diff --git a/blog-service/2025-04-21-manage.md b/blog-service/2025-04-21-manage.md
new file mode 100644
index 0000000000..2727681c51
--- /dev/null
+++ b/blog-service/2025-04-21-manage.md
@@ -0,0 +1,21 @@
+---
+title: Sign in with Google SSO (Manage)
+image: https://help.sumologic.com/img/sumo-square.png
+keywords:
+ - onboarding
+ - authentication
+ - sign in
+ - trial
+ - sso
+hide_table_of_contents: true
+---
+
+We’ve made it even easier to access Sumo Logic: you can now sign in using your Google account credentials.
+
+If your email address is linked to a Google account, just click **Continue with Google** on the sign-in page to authenticate. No setup required.
+
+You can also use Google SSO when signing up for a new Sumo Logic account.
+
+Organizations using SAML or other identity providers will continue to sign in as usual.
+
+[Learn more](/docs/get-started/sign-up/).
diff --git a/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md b/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md
index 324456175d..8ecc38e053 100644
--- a/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md
+++ b/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs.md
@@ -55,6 +55,6 @@ The injection allows you to click a link from the Trace View tab and launch a se
```
-## Additional information
+## Additional resources
* [NLog.DiagnosticSource | GitHub](https://github.com/NLog/NLog.DiagnosticSource)
diff --git a/docs/dashboards/drill-down-to-discover-root-causes.md b/docs/dashboards/drill-down-to-discover-root-causes.md
index d6d2028432..c76997b04f 100644
--- a/docs/dashboards/drill-down-to-discover-root-causes.md
+++ b/docs/dashboards/drill-down-to-discover-root-causes.md
@@ -15,7 +15,7 @@ Not all error states will provide related content links.
To discover and view related content, do the following:
-1. Log in to Sumo Logic and open the Dashboard.
+1. Sign in to Sumo Logic and open the Dashboard.
1. Select the graph data point you are interested in. In the following screenshot, we selected a bar in a bar chart. A panel appears on the right of the window with details and a list of related content links.
## Summary tab
diff --git a/docs/get-started/quickstart.md b/docs/get-started/quickstart.md
index a78eae7886..ee626dc074 100644
--- a/docs/get-started/quickstart.md
+++ b/docs/get-started/quickstart.md
@@ -79,7 +79,7 @@ OpenTelemetry is our preferred collector unless you're configuring security data
#### OpenTelemetry Collector
-1. Log in to Sumo Logic.
+1. Sign in to Sumo Logic.
1. In the main Sumo Logic menu, select **App Catalog**.
1. Click the app you'd like to install.
1. Click the **Add a New Collector** option during app installation.
@@ -90,7 +90,7 @@ OpenTelemetry is our preferred collector unless you're configuring security data
#### Installed and Hosted Collector
-1. Log in to Sumo Logic.
+1. Sign in to Sumo Logic.
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**.
1. Select **Add Collector**.
1. Choose from our [Hosted Collector](/docs/send-data/hosted-collectors) (web-hosted) or [Installed Collector](/docs/send-data/installed-collectors) (locally installed on your machine).
@@ -158,14 +158,14 @@ From the Sumo Logic Home page, click the **Learn** tab to access:
Don't just learn it - master it! Get recognized as a Sumo Logic expert by completing the courses in the [Sumo Logic Certification Program](/docs/get-started/training-certification-faq/#what-certifications-does-sumo-logic-offer). We’re happy to help you get certified right from the product.
-## Additional information
-
-:::sumo Need help?
-Contact us at the [Sumo Dojo Slack](https://sumodojo.slack.com/) or [submit a support ticket](https://support.sumologic.com/support/s).
-:::
+## Additional resources
* [Choosing a Sumo Logic Collector and Source](/docs/send-data/choose-collector-source/)
-* [Kubernetes Quickstart](/docs/observability/kubernetes/quickstart). Get up and running with the Sumo Logic Kubernetes solution in minutes.
-* [Traces Quickstart](/docs/apm/traces/quickstart). This guide demonstrates how to measure application microservice performance.
+* [Kubernetes Quickstart](/docs/observability/kubernetes/quickstart)
+* [Traces Quickstart](/docs/apm/traces/quickstart)
See more quickstart tutorials in the [Sumo Logic Training Portal](/docs/get-started/training-certification-faq/#how-do-i-access-the-training-portal).
+
+:::sumo Need help?
+Contact us at the [Sumo Dojo Slack](https://sumodojo.slack.com/) or [submit a support ticket](https://support.sumologic.com/support/s).
+:::
diff --git a/docs/get-started/sign-up.md b/docs/get-started/sign-up.md
index 85b1df3a9c..40f9315e79 100644
--- a/docs/get-started/sign-up.md
+++ b/docs/get-started/sign-up.md
@@ -7,23 +7,87 @@ description: Learn how to sign up with Sumo Logic and create your account.
import useBaseUrl from '@docusaurus/useBaseUrl';
-Sumo Logic provides everything you need to conduct real-time forensics and log management for all of your IT data—without the hassle of managing or scaling hardware or storage. Start your 30-day trial and explore the full capabilities of our Continuous Intelligence Platform™, including elastic scalability and powerful analytics.
+Sumo Logic provides everything you need to conduct real-time forensics and log management for all of your IT data—without the hassle of managing or scaling hardware or storage. Start your 30-day trial and explore the full capabilities of our Sumo Logic Log Analytics Platform, including elastic scalability and powerful analytics.
-After your trial, your account will automatically convert to a [Free account](#upgrade-or-continue-with-free-account), allowing you to continue with limited features. You can [upgrade to a paid plan](https://www.sumologic.com/pricing) at any time to unlock premium features. Choose to sign up via the [Sumo Logic website](#sign-up-through-sumo-logic) or the [AWS Marketplace](#sign-up-through-aws-marketplace) and start using Sumo Logic in minutes.
+After your trial, your account will automatically convert to a [Free account](#upgrade-or-continue-with-free-account), allowing you to continue with limited features. You can [upgrade to a paid plan](https://www.sumologic.com/pricing) at any time to unlock premium features. Choose to sign up through [Sumo Logic](#sign-up-through-sumo-logic) or the [AWS Marketplace](#sign-up-through-aws-marketplace) and start using Sumo Logic in minutes.
## Sign up through Sumo Logic
-To start your free trial:
+To start your free trial, head to the [Sumo Logic Free Trial page](https://www.sumologic.com/sign-up). You can register for an account using either Google single sign-on (SSO) or your email address.
-1. Go to the [Sumo Logic Free Trial page](https://www.sumologic.com/sign-up).
-1. Register with a business email address to create your account.
-1. Check your inbox for the activation email.
+### Register using Google SSO
+
+1. Click **Continue with Google** and select a Google account to use.
+1. Fill out the **Complete Your Account** form, then click **Activate**.
+1. Follow the setup guide to install a data collector and start ingesting data.
+
+### Register using your email address
+
+1. Click **Continue with email** and enter your business email address.
+1. Check your inbox for an activation email and click **Activate Now**.
:::note
The activation link expires after 3 days. If it expires, you’ll need to complete the sign-up process again.
:::
-1. Open the activation email and click **Activate Now**. (If you do not see it, check your spam and trash folders.)
-1. Fill out the **Activate Your Account** form, then click **Activate**.
-1. After activating your account, follow the guidance in the [What to expect after activation](#what-to-expect-after-activation) section to explore sample data, install apps, and start ingesting your own data.
+1. Fill out the **Complete Your Account** form, then click **Activate**.
+1. Follow the setup guide to install a data collector, apps, and start ingesting data. [Learn more](#what-to-expect-after-activation).
+
+## Sign in to Sumo Logic
+
+Once you're registered for an account, you can sign in using your Google SSO, email address and password, or-if configured by your organization-an [identity provider](/docs/manage/security/saml).
+
+### Set up data collection
+
+The first step is collecting data. Our [Kickstart Data](/docs/get-started/quickstart/#getting-started-with-kickstart-data-in-your-trial) provides preloaded sample data and dashboards, giving you an easy way to explore Sumo Logic’s features like log search and alerts before setting up your own data. It’s perfect for getting familiar with our platform and evaluating its capabilities.
+
+To start collecting your own data:
+
+1. Select the platform you want to collect data from (AWS, Kubernetes, Linux, Windows, or macOS). This will install the OpenTelemetry collector and relevant dashboards.
+1. For AWS, deploy a single account with a CloudFormation Template, CLI, or Terraform. For Kubernetes, Linux, Windows, or macOS, run the provided command in your Terminal or PowerShell. When the installation is complete, click **Start using Sumo**.
+
+Your data will start flowing in a couple of minutes. Next, you'll be taken to a step-by-step onboarding guide, where you can visualize your data via dashboards, run your first log search, set up alerts, install apps, and more.
+
+Alternatively, you can skip setup for now and browse our [App Catalog](/docs/integrations) to install prebuilt apps with easy-to-follow setup guides.
+
+
+### Upgrade or continue with Free account
+
+After your trial ends, if you've not purchased a plan, your account will automatically convert to a Free account. This account lets you continue using Sumo Logic monitoring and log analytics services with limited features. To unlock premium features and scale as your needs grow, you can upgrade to a paid plan at any time.
+
+
+What's the difference between a Trial and a Free account?
+
+With your trial, you’ll have full access to our Enterprise plan to explore all the powerful features Sumo Logic has to offer.
+
+| | Trial account | Free account
+|:------------|:---------------|:------------
+| Data volume daily | 1GB | 500MB
+| Users | Up to 20 | Up to 3
+| Data Retention 1| 30 days | 7 days
+| Metrics 2 | ✅ | ❌
+| Data Forwarding 3 | ✅ | ❌
+| Real-time Alerts 4 | ✅ | ❌
+
+1 Data uploaded to the Sumo Logic Cloud.
+2 Search through and visualize your data in near real-time, with up to 1000 data points per minute.
+3 Forwards your logs to an S3 bucket after being collected and analyzed in Sumo Logic.
+4 Notifies you in real-time when errors occur on your systems.
+
+
+
+For information on plan types and pricing, see [Sumo Logic Pricing](https://www.sumologic.com/pricing) and [Manage Subscription](/docs/manage/manage-subscription).
+
+#### Essentials plans
+
+Using our self-service checkout, you can sign up for a Sumo Logic Essentials plan in just minutes using a credit card—no need to interact with the sales team.
+
+- [Learn how to upgrade your plan with Credits account](/docs/manage/manage-subscription/upgrade-account/upgrade-credits-account).
+- [Learn how to upgrade your plan with Flex account](/docs/manage/manage-subscription/upgrade-account/upgrade-sumo-logic-flex-account).
+
+
+
+#### Enterprise plans
+
+If the Essentials plan doesn’t fully meet your needs and you’re interested in exploring further options like Cloud SIEM, contact [Sales](https://www.sumologic.com/contact-us/) to upgrade to an Enterprise plan. Our team is here to help you find the best fit for your organization.
## Sign up through AWS Marketplace
diff --git a/docs/get-started/sumo-logic-ui-classic.md b/docs/get-started/sumo-logic-ui-classic.md
index 986e0137fc..35e76203e5 100644
--- a/docs/get-started/sumo-logic-ui-classic.md
+++ b/docs/get-started/sumo-logic-ui-classic.md
@@ -136,7 +136,7 @@ To launch a search, metrics visualization, or live tail session, do the followin
### View recent dashboards and searches
-You see the Home landing page when you first log in to Sumo Logic. The Home page provides an at-a-glance view of the following:
+You see the Home landing page when you first sign in to Sumo Logic. The Home page provides an at-a-glance view of the following:
* Recently opened dashboards
* Recently run searches
diff --git a/docs/get-started/training-certification-faq.md b/docs/get-started/training-certification-faq.md
index 3699fb8a12..c024077e4b 100644
--- a/docs/get-started/training-certification-faq.md
+++ b/docs/get-started/training-certification-faq.md
@@ -21,7 +21,7 @@ Our self-paced training, micro lessons, and scheduled instructor-led training ar
### How do I access the Training Portal?
-1. First, log in to Sumo Logic.
+1. Sign in to Sumo Logic.
1. From the **Home** page, click the **Learn** tab.
1. Click **Get Certified**. You'll be redirected to the portal page, where you can access all courses and certifications.
diff --git a/docs/integrations/app-development/jfrog-artifactory.md b/docs/integrations/app-development/jfrog-artifactory.md
index 6d29499182..a0b4251fd2 100644
--- a/docs/integrations/app-development/jfrog-artifactory.md
+++ b/docs/integrations/app-development/jfrog-artifactory.md
@@ -186,7 +186,7 @@ If you do not have an existing Sumo Logic account and it is your first time here
If you already have an existing Sumo Logic account created outside of Artifactory Online:
1. Select **Connection URL** and copy and paste the URL of an existing Sumo Logic [HTTP Logs and Metrics Source](/docs/send-data/hosted-collectors/http-source/logs-metrics) in the **Connection URL** text box.

-1. Log in to Sumo Logic and verify that your logs are flowing in as expected.
+1. Sign in to Sumo Logic and verify that your logs are flowing in as expected.
1. Go to our **Apps Catalog**, search for **Artifactory**, then install the [Sumo Logic app for Artifactory 7](/docs/integrations/app-development/jfrog-artifactory) to get instant insight into your Artifactory logs.
### If you have an existing connection
diff --git a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md
index 02f1e93eb2..14dad7e50e 100644
--- a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md
+++ b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10.md
@@ -52,7 +52,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi
To configure a hosted collector with a Cloud Syslog source, do the following:
-1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
+1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following:
* Enter a Source Name.
* Provide a Source Category: **NW/PAN/V10**
@@ -103,7 +103,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm
To verify the logs in Palo Alto Networks, do the following:
1. In the Palo Alto Networks UI, select **Monitor** > **Logs**.
-2. Once the setup is done, log in to Sumo Logic.
+2. Once the setup is done, sign in to Sumo Logic.
3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as: `_sourceCategory = NW/PAN/V10`.
@@ -179,4 +179,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
import AppUninstall from '../../reuse/apps/app-uninstall.md';
-
\ No newline at end of file
+
diff --git a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md
index 6152fd207d..3607eaa57f 100644
--- a/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md
+++ b/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9.md
@@ -62,7 +62,7 @@ In this step, you configure a hosted collector with a Cloud Syslog source that w
To configure a hosted collector with a Cloud Syslog source, do the following:
-1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
+1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following:
* Enter a Source Name.
* Provide a Source Category: **NW/PAN/V9**
@@ -121,7 +121,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm
To verify the logs in Palo Alto Networks, do the following:
1. In the Palo Alto Networks UI, select **Monitor** > **Logs**.
-2. Once the setup is done, log in to Sumo Logic.
+2. Once the setup is done, sign in to Sumo Logic.
3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as: `_sourceCategory = NW/PAN/V9`.
@@ -199,4 +199,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
import AppUninstall from '../../reuse/apps/app-uninstall.md';
-
\ No newline at end of file
+
diff --git a/docs/integrations/pci-compliance/palo-alto-networks-10.md b/docs/integrations/pci-compliance/palo-alto-networks-10.md
index 11c8135750..4140e21ce5 100644
--- a/docs/integrations/pci-compliance/palo-alto-networks-10.md
+++ b/docs/integrations/pci-compliance/palo-alto-networks-10.md
@@ -46,7 +46,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi
To configure a hosted collector with a Cloud Syslog source, do the following:
-1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector.md).
+1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector.md).
2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following:
1. Enter a Source Name.
2. Provide a Source Category: **NW/PAN/V10**
@@ -88,7 +88,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm
To verify the logs in Palo Alto Networks, do the following:
1. In the Palo Alto Networks UI, select **Monitor** > **Logs**.
-2. Once the setup is done, log in to Sumo Logic.
+2. Once the setup is done, sign in to Sumo Logic.
3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as:
`_sourceCategory = NW/PAN/V10`
@@ -209,4 +209,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
import AppUninstall from '../../reuse/apps/app-uninstall.md';
-
\ No newline at end of file
+
diff --git a/docs/integrations/pci-compliance/palo-alto-networks-9.md b/docs/integrations/pci-compliance/palo-alto-networks-9.md
index 2d8b29c8b3..d79796aebc 100644
--- a/docs/integrations/pci-compliance/palo-alto-networks-9.md
+++ b/docs/integrations/pci-compliance/palo-alto-networks-9.md
@@ -39,7 +39,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi
To configure a hosted collector with a Cloud Syslog source, do the following:
-1. Log in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector/).
+1. Sign in to Sumo Logic and [create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector/).
2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following:
1. Enter a Source Name.
2. Provide a Source Category: **NW/PAN/V9**
diff --git a/docs/integrations/saas-cloud/pagerduty-v2.md b/docs/integrations/saas-cloud/pagerduty-v2.md
index e1ee60ca58..18f388b3e3 100644
--- a/docs/integrations/saas-cloud/pagerduty-v2.md
+++ b/docs/integrations/saas-cloud/pagerduty-v2.md
@@ -51,7 +51,7 @@ A **Hosted Collector** is not installed on a local system in your deployment. In
An **HTTP Source** is an endpoint for receiving log and metric data uploaded to a unique URL generated for the Source. The URL securely encodes the Collector and Source information. You can add as many HTTP Logs and Metrics Sources as you'd like to a single Hosted Collector.
To configure Hosted Collector and HTTP Source, do the following:
-1. Log in to Sumo Logic.
+1. Sign in to Sumo Logic.
2. Follow the instructions for configuring a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
3. Follow the instructions for configuring an [HTTP Source](/docs/send-data/hosted-collectors/http-source/logs-metrics).
diff --git a/docs/integrations/saas-cloud/pagerduty-v3.md b/docs/integrations/saas-cloud/pagerduty-v3.md
index 2492d34215..a9f0d4c087 100644
--- a/docs/integrations/saas-cloud/pagerduty-v3.md
+++ b/docs/integrations/saas-cloud/pagerduty-v3.md
@@ -59,7 +59,7 @@ An **HTTP Source** is an endpoint for receiving log and metric data uploaded to
To configure Hosted Collector and HTTP Source, do the following:
-1. Log in to Sumo Logic.
+1. Sign in to Sumo Logic.
2. Follow the instructions for configuring a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
3. Follow the instructions for configuring an [HTTP Source](/docs/send-data/hosted-collectors/http-source/logs-metrics).
diff --git a/docs/integrations/security-threat-detection/palo-alto-networks-9.md b/docs/integrations/security-threat-detection/palo-alto-networks-9.md
index 6fa56bd2bf..f629e3cea4 100644
--- a/docs/integrations/security-threat-detection/palo-alto-networks-9.md
+++ b/docs/integrations/security-threat-detection/palo-alto-networks-9.md
@@ -98,7 +98,7 @@ In this step you configure a hosted collector with a Cloud Syslog source that wi
To configure a hosted collector with a Cloud Syslog source, do the following:
-1. Log in to Sumo Logic and create a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
+1. Sign in to Sumo Logic and create a [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
2. Create a [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source) on the hosted collector, specifying the following:
1. Enter a Source Name.
2. Provide a Source Category. **NW/PAN/V9**.
@@ -163,7 +163,7 @@ In this step, you view logs using the Palo Alto Network Web interface to confirm
To verify the logs in Palo Alto Networks, do the following:
1. In the Palo Alto Networks UI, select **Monitor** > **Logs**.
-2. Once the setup is done, log in to Sumo Logic.
+2. Once the setup is done, sign in to Sumo Logic.
3. To validate that the logs are flowing to Sumo Logic, run a query using the source category you configured during [Step 1](#step-1-create-a-hosted-collector-and-cloud-syslog-source), such as:
```sql
_sourceCategory = NW/PAN/V9
@@ -329,4 +329,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
import AppUninstall from '../../reuse/apps/app-uninstall.md';
-
\ No newline at end of file
+
diff --git a/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md b/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md
index b512ac6336..1c62b1b4a6 100644
--- a/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md
+++ b/docs/manage/manage-subscription/cloud-flex-legacy-accounts.md
@@ -164,7 +164,7 @@ The following visual indicators apply:
To switch between views and time interval displays, do the following:
-1. Log in to Sumo Logic.
+1. Sign in to Sumo Logic.
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Account > Account Overview**.
[**New UI**](/docs/get-started/sumo-logic-ui/). In the top menu select **Administration**, and then under **Account** select **Account Overview**. You can also click the **Go To...** menu at the top of the screen and select **Account Overview**.
The Account page appears with the Account Overview tab shown by default. The top panel shows account details and the bottom panel displays usage analytics.

1. To change the type of analytics you are viewing, in the **Usage (Daily Capacity)** panel click the arrow next to the view name and select the analytics type from the dropdown list. The display data changes accordingly. Repeat as needed to monitor all the areas of your account usage.
1. To view data from a different billing period, click the arrow next the the **Billing period** and choose another period from the dropdown list.

diff --git a/docs/manage/security/saml/integrate-aws-sso.md b/docs/manage/security/saml/integrate-aws-sso.md
index 9d83050e06..a9af159223 100644
--- a/docs/manage/security/saml/integrate-aws-sso.md
+++ b/docs/manage/security/saml/integrate-aws-sso.md
@@ -66,4 +66,4 @@ This section has instructions for configuring basic SAML in Sumo Logic.
* [Add Users to Groups](https://docs.aws.amazon.com/singlesignon/latest/userguide/adduserstogroups.html)
1. Click **Assign Users** to complete the addition of your users to the configuration.
-This completes the setup for AWS Single Sign-On to Sumo Logic. Your users should now be able to login to Sumo Logic from your AWS SAML Application page by clicking the SumoLogic tile.
+This completes the setup for AWS Single Sign-On to Sumo Logic. Your users should now be able to sign in to Sumo Logic from your AWS SAML Application page by clicking the SumoLogic tile.
diff --git a/docs/manage/security/saml/integrate-sumo-with-azure-ad.md b/docs/manage/security/saml/integrate-sumo-with-azure-ad.md
index 4338159a6a..8f50851241 100644
--- a/docs/manage/security/saml/integrate-sumo-with-azure-ad.md
+++ b/docs/manage/security/saml/integrate-sumo-with-azure-ad.md
@@ -93,7 +93,7 @@ Do **not** close the **Setup Single Sign-On with SAML** window, you will return
1. Click **Save**.
1. In the left navigation pane, click **Users and Groups** in the **Manage** section.
1. Select **Add user/group**.
-1. Add the Users or Groups that should have access to login to Sumo Logic and then click **Assign**.
+1. Add the Users or Groups that should have access to sign in to Sumo Logic and then click **Assign**.
### Configure Azure AD to send Group assignments to Sumo (Optional)
diff --git a/docs/manage/security/saml/integrate-with-bitium.md b/docs/manage/security/saml/integrate-with-bitium.md
index 0725a14a03..ec733c1ff8 100644
--- a/docs/manage/security/saml/integrate-with-bitium.md
+++ b/docs/manage/security/saml/integrate-with-bitium.md
@@ -1,7 +1,7 @@
---
id: integrate-with-bitium
title: Integrate Sumo Logic with Bitium
-description: You can integrate Bitium with Sumo Logic’s SAML 2.0 API to allow users to log in to Sumo Logic using their Single Sign-On (SSO) credentials.
+description: You can integrate Bitium with Sumo Logic’s SAML 2.0 API to allow users to sign in to Sumo Logic using their Single Sign-On (SSO) credentials.
---
import useBaseUrl from '@docusaurus/useBaseUrl';
@@ -13,7 +13,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
| Cloud Flex | Trial, Enterprise |
| Credits | Trial, Essentials, Enterprise Operations, Enterprise Security, Enterprise Suite |
-Bitium is a cloud-based identity management provider that can be integrated with Sumo Logic’s SAML 2.0 API to allow users to log in to Sumo Logic using their Single Sign-On (SSO) credentials.SAML 2.0 API to allow users to log in to Sumo Logic using their Single Sign-On (SSO) credentials.
+Bitium is a cloud-based identity management provider that can be integrated with Sumo Logic’s SAML 2.0 API to allow users to sign in to Sumo Logic using their Single Sign-On (SSO) credentials.SAML 2.0 API to allow users to Sign in to Sumo Logic using their Single Sign-On (SSO) credentials.
You can sign up for a free Bitium Trial account on the [Bitum site](https://www.bitium.com).
@@ -68,7 +68,7 @@ You can sign up for a free Bitium Trial account on the [Bitum site](https://www.
1. Within the **SAML URL** text box, enter the Authentication Request URL displayed in step 6 of the previous section.
1. Click **Save Changes** to complete the application install.
1. Assign users as needed to the Sumo Logic App.
-1. You are now configured to login to Sumo Logic through Bitium.
+1. You are now configured to sign in to Sumo Logic through Bitium.
## Create multiple SAML configurations
diff --git a/docs/manage/security/saml/manage-permissions-with-adfs.md b/docs/manage/security/saml/manage-permissions-with-adfs.md
index 1566a71e7d..1e6b605b94 100644
--- a/docs/manage/security/saml/manage-permissions-with-adfs.md
+++ b/docs/manage/security/saml/manage-permissions-with-adfs.md
@@ -15,7 +15,7 @@ You can manage Sumo Logic user permissions using ADFS and SAML. To do this, you
Before you begin, here are a few key points, limitations, and tips:
* User permissions are updated upon every SSO login. This allows you to manage permissions for Sumo Logic users within Active Directory.
-* SAML does not provide a deprovisioning mechanism. This means that if a user is deleted or disabled in Active Directory, it will not be reflected in Sumo Logic. However, these users would no longer be able to login to Sumo Logic via SSO. The exception is Access Keys, and if SAML lockdown is not enabled, users would still be able to login via native accounts.
+* SAML does not provide a deprovisioning mechanism. This means that if a user is deleted or disabled in Active Directory, it will not be reflected in Sumo Logic. However, these users would no longer be able to sign in to Sumo Logic via SSO. The exception is Access Keys, and if SAML lockdown is not enabled, users would still be able to login via native accounts.
* Access Keys are NOT controlled by SAML. This means that if a user has been turned off on the SSO side, their Access Keys would still be valid. For this reason, administrators should audit users regularly and disable Access Keys when necessary.
* By default, administrators can create new Sumo Logic native logins in addition to SAML provisioned users. This creates the need to either audit your accounts or ask Sumo Logic Support to enable SAML Lock Down.
* SAML Lock Down disables the ability for users to login directly to Sumo Logic using username and password. There are also a few minor changes to user management behavior, such as not sending an email when a user’s email account is modified.
@@ -81,7 +81,7 @@ Now that you have setup SAML successfully, update the Roles Attribute (Optional)
To update the roles attribute:
-1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**.
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > SAML**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **SAML**. You can also click the **Go To...** menu at the top of the screen and select **SAML**.
1. Click **Configure**.
1. Activate the **Roles Attribute (Optional)** check box.
1. Enter the URL, for example, `https://sumologic.com/SAML/Attributes/Role`.
diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md
index 00ff2030db..3c45bc0a58 100644
--- a/docs/manage/security/saml/set-up-saml.md
+++ b/docs/manage/security/saml/set-up-saml.md
@@ -42,7 +42,7 @@ This means that if a user has been turned off on the SSO side, their access keys
### SAML does not provide a deprovisioning mechanism
-This means that if a user is deleted or disabled in the SSO database, it will not be reflected in Sumo Logic. However, these users would no longer be able to login to Sumo Logic via SSO. Administrators can delete these users from the **Administration > Users and Roles > Users** page in Sumo Logic. For information about what happens when a user is deleted, and transferring a deleted user's content to another user, see [Delete a User](../../users-roles/users/delete-user.md).
+This means that if a user is deleted or disabled in the SSO database, it will not be reflected in Sumo Logic. However, these users would no longer be able to sign in to Sumo Logic via SSO. Administrators can delete these users from the **Administration > Users and Roles > Users** page in Sumo Logic. For information about what happens when a user is deleted, and transferring a deleted user's content to another user, see [Delete a User](../../users-roles/users/delete-user.md).
### Only one certificate for each SAML configuration is currently supported
diff --git a/docs/platform-services/automation-service/automation-service-bridge.md b/docs/platform-services/automation-service/automation-service-bridge.md
index 285d358596..48c3954b9e 100644
--- a/docs/platform-services/automation-service/automation-service-bridge.md
+++ b/docs/platform-services/automation-service/automation-service-bridge.md
@@ -86,7 +86,7 @@ The Bridge has to be able to resolve DNS hostnames and needs to reach the below
## Get installation token
-Login to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with name prefix `csoar-bridge-token`.
+Sign in to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with name prefix `csoar-bridge-token`.
:::info
You must prefix your installation token with `csoar-bridge-token` in order for the Automation Bridge to connect to your CloudSOAR instance.
@@ -256,7 +256,7 @@ The automation bridge needs to be able to communicate with the Docker API to wor
|Environment Variable |Description |Default |
|:------------------------------------|:---------------|:----------|
|`API_URL_HERE` | To determine which is the correct SOAR_URL, see [Sumo Logic Endpoints by Deployment and Firewall Security](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security) and get the URL under the API Endpoint column. For example: `https://api.eu.sumologic.com/api/` | |
-|`SOAR_TOKEN_HERE` | Log in to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with the name prefix `csoar-bridge-token`. | |
+|`SOAR_TOKEN_HERE` | Sign in to Sumo Logic and create a new [installation token](/docs/manage/security/installation-tokens/) with the name prefix `csoar-bridge-token`. | |
|`SIEM_URL_HERE` | The HTTPS Source endpoint URL from a Hosted Sumo Logic Collector. | NONE |
|`BRIDGE_ALIAS_HERE` | Provide the alias name. With bridge ALIAS, it is possible to distinguish which integration resources will be executed with this automation bridge. When a new integration resource is created or edited, it is possible to select the default ALIAS or to create a new one. So every automatic action configured to use this resource will be performed with the bridge that has the same ALIAS. | NONE |
diff --git a/docs/send-data/opentelemetry-collector/quickstart.md b/docs/send-data/opentelemetry-collector/quickstart.md
index 77146bbebd..7da87b8cf6 100644
--- a/docs/send-data/opentelemetry-collector/quickstart.md
+++ b/docs/send-data/opentelemetry-collector/quickstart.md
@@ -33,7 +33,7 @@ We'll show a simple example of running a single collector, on a single machine,
In this section, you'll install Sumo Logic’s OpenTelemetry collector on your machine, add a configuration file to describe the metric you want to collect, then start running the collector. The data will appear in the Sumo Logic UI instantly. As a use case, we'll collect memory usage information from a host and send that to Sumo Logic for storage and analysis.
-### Step 1: Log in to Sumo
+### Step 1: Sign in to Sumo
[Sign in](https://service.sumologic.com/ui/) to your Sumo Logic as you normally would.
diff --git a/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md b/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md
index cd4bdaa521..2ec6931804 100644
--- a/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md
+++ b/docs/send-data/use-json-configure-sources/json-parameters-installed-sources.md
@@ -594,7 +594,7 @@ Graphite contentType JSON example:
}
```
-## Additional information
+## Additional resources
See the following topics for additional information:
* [Use JSON to configure Sources](/docs/send-data/use-json-configure-sources). The topic includes a list of [common parameters](/docs/send-data/use-json-configure-sources) for all log Source types. For Sources, the common parameter `name` must be unique per Collector.
diff --git a/sidebarsCommunity.js b/sidebarsCommunity.js
index b4e8fa9c96..f9fda89f55 100644
--- a/sidebarsCommunity.js
+++ b/sidebarsCommunity.js
@@ -79,7 +79,7 @@ module.exports = {
},
{
type: 'link',
- label: 'Log in to Sumo',
+ label: 'Sign in to Sumo',
href: 'https://service.sumologic.com',
},
],