. @@ -50,20 +50,20 @@ This section has instructions for configuring basic SAML in Sumo Logic. * **Last Name**. Enter: `LastName ` * **On Demand Provisioning Roles**. Specify the Sumo RBAC roles you want to assign when user accounts are first provisioned. (The roles must already exist in Sumo.) If you enter multiple roles, separate them with commas. For example: `Analyst, CollectorManager` 1. Click **Save**.  -1. To view the details of your configuration, select it the **Configuration List.**
A configuration selected on the Configuration List page -1. Keep the panel open. When you complete the AWS Single Sign-on configuration below, you will copy the **Assertion Consumer** and **Entity ID** values into AWS Single Sign-on.
AWS Single Sign-On dialog +1. To view the details of your configuration, select it the **Configuration List.**
A configuration selected on the Configuration List page +1. Keep the panel open. When you complete the AWS Single Sign-on configuration below, you will copy the **Assertion Consumer** and **Entity ID** values into AWS Single Sign-on.
AWS Single Sign-On dialog ## Step 3: Complete SAML configuration in AWS Single Sign-on. 1. Return to the **Configure Sumo Logic** page in AWS Single Sign-on. -1. Paste the **Assertion Consumer** value from Sumo Logic into the **Application ACS URL** field in the **Application Metadata** section of the page. 
Application ACS URL in the Application Metadata section +1. Paste the **Assertion Consumer** value from Sumo Logic into the **Application ACS URL** field in the **Application Metadata** section of the page. 
Application ACS URL in the Application Metadata section 1. Paste the **Entity Id** value from Sumo Logic into the **Application SAML audience** field in the **Application Metadata** section of the page.  1. Click **Save Changes**.  -1. On the **Assigned Users** tab of your new AWS SSO configuration, click **Assign users**. 
Assign Users tab +1. On the **Assigned Users** tab of your new AWS SSO configuration, click **Assign users**. 
Assign Users tab 1. Select the individual users or groups that you want to allow to sign into Sumo Logic using AWS SSO. If you have not previously configured AWS Single Sign on you may need to first add your users and groups, as described in AWS help: * [Add Users](https://docs.aws.amazon.com/singlesignon/latest/userguide/addusers.html) * [Add Groups](https://docs.aws.amazon.com/singlesignon/latest/userguide/addgroups.html) * [Add Users to Groups](https://docs.aws.amazon.com/singlesignon/latest/userguide/adduserstogroups.html) 1. Click **Assign Users** to complete the addition of your users to the configuration. -This completes the setup for AWS Single Sign-On to Sumo Logic. Your users should now be able to login to Sumo Logic from your AWS SAML Application page by clicking the SumoLogic tile.  +This completes the setup for AWS Single Sign-On to Sumo Logic. Your users should now be able to sign in to Sumo Logic from your AWS SAML Application page by clicking the SumoLogic tile.  diff --git a/docs/manage/security/saml/integrate-sumo-with-azure-ad.md b/docs/manage/security/saml/integrate-sumo-with-azure-ad.md index 4338159a6a..5bf0e2c2a1 100644 --- a/docs/manage/security/saml/integrate-sumo-with-azure-ad.md +++ b/docs/manage/security/saml/integrate-sumo-with-azure-ad.md @@ -49,7 +49,7 @@ Do **not** close the **Setup Single Sign-On with SAML** window, you will return ### Configure SAML in Sumo Logic -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. 1. Select an existing configuration, or click **Add Configuration** to create a new configuration.
Add Configuration button on the Configuration List page 1. The **Add Configuration** page appears.
Add Configuration page 1. **Configuration Name.** Enter a name to identify the SSO policy (or another name used internally to describe the policy). @@ -93,7 +93,7 @@ Do **not** close the **Setup Single Sign-On with SAML** window, you will return 1. Click **Save**.
Properties tab 1. In the left navigation pane, click **Users and Groups** in the **Manage** section. 1. Select **Add user/group**. -1. Add the Users or Groups that should have access to login to Sumo Logic and then click **Assign**.  +1. Add the Users or Groups that should have access to sign in to Sumo Logic and then click **Assign**.  ### Configure Azure AD to send Group assignments to Sumo (Optional) diff --git a/docs/manage/security/saml/integrate-with-bitium.md b/docs/manage/security/saml/integrate-with-bitium.md index 0725a14a03..6ca6e5ce12 100644 --- a/docs/manage/security/saml/integrate-with-bitium.md +++ b/docs/manage/security/saml/integrate-with-bitium.md @@ -1,7 +1,7 @@ --- id: integrate-with-bitium title: Integrate Sumo Logic with Bitium -description: You can integrate Bitium with Sumo Logic’s SAML 2.0 API to allow users to log in to Sumo Logic using their Single Sign-On (SSO) credentials. +description: You can integrate Bitium with Sumo Logic’s SAML 2.0 API to allow users to sign in to Sumo Logic using their Single Sign-On (SSO) credentials. --- import useBaseUrl from '@docusaurus/useBaseUrl'; @@ -13,7 +13,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; | Cloud Flex | Trial, Enterprise | | Credits | Trial, Essentials, Enterprise Operations, Enterprise Security, Enterprise Suite | -Bitium is a cloud-based identity management provider that can be integrated with Sumo Logic’s SAML 2.0 API to allow users to log in to Sumo Logic using their Single Sign-On (SSO) credentials.SAML 2.0 API to allow users to log in to Sumo Logic using their Single Sign-On (SSO) credentials. +Bitium is a cloud-based identity management provider that can be integrated with Sumo Logic’s SAML 2.0 API to allow users to sign in to Sumo Logic using their Single Sign-On (SSO) credentials.SAML 2.0 API to allow users to Sign in to Sumo Logic using their Single Sign-On (SSO) credentials. You can sign up for a free Bitium Trial account on the [Bitum site](https://www.bitium.com).  @@ -37,7 +37,7 @@ You can sign up for a free Bitium Trial account on the [Bitum site](https://www. ## Configure SAML in Sumo Logic 1. Log into Sumo Logic as an administrator. -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. 1. Click **Configure**, and configure the SAML settings. 1. **Configuration Name.** Type the name of the SSO policy (or another name used internally to describe the policy). 1. **Debug Mode.** Select this option if you'd like to view additional details when an error occurs. @@ -68,7 +68,7 @@ You can sign up for a free Bitium Trial account on the [Bitum site](https://www. 1. Within the **SAML URL** text box, enter the Authentication Request URL displayed in step 6 of the previous section.
SAML URL field 1. Click **Save Changes** to complete the application install. 1. Assign users as needed to the Sumo Logic App. -1. You are now configured to login to Sumo Logic through Bitium. +1. You are now configured to sign in to Sumo Logic through Bitium. ## Create multiple SAML configurations diff --git a/docs/manage/security/saml/manage-permissions-with-adfs.md b/docs/manage/security/saml/manage-permissions-with-adfs.md index 1566a71e7d..1e6b605b94 100644 --- a/docs/manage/security/saml/manage-permissions-with-adfs.md +++ b/docs/manage/security/saml/manage-permissions-with-adfs.md @@ -15,7 +15,7 @@ You can manage Sumo Logic user permissions using ADFS and SAML. To do this, you Before you begin, here are a few key points, limitations, and tips: * User permissions are updated upon every SSO login. This allows you to manage permissions for Sumo Logic users within Active Directory. -* SAML does not provide a deprovisioning mechanism. This means that if a user is deleted or disabled in Active Directory, it will not be reflected in Sumo Logic. However, these users would no longer be able to login to Sumo Logic via SSO. The exception is Access Keys, and if SAML lockdown is not enabled, users would still be able to login via native accounts. +* SAML does not provide a deprovisioning mechanism. This means that if a user is deleted or disabled in Active Directory, it will not be reflected in Sumo Logic. However, these users would no longer be able to sign in to Sumo Logic via SSO. The exception is Access Keys, and if SAML lockdown is not enabled, users would still be able to login via native accounts. * Access Keys are NOT controlled by SAML. This means that if a user has been turned off on the SSO side, their Access Keys would still be valid. For this reason, administrators should audit users regularly and disable Access Keys when necessary. * By default, administrators can create new Sumo Logic native logins in addition to SAML provisioned users. This creates the need to either audit your accounts or ask Sumo Logic Support to enable SAML Lock Down. * SAML Lock Down disables the ability for users to login directly to Sumo Logic using username and password. There are also a few minor changes to user management behavior, such as not sending an email when a user’s email account is modified.  @@ -81,7 +81,7 @@ Now that you have setup SAML successfully, update the Roles Attribute (Optional) To update the roles attribute: -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. 1. Click **Configure**.
Roles attribute 1. Activate the **Roles Attribute (Optional)** check box. 1. Enter the URL, for example, `https://sumologic.com/SAML/Attributes/Role`. diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md index c792b2f219..3516abb04d 100644 --- a/docs/manage/security/saml/set-up-saml.md +++ b/docs/manage/security/saml/set-up-saml.md @@ -42,7 +42,7 @@ This means that if a user has been turned off on the SSO side, their access keys ## SAML does not provide a deprovisioning mechanism  -This means that if a user is deleted or disabled in the SSO database, it will not be reflected in Sumo Logic. However, these users would no longer be able to login to Sumo Logic via SSO. Administrators can delete these users from the **Administration > Users and Roles > Users** page in Sumo Logic. For information about what happens when a user is deleted, and transferring a deleted user's content to another user, see [Delete a User](../../users-roles/users/delete-user.md). +This means that if a user is deleted or disabled in the SSO database, it will not be reflected in Sumo Logic. However, these users would no longer be able to sign in to Sumo Logic via SSO. Administrators can delete these users from the **Administration > Users and Roles > Users** page in Sumo Logic. For information about what happens when a user is deleted, and transferring a deleted user's content to another user, see [Delete a User](../../users-roles/users/delete-user.md). ## Only one certificate for each SAML configuration is currently supported @@ -60,7 +60,7 @@ Before provisioning SAML, make sure you have the following: Follow these steps to configure IdP-initiated login. After this procedure, you can enable optional SAML functionality, including SP-initiated login and on-demand provisioning, as described in [Optional Configurations](set-up-saml.md). -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**. 1. Select an existing configuration, or click the plus (**+**) icon to create a new configuration.
Plus button on the Configuration List page 1. The **Add Configuration** page appears.
Add Configuration page 1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy). diff --git a/docs/platform-services/automation-service/automation-service-bridge.md b/docs/platform-services/automation-service/automation-service-bridge.md index 285d358596..48c3954b9e 100644 --- a/docs/platform-services/automation-service/automation-service-bridge.md +++ b/docs/platform-services/automation-service/automation-service-bridge.md @@ -86,7 +86,7 @@ The Bridge has to be able to resolve DNS hostnames and needs to reach the below ## Get installation token -Login to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with name prefix `csoar-bridge-token`. +Sign in to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with name prefix `csoar-bridge-token`. :::info You must prefix your installation token with `csoar-bridge-token` in order for the Automation Bridge to connect to your CloudSOAR instance. @@ -256,7 +256,7 @@ The automation bridge needs to be able to communicate with the Docker API to wor |Environment Variable |Description |Default | |:------------------------------------|:---------------|:----------| |`API_URL_HERE` | To determine which is the correct SOAR_URL, see [Sumo Logic Endpoints by Deployment and Firewall Security](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security) and get the URL under the API Endpoint column. For example: `https://api.eu.sumologic.com/api/` | | -|`SOAR_TOKEN_HERE` | Log in to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with the name prefix `csoar-bridge-token`. | | +|`SOAR_TOKEN_HERE` | Sign in to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with the name prefix `csoar-bridge-token`. | | |`SIEM_URL_HERE` | The HTTPS Source endpoint URL from a Hosted Sumo Logic Collector. | NONE | |`BRIDGE_ALIAS_HERE` | Provide the alias name. With bridge ALIAS, it is possible to distinguish which integration resources will be executed with this automation bridge. When a new integration resource is created or edited, it is possible to select the default ALIAS or to create a new one. So every automatic action configured to use this resource will be performed with the bridge that has the same ALIAS. | NONE | diff --git a/docs/send-data/opentelemetry-collector/quickstart.md b/docs/send-data/opentelemetry-collector/quickstart.md index 4438b92ad9..91fa0c1aa2 100644 --- a/docs/send-data/opentelemetry-collector/quickstart.md +++ b/docs/send-data/opentelemetry-collector/quickstart.md @@ -33,7 +33,7 @@ We'll show a simple example of running a single collector, on a single machine, In this section, you'll install Sumo Logic’s OpenTelemetry collector on your machine, add a configuration file to describe the metric you want to collect, then start running the collector. The data will appear in the Sumo Logic UI instantly. As a use case, we'll collect memory usage information from a host and send that to Sumo Logic for storage and analysis. -### Step 1: Log in to Sumo +### Step 1: Sign in to Sumo [Sign in](https://service.sumologic.com/ui/) to your Sumo Logic as you normally would. diff --git a/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md b/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md index cd4bdaa521..2ec6931804 100644 --- a/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md +++ b/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md @@ -594,7 +594,7 @@ Graphite contentType JSON example:  } ``` -## Additional information +## Additional resources See the following topics for additional information: * [Use JSON to configure Sources](/docs/send-data/use-json-configure-sources). The topic includes a list of [common parameters](/docs/send-data/use-json-configure-sources) for all log Source types. For Sources, the common parameter `name` must be unique per Collector. diff --git a/sidebarsCommunity.js b/sidebarsCommunity.js index b4e8fa9c96..f9fda89f55 100644 --- a/sidebarsCommunity.js +++ b/sidebarsCommunity.js @@ -79,7 +79,7 @@ module.exports = { }, { type: 'link', - label: 'Log in to Sumo', + label: 'Sign in to Sumo', href: 'https://service.sumologic.com', }, ],