diff --git a/blog-service/2021/12-31.md b/blog-service/2021/12-31.md index 42ff53b436..3b0f583401 100644 --- a/blog-service/2021/12-31.md +++ b/blog-service/2021/12-31.md @@ -566,7 +566,7 @@ Update - The [alert variable](/docs/alerts/monitors/alert-variables) `Results --- ## April 7, 2021 (Search) -Update - The LogReduce operator now provides an [optimize option](/docs/search/logreduce) that provides up to 10x speedup over classic LogReduce on datasets with hundreds of thousands of logs. +Update - The LogReduce operator now provides an [optimize option](/docs/search/behavior-insights/logreduce) that provides up to 10x speedup over classic LogReduce on datasets with hundreds of thousands of logs. --- ## April 6, 2021 (Dashboard) diff --git a/cid-redirects.json b/cid-redirects.json index bce94b0c8e..8af9425d8f 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -370,8 +370,8 @@ "/05Search/Anomaly-Detection/Anomalies-Page/Drill-Down-into-Events": "/docs/dashboards/drill-down-to-discover-root-causes", "/05Search/Behavior_Insights": "/docs/search/behavior-insights", "/05Search/Behavior_Insights/LogExplain": "/docs/search/behavior-insights/logexplain", - "/05Search/Behavior_Insights/LogReduce_Keys": "/docs/search/behavior-insights/logreduce-keys", - "/05Search/Behavior_Insights/LogReduce_Values": "/docs/search/behavior-insights/logreduce-values", + "/05Search/Behavior_Insights/LogReduce_Keys": "/docs/search/behavior-insights/logreduce/logreduce-keys", + "/05Search/Behavior_Insights/LogReduce_Values": "/docs/search/behavior-insights/logreduce/logreduce-values", "/05Search/Get-Started-with-Search": "/docs/search/get-started-with-search", "/05Search/Get-Started-with-Search/How-to-Build-a-Search": "/docs/search/get-started-with-search/build-search", "/05Search/Get-Started-with-Search/How-to-Build-a-Search/Best-Practices%3A-Search-Rules-to-Live-By": "/docs/search/get-started-with-search/build-search/best-practices-search", @@ -435,17 +435,17 @@ "/05Search/Live-Tail/Live-Tail-Show-in-Search": "/docs/search/live-tail/live-tail-show-in-search", "/05Search/Live-Tail/Multiple-Live-Tails": "/docs/search/live-tail/multiple-live-tails", "/05Search/Live-Tail/Troubleshooting-Live-Tail": "/docs/search/live-tail/troubleshooting-live-tail", - "/05Search/LogCompare": "/docs/search/logcompare", - "/05Search/LogCompare/About-LogCompare": "/docs/search/logcompare", - "/05Search/LogCompare/Create-a-LogCompare-Email-Alert": "/docs/search/logcompare", - "/05Search/LogCompare/LogCompare-Syntax": "/docs/search/logcompare", - "/05Search/LogCompare/Run-LogCompare": "/docs/search/logcompare", - "/05Search/LogCompare/Understand-LogCompare-Results": "/docs/search/logcompare", - "/05Search/LogReduce": "/docs/search/logreduce/logreduce-operator", - "/05Search/LogReduce/01-LogReduce-Operator": "/docs/search/logreduce/logreduce-operator", - "/05Search/LogReduce/Detect-Patterns-with-LogReduce": "/docs/search/logreduce/detect-patterns-with-logreduce", - "/05Search/LogReduce/Influence-the-LogReduce-Outcome": "/docs/search/logreduce/influence-the-logreduce-outcome", - "/05Search/LogReduce/Understand-the-LogReduce-Relevance-Column": "/docs/search/logreduce/understand-the-logreduce-relevance-column", + "/05Search/LogCompare": "/docs/search/behavior-insights/logcompare", + "/05Search/LogCompare/About-LogCompare": "/docs/search/behavior-insights/logcompare", + "/05Search/LogCompare/Create-a-LogCompare-Email-Alert": "/docs/search/behavior-insights/logcompare", + "/05Search/LogCompare/LogCompare-Syntax": "/docs/search/behavior-insights/logcompare", + "/05Search/LogCompare/Run-LogCompare": "/docs/search/behavior-insights/logcompare", + "/05Search/LogCompare/Understand-LogCompare-Results": "/docs/search/behavior-insights/logcompare", + "/05Search/LogReduce": "/docs/search/behavior-insights/logreduce/logreduce-operator", + "/05Search/LogReduce/01-LogReduce-Operator": "/docs/search/behavior-insights/logreduce/logreduce-operator", + "/05Search/LogReduce/Detect-Patterns-with-LogReduce": "/docs/search/behavior-insights/logreduce/detect-patterns-with-logreduce", + "/05Search/LogReduce/Influence-the-LogReduce-Outcome": "/docs/search/behavior-insights/logreduce/influence-the-logreduce-outcome", + "/05Search/LogReduce/Understand-the-LogReduce-Relevance-Column": "/docs/search/behavior-insights/logreduce/understand-the-logreduce-relevance-column", "/05Search/Lookup_Tables": "/docs/search/lookup-tables", "/05Search/Lookup_Tables/01_Create_a_Lookup_Table0": "/docs/search/lookup-tables/create-lookup-table", "/05Search/Lookup_Tables/01_Create_a_Lookup_Table": "/docs/search/lookup-tables/create-lookup-table", @@ -1703,7 +1703,7 @@ "/cid/10450": "/docs/alerts/webhook-connections/microsoft-teams", "/cid/1046": "/docs/alerts/webhook-connections/pagerduty", "/cid/1047": "/docs/alerts/webhook-connections/datadog", - "/cid/1048": "/docs/search/logcompare", + "/cid/1048": "/docs/search/behavior-insights/logcompare", "/cid/1049": "/docs/get-started", "/cid/1050": "/docs/integrations/amazon-aws/s3-audit", "/cid/1051": "/docs/integrations/amazon-aws/vpc-flow-logs", @@ -1720,8 +1720,8 @@ "/cid/1061": "/release-notes-collector", "/cid/1062": "/docs/alerts/webhook-connections", "/cid/1063": "/docs/alerts/webhook-connections/aws-lambda", - "/cid/1064": "/docs/search/logreduce/logreduce-operator", - "/cid/1065": "/docs/search/logreduce/logreduce-operator", + "/cid/1064": "/docs/search/behavior-insights/logreduce/logreduce-operator", + "/cid/1065": "/docs/search/behavior-insights/logreduce/logreduce-operator", "/cid/1066": "/docs/send-data/hosted-collectors/cloud-syslog-source", "/cid/1067": "/docs/search/live-tail/live-tail-cli", "/cid/1068": "/docs/search/live-tail/about-live-tail", @@ -1877,7 +1877,7 @@ "/cid/2005": "/docs/search/get-started-with-search", "/cid/2006": "/docs/search/search-query-language/search-operators/manually-cast-data-string-number", "/cid/2008": "/docs/send-data/installed-collectors/linux", - "/cid/2009": "/docs/search/logcompare", + "/cid/2009": "/docs/search/behavior-insights/logcompare", "/cid/2010": "/docs/search/search-query-language/search-operators/if", "/cid/2011": "/docs/get-started/help", "/cid/2012": "/docs/manage/security/enable-support-account", @@ -1888,7 +1888,7 @@ "/cid/2017": "/docs/manage/users-roles/users/delete-user", "/cid/2018": "/docs/send-data/installed-collectors/windows", "/cid/2019": "/docs/integrations/pci-compliance/linux", - "/cid/2021": "/docs/search/logreduce/detect-patterns-with-logreduce", + "/cid/2021": "/docs/search/behavior-insights/logreduce/detect-patterns-with-logreduce", "/cid/2022": "/docs/send-data/installed-collectors", "/cid/2023": "/docs/send-data/collection/edit-collector", "/cid/2024": "/docs/search/get-started-with-search/search-basics/export-search-results", @@ -1896,7 +1896,7 @@ "/cid/2027": "/docs/search/get-started-with-search/build-search/keyword-search-expressions", "/cid/2028": "/docs/search/get-started-with-search", "/cid/2030": "/docs/search/search-query-language/group-aggregate-operators", - "/cid/2032": "/docs/search/logreduce/influence-the-logreduce-outcome", + "/cid/2032": "/docs/search/behavior-insights/logreduce/influence-the-logreduce-outcome", "/cid/2033": "/docs/get-started", "/cid/2036": "/docs/integrations/hosts-operating-systems/linux", "/cid/2038": "/docs/search/search-query-language/math-expressions", @@ -1911,10 +1911,10 @@ "/cid/2047": "/docs/search/get-started-with-search/search-basics/pause-cancel-search", "/cid/2049": "/docs/send-data/installed-collectors/sources/remote-file-source/prerequisites-windows-remote-file-collection", "/cid/2050": "/docs/get-started", - "/cid/2057": "/docs/search/logcompare", + "/cid/2057": "/docs/search/behavior-insights/logcompare", "/cid/2058": "/docs/alerts/scheduled-searches/create-email-alert", "/cid/2059": "/docs/search/get-started-with-search/search-basics/save-search", - "/cid/2060": "/docs/search/logcompare", + "/cid/2060": "/docs/search/behavior-insights/logcompare", "/cid/2064": "/docs/search/search-cheat-sheets/general-search-examples", "/cid/2066": "/docs/search/get-started-with-search/search-basics/search-surrounding-messages", "/cid/2068": "/docs/integrations/saas-cloud/fastly", @@ -1922,9 +1922,9 @@ "/cid/2070": "/docs/search/search-query-language/search-operators/sort", "/cid/2071": "/docs/send-data/collection/start-stop-collector-using-scripts", "/cid/2072": "/docs/search/get-started-with-search/suggested-searches", - "/cid/2073": "/docs/search/logcompare", - "/cid/2074": "/docs/search/logreduce/logreduce-operator", - "/cid/2075": "/docs/search/logreduce/logreduce-operator", + "/cid/2073": "/docs/search/behavior-insights/logcompare", + "/cid/2074": "/docs/search/behavior-insights/logreduce/logreduce-operator", + "/cid/2075": "/docs/search/behavior-insights/logreduce/logreduce-operator", "/cid/2076": "/docs/get-started", "/cid/2077": "/docs/get-started", "/cid/2078": "/docs/search/search-query-language/search-operators/if", @@ -2089,7 +2089,7 @@ "/cid/4412": "/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory", "/cid/44122": "/docs/integrations/saas-cloud/crowdstrike-spotlight", "/cid/44123": "/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage", - "/cid/4020": "/docs/search/logreduce", + "/cid/4020": "/docs/search/behavior-insights/logreduce", "/cid/4021": "/docs/search/search-query-language/search-operators/accum", "/cid/40001": "/docs/search/search-query-language/search-operators/as", "/cid/40002": "/docs/search/search-query-language/search-operators/asn-lookup", @@ -2285,7 +2285,7 @@ "/cid/5134": "/docs/dashboards/panels", "/cid/5135": "/docs/dashboards/drill-down-to-discover-root-causes", "/cid/5136": "/docs/get-started/library", - "/cid/5138": "/docs/search/logreduce/influence-the-logreduce-outcome", + "/cid/5138": "/docs/search/behavior-insights/logreduce/influence-the-logreduce-outcome", "/cid/5139": "/docs/send-data/collection/edit-source", "/cid/5140": "/docs/get-started/library", "/cid/5143": "/docs/manage/users-roles/roles/create-manage-roles", @@ -2423,7 +2423,7 @@ "/cid/5334": "/docs/search/get-started-with-search/suggested-searches/microsoft-iis-parser", "/cid/5335": "/docs/search", "/cid/5336": "/docs/send-data/collection/search-for-a-collector-or-source", - "/cid/5339": "/docs/search/logreduce", + "/cid/5339": "/docs/search/behavior-insights/logreduce", "/cid/5340": "/docs/integrations/sumo-apps/security-analytics", "/cid/5341": "/docs/integrations/sumo-apps/security-analytics", "/cid/5342": "/docs/alerts/webhook-connections/servicenow", @@ -2439,7 +2439,7 @@ "/cid/5356": "/docs/dashboards/panels/modify-chart", "/cid/5368": "/docs/dashboards/panels/single-value-charts", "/cid/5375": "/", - "/cid/5377": "/docs/search/logreduce/understand-the-logreduce-relevance-column", + "/cid/5377": "/docs/search/behavior-insights/logreduce/understand-the-logreduce-relevance-column", "/cid/5378": "/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-cloudtrail", "/cid/5379": "/docs/integrations/amazon-aws/elastic-load-balancing", "/cid/5380": "/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-cloudtrail", @@ -2478,7 +2478,7 @@ "/cid/5444": "/docs/integrations/web-servers/varnish", "/cid/5445": "/docs/integrations/web-servers/varnish", "/cid/5446": "/docs/integrations/containers-orchestration/vmware-legacy", - "/cid/5448": "/docs/search/logreduce/detect-patterns-with-logreduce", + "/cid/5448": "/docs/search/behavior-insights/logreduce/detect-patterns-with-logreduce", "/cid/5449": "/docs/integrations/containers-orchestration/vmware-legacy", "/cid/5450": "/", "/cid/5454": "/docs/manage/security/create-allowlist-ip-cidr-addresses", @@ -2687,8 +2687,8 @@ "/cid/23411": "/docs/integrations/saas-cloud/sophos", "/cid/9078": "/docs/manage/users-roles/roles/construct-search-filter-for-role", "/cid/915200739": "/docs/observability/sdo/about-sdo", - "/cid/9201": "/docs/search/behavior-insights/logreduce-keys", - "/cid/9202": "/docs/search/behavior-insights/logreduce-values", + "/cid/9201": "/docs/search/behavior-insights/logreduce/logreduce-keys", + "/cid/9202": "/docs/search/behavior-insights/logreduce/logreduce-values", "/cid/9205": "/docs/search/behavior-insights/logexplain", "/cid/96734": "/docs/send-data/hosted-collectors/http-source/troubleshooting", "/cid/97652": "/docs/integrations/saas-cloud/qualys-vmdr", @@ -3799,9 +3799,9 @@ "/Search/Get_Started_with_Search/Search_Basics/Search_Metadata": "/docs/search/get-started-with-search/search-basics", "/Search/Library/Apps-in-Sumo-Logic/01-Sumo-Logic-Apps/Data-Volume-App": "/docs/integrations/sumo-apps/data-volume", "/Search/Library/Apps-in-Sumo-Logic/01-Sumo-Logic-Apps/Data-Volume-App/Data-Volume-App-Dashboards": "/docs/integrations/sumo-apps/data-volume", - "/Search/LogCompare": "/docs/search/logcompare", - "/Search/LogCompare/About_LogCompare": "/docs/search/logcompare", - "/Search/LogReduce": "/docs/search/logreduce", + "/Search/LogCompare": "/docs/search/behavior-insights/logcompare", + "/Search/LogCompare/About_LogCompare": "/docs/search/behavior-insights/logcompare", + "/Search/LogReduce": "/docs/search/behavior-insights/logreduce", "/Query_Language": "/docs/search/search-query-language", "/Search/Search_Query_Language": "/docs/search/search-query-language", "/Search/Search_Query_Language/Parse_Operators/CSV_Operator": "/docs/search/search-query-language/parse-operators/parse-csv-formatted-logs", @@ -4186,5 +4186,13 @@ "/docs/integrations/amazon-aws/aurora-mysql-ulm": "/docs/integrations/amazon-aws/rds", "/docs/integrations/amazon-aws/aurora-postgresql-ulm": "/docs/integrations/amazon-aws/rds", "/docs/integrations/amazon-aws/elastic-load-balancer-app": "/docs/integrations/amazon-aws/application-load-balancer", - "/docs/integrations/amazon-aws/elastic-load-balancing-classic": "/docs/integrations/amazon-aws/classic-load-balancer" + "/docs/integrations/amazon-aws/elastic-load-balancing-classic": "/docs/integrations/amazon-aws/classic-load-balancer", + "/docs/search/logcompare": "/docs/search/behavior-insights/logcompare", + "/docs/search/behavior-insights/logreduce-keys": "/docs/search/behavior-insights/logreduce/logreduce-keys", + "/docs/search/logreduce": "/docs/search/behavior-insights/logreduce", + "/docs/search/logreduce/logreduce-operator": "/docs/search/behavior-insights/logreduce/logreduce-operator", + "/docs/search/logreduce/detect-patterns-with-logreduce": "/docs/search/behavior-insights/logreduce/detect-patterns-with-logreduce", + "/docs/search/logreduce/influence-the-logreduce-outcome": "/docs/search/behavior-insights/logreduce/influence-the-logreduce-outcome", + "/docs/search/logreduce/understand-the-logreduce-relevance-column": "/docs/search/behavior-insights/logreduce/understand-the-logreduce-relevance-column", + "/docs/search/behavior-insights/logreduce-values": "/docs/search/behavior-insights/logreduce/logreduce-values" } diff --git a/docs/alerts/monitors/alert-response-faq.md b/docs/alerts/monitors/alert-response-faq.md index efa681a76b..1b2ff343fa 100644 --- a/docs/alerts/monitors/alert-response-faq.md +++ b/docs/alerts/monitors/alert-response-faq.md @@ -67,7 +67,7 @@ Sumo Logic detects and maintains a signature library. It does that by analyzing There could be cases where the process has still not cataloged a new log message to a signature. As a result, it would get bundled into the "Others" category. This problem should be fixed automatically after some time (when the background process runs). -You can also force run the signature cataloging process manually, by calling the [LogCompare](../../search/logcompare.md) or [LogReduce](/docs/search/logreduce) operators from the Log Search page. +You can also force run the signature cataloging process manually, by calling the [LogCompare](/docs/search/behavior-insights/logcompare) or [LogReduce](/docs/search/behavior-insights/logreduce) operators from the Log Search page. ## I don’t see the Dimensional Explanation card for logs-based alert diff --git a/docs/alerts/monitors/alert-response.md b/docs/alerts/monitors/alert-response.md index 0901b69bd8..6eb834608c 100644 --- a/docs/alerts/monitors/alert-response.md +++ b/docs/alerts/monitors/alert-response.md @@ -160,7 +160,7 @@ See [Using tags in alerts](/docs/alerts/monitors/settings/#using-tags-in-alerts) ### Log fluctuations -This card detects different signatures in your log messages using [LogReduce](/docs/search/logreduce) such as errors, exceptions, timeouts, and successes. It compares log signatures trends with a normal baseline period and surfaces noteworthy changes in signatures. +This card detects different signatures in your log messages using [LogReduce](/docs/search/behavior-insights/logreduce) such as errors, exceptions, timeouts, and successes. It compares log signatures trends with a normal baseline period and surfaces noteworthy changes in signatures. * **New**. Log signatures that were only seen after the Alert was triggered but not one hour prior to the Alert start time. * **Gone**. Log signatures that are not present after the Alert was created but were present one hour prior to the Alert start time, such as **Transaction Succeeded** or **Success**. diff --git a/docs/alerts/monitors/overview.md b/docs/alerts/monitors/overview.md index da70a7930e..e302726a28 100644 --- a/docs/alerts/monitors/overview.md +++ b/docs/alerts/monitors/overview.md @@ -130,7 +130,7 @@ Custom variables used inside the Action Payload. ### General * [Receipt Time](../../search/get-started-with-search/build-search/use-receipt-time.md) is not supported. -* [LogReduce](/docs/search/logreduce/logreduce-operator) / [LogCompare](../../search/logcompare.md) operators are not supported in monitors. If your query contains these operators, you will not be able to create the monitor. +* [LogReduce](/docs/search/behavior-insights/logreduce/logreduce-operator) / [LogCompare](/docs/search/behavior-insights/logcompare) operators are not supported in monitors. If your query contains these operators, you will not be able to create the monitor. * Monitors only support the [Continuous data tier](/docs/manage/partitions/data-tiers). * An aggregate Metric Monitor can evaluate up to 15,000 time series. A non-aggregate Metric Monitor can evaluate up to 3,000 time series. * [Save to Index](../scheduled-searches/save-to-index.md) and [Save to Lookup](../scheduled-searches/save-to-lookup.md) are not supported. diff --git a/docs/contributing/glossary.md b/docs/contributing/glossary.md index cdb7edbb04..6bacf834d4 100644 --- a/docs/contributing/glossary.md +++ b/docs/contributing/glossary.md @@ -174,9 +174,9 @@ We also maintain a [DevOps and Security Glossary](https://www.sumologic.com/glos **[Local Configuration File Management](/docs/send-data/use-json-configure-sources/local-configuration-file-management)**. Local Configuration File Management allows you to set up and manage Sources on an Installed Collector using one or more JSON files. -**[LogCompare](/docs/search/logcompare)**. LogCompare allows you to compare a section of your log messages from one point in time with the same section at another point in time, and display the changes in patterns. +**[LogCompare](/docs/search/behavior-insights/logcompare)**. LogCompare allows you to compare a section of your log messages from one point in time with the same section at another point in time, and display the changes in patterns. -**[LogReduce](/docs/search/logreduce)**. LogReduce uses fuzzy logic to cluster messages together based on string and pattern similarity. Use the LogReduce button and operator to quickly assess activity patterns for things like a range of devices or traffic on a website. +**[LogReduce](/docs/search/behavior-insights/logreduce)**. LogReduce uses fuzzy logic to cluster messages together based on string and pattern similarity. Use the LogReduce button and operator to quickly assess activity patterns for things like a range of devices or traffic on a website. **[Logs-to-Metrics](/docs/metrics/logs-to-metrics)**. A Sumo Logic feature you can use to extract or create metrics from log data. You can extract metrics that are embedded in logs, or count logs as a metric. diff --git a/docs/dashboards/restricted-operators-dashboards.md b/docs/dashboards/restricted-operators-dashboards.md index 7d60d9b200..68404271ab 100644 --- a/docs/dashboards/restricted-operators-dashboards.md +++ b/docs/dashboards/restricted-operators-dashboards.md @@ -12,8 +12,8 @@ This page has information about restrictions and rules about using [Sumo Logic l The following operators cannot be used with dashboards: * `Details` -* [`LogReduce`](/docs/search/logreduce/logreduce-operator) -* [`LogCompare`](/docs/search/logcompare) +* [`LogReduce`](/docs/search/behavior-insights/logreduce/logreduce-operator) +* [`LogCompare`](/docs/search/behavior-insights/logcompare) * [`Parse multi`](/docs/search/search-query-language/parse-operators/parse-variable-patterns-using-regex/#parse-multi) * `Sample` (internal-use operator) * [`Save`](/docs/search/search-query-language/search-operators/save) @@ -26,8 +26,8 @@ The following operators cannot be used in Auto refresh: * `Details` * [`First`, `Last`](/docs/search/search-query-language/group-aggregate-operators/first-last/) - instead use the **withtime** option, see [`most_recent` and `least_recent`](/docs/search/search-query-language/group-aggregate-operators/most-recent-least-recent). * [`Join`](/docs/search/search-query-language/search-operators/join/) -* [`LogReduce`](/docs/search/logreduce/logreduce-operator/) -* [`LogCompare`](/docs/search/logcompare/) +* [`LogReduce`](/docs/search/behavior-insights/logreduce/logreduce-operator/) +* [`LogCompare`](/docs/search/behavior-insights/logcompare/) * [`Now`](/docs/search/search-query-language/search-operators/now) * [`Outlier`](/docs/search/search-query-language/search-operators/outlier/) will omit the first N (window size) data points in results because those data points are used in the training phase. * `Parse Using` diff --git a/docs/get-started/ai-machine-learning.md b/docs/get-started/ai-machine-learning.md index e3726cef39..add8a35553 100644 --- a/docs/get-started/ai-machine-learning.md +++ b/docs/get-started/ai-machine-learning.md @@ -49,11 +49,11 @@ With Copilot, you can effortlessly investigate complex issues without writing in ### LogReduce -LogReduce® utilizes AI-driven algorithms to cluster log messages based on string similarity and distill thousands of log lines into easy-to-understand patterns. Separate the signal from the noise and detect anomalous behavior with Outlier Detection. LogReduce employs fuzzy logic to group similar messages into signatures, enabling quick assessment of activity patterns. You can refine results based on your preferences, teaching LogReduce for more specific outcomes. [Learn more](/docs/search/logreduce). +LogReduce® utilizes AI-driven algorithms to cluster log messages based on string similarity and distill thousands of log lines into easy-to-understand patterns. Separate the signal from the noise and detect anomalous behavior with Outlier Detection. LogReduce employs fuzzy logic to group similar messages into signatures, enabling quick assessment of activity patterns. You can refine results based on your preferences, teaching LogReduce for more specific outcomes. [Learn more](/docs/search/behavior-insights/logreduce). ### LogCompare -LogCompare simplifies log analysis by enabling easy comparison of log data from different time periods to detect changes or anomalies, facilitating troubleshooting and root cause discovery. By automatically running delta analysis, LogCompare streamlines the process, allowing users to identify significant alterations in log patterns efficiently. Utilizing baseline and target queries, LogCompare clusters logs into patterns and compares them based on the significance of change, providing insights into deviations over time. With intuitive actions like promoting, demoting, and splitting signatures, users can refine their analysis and focus on relevant patterns, ultimately enhancing decision-making and threat detection capabilities. Additionally, LogCompare supports alerts and scheduled searches to notify users of new signatures or significant changes, ensuring proactive monitoring and response to evolving log data [Learn more](/docs/search/logcompare). +LogCompare simplifies log analysis by enabling easy comparison of log data from different time periods to detect changes or anomalies, facilitating troubleshooting and root cause discovery. By automatically running delta analysis, LogCompare streamlines the process, allowing users to identify significant alterations in log patterns efficiently. Utilizing baseline and target queries, LogCompare clusters logs into patterns and compares them based on the significance of change, providing insights into deviations over time. With intuitive actions like promoting, demoting, and splitting signatures, users can refine their analysis and focus on relevant patterns, ultimately enhancing decision-making and threat detection capabilities. Additionally, LogCompare supports alerts and scheduled searches to notify users of new signatures or significant changes, ensuring proactive monitoring and response to evolving log data. [Learn more](/docs/search/behavior-insights/logcompare). ### AI-driven Alerts diff --git a/docs/integrations/microsoft-azure/windows-legacy.md b/docs/integrations/microsoft-azure/windows-legacy.md index 8e62f10a3c..bb5874e09d 100644 --- a/docs/integrations/microsoft-azure/windows-legacy.md +++ b/docs/integrations/microsoft-azure/windows-legacy.md @@ -155,7 +155,7 @@ See information about Window event messages that contain a keyword that indicate **Error Keyword - Outlier**. See timeslices where the count of problem keywords exceeds the moving average by a statistically significant amount, three standard deviations over the last 24 hours. -**Error Keyword - LogReduce**. See a LogReduce analysis of event messages that contain problem keywords. (Sumo's LogReduce algorithm uses fuzzy logic to cluster messages together based on string and pattern similarity. For more information, see, [Detect Patterns with LogReduce](/docs/search/logreduce/detect-patterns-with-logreduce)). +**Error Keyword - LogReduce**. See a LogReduce analysis of event messages that contain problem keywords. (Sumo's LogReduce algorithm uses fuzzy logic to cluster messages together based on string and pattern similarity. For more information, see, [Detect Patterns with LogReduce](/docs/search/behavior-insights/logreduce/detect-patterns-with-logreduce)). ## Upgrade/Downgrade the Windows Legacy app (Optional) diff --git a/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md b/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md index 3849a4ca8b..7a87427ebd 100644 --- a/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md +++ b/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md @@ -41,7 +41,7 @@ The following table provides a summary list of key features by package accounts. | Log Data retention (Classic Accounts) | 7 days | 30 days | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | | Log Data storage (Cloud Flex Accounts) | 4GB | 30GB | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | | Log Data volume | 500MB per day | 1GB per day* | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | -| [LogReduce](/docs/search/logreduce) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | +| [LogReduce](/docs/search/behavior-insights/logreduce) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | | [Lookup Tables](/docs/search/lookup-tables) | none | Varies by the account type being trialed | 10 tables per org | 100 tables per org | | Metrics | | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | | Metrics data retention | | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | diff --git a/docs/observability/root-cause-explorer.md b/docs/observability/root-cause-explorer.md index cc252f1a48..3ea4a76745 100644 --- a/docs/observability/root-cause-explorer.md +++ b/docs/observability/root-cause-explorer.md @@ -469,7 +469,7 @@ _view=sumologic_signals_anomalies #### Return entities with the most problems -This query uses the [logreduce](/docs/search/logreduce) operator to look for groups of anomalies to assess if some combination of metrics, clusters and so on, account for a large share of overall EOI volume. +This query uses the [logreduce](/docs/search/behavior-insights/logreduce) operator to look for groups of anomalies to assess if some combination of metrics, clusters and so on, account for a large share of overall EOI volume. ```sql _view=sumologic_signals_anomalies diff --git a/docs/search/behavior-insights/index.md b/docs/search/behavior-insights/index.md index 6b3429b9e0..6b8d3e4fd2 100644 --- a/docs/search/behavior-insights/index.md +++ b/docs/search/behavior-insights/index.md @@ -4,6 +4,8 @@ title: Behavior Insights description: Gain behavioral insight of your environment using LogReduce operators. --- +import useBaseUrl from '@docusaurus/useBaseUrl'; + Behavior Insights encompasses three log search operators to accelerate insights, troubleshooting, and action plans using structured logs. About 23% of the daily log ingest volume pertains to JSON data and accounts for a growing share of total log volume. This growth is driven by modern applications and underlying cloud (AWS, GCP, Azure) and orchestrator logs. Behavior Insights helps answer the following questions for SecOps, DevOps, and business users: * What activity patterns are evident from structured logs? What patterns are trending? @@ -12,28 +14,25 @@ Behavior Insights encompasses three log search operators to accelerate insights, Modeled after our LogReduce log summarization feature, the LogReduce Values and LogReduce Keys operators cluster logs based on their structure or pattern and activity content respectively. - -## Guide contents - In this section, we'll introduce the following concepts:
This operator finds the root cause of outliers in logs based on conditions you specify.
+Compare log data from different time periods to detect major changes or anomalies.
Clusters JSON logs based on keys providing an at-a-glance summary of patterns in logs based on their schema while ignoring specific values.
+Assess activity patterns for things like a range of devices or traffic on a website.
Clusters JSON logs using the values of keys.
+Find the root cause of outliers in logs based on conditions you specify.
Allows you to quickly assess activity patterns for things like a range of devices or traffic on a website.
Group messages with similar structures and patterns, providing insight into specific keywords or time range.
Influence the algorithm by editing a signature to increase or decrease your results granularity.
+Clusters JSON logs based on keys providing an at-a-glance summary of patterns in logs based on their schema while ignoring specific values.
+Clusters JSON logs using the values of keys.
Displays a numerical score for a signature, predicting which signatures could be most meaningful.
Influence the algorithm by editing a signature to increase or decrease your results granularity.
+Start here to begin exploring your data in Sumo Logic.
+Accelerate log investigations and troubleshooting with Sumo Logic Copilot, our AI-powered assistant that enables you to ask natural language questions and get contextual suggestions, helping first responders get to answers faster.
+Quickly assess activity patterns for things like a range of devices or traffic on a website.
+Gain behavioral insight of your environment using LogReduce operators.
+Real-time live feed of log events associated with a Source or Collector.
Easily compare log data from different time periods to detect major changes or anomalies.
+Run a compare operation automatically from your search results.
Real-time live feed of log events associated with a Source or Collector.
+Learn how to accelerate the search process to get query results in less time and improve productivity for forensic analysis and log management.
Gain behavioral insight of your environment using LogReduce operators.
+Optimize your search with partitions, which store your data in an index separate from the rest of your account's data.
Filter and evaluate conditions for a query when you may not be sure of the exact filter.
Get answers to frequently asked questions about Log Search.
+| count by _sourceCategory
| sort by _count
| limit 5
_sourceCategory=stream
| if(_raw matches "error", 1, 0) as hasError
| logexplain hasError == 1 on _sourceHost
| logreduce
_sourcecategory="Labs/AWS/GuardDuty_V8"
| json keys "region", "partition", "resource"
| logreduce keys field=resource