Skip to content

Commit 08e940e

Browse files
authored
Merge branch 'main' into Cisco-AMP-App
2 parents 81ea4cd + a5c524d commit 08e940e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+1365
-654
lines changed

blog-service/2023/12-31.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -758,7 +758,9 @@ We're excited to announce the release of our new cloud-to-cloud source for Trell
758758

759759
We’re happy to announce a new security option allowing administrators to set a custom policy for the number of days an API Access Key can go unused before being automatically deactivated. This setting allows administrators to tailor the feature to suit their organization’s specific security requirements. This enhances the security of your account by reducing the risk of unauthorized access through abandoned access keys. This ensures that only active access keys can be used to access your account and its resources.
760760

761-
To access this feature, log in to your account and navigate to **Administration > Security > Policies**. From there, you can set your preferred policy for deactivation of unused access keys. [Learn more](/docs/manage/security/access-keys#edit-deactivate-or-delete-an-access-key).
761+
To access this feature, log in to your account and navigate to **Policies**. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Security > Policies**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Account Security Settings** select **Policies**. You can also click the **Go To...** menu at the top of the screen and select **Policies**.
762+
763+
From there, you can set your preferred policy for deactivation of unused access keys. [Learn more](/docs/manage/security/access-keys#edit-deactivate-or-delete-an-access-key).
762764

763765

764766
---

blog-service/2024-10-14-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ We're excited to announce that when you create a role, you can select **Index Ac
1717
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
1818

1919
:::note
20-
These changes are rolling out across deployments incrementally and will be available on all deployments by December 16, 2024.
20+
These changes are rolling out across deployments incrementally and will be available on all deployments by January 10, 2025.
2121
:::
2222

2323
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role).

docs/contributing/style-guide.md

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1533,6 +1533,8 @@ If you need to use mouse actions to be specific, use:
15331533
15341534
## Videos
15351535
1536+
### YouTube
1537+
15361538
To embed a YouTube video on a doc:
15371539
15381540
1. Copy and paste the following code into your page (including the `import Iframe` line).
@@ -1596,3 +1598,50 @@ import Iframe from 'react-iframe';
15961598

15971599
</TabItem>
15981600
</Tabs>
1601+
1602+
### Other video types
1603+
1604+
You can use similar coding to embed videos from other vendors than YouTube. Following is example coding to embed videos from Wistia.
1605+
1606+
<Tabs
1607+
className="unique-tabs"
1608+
defaultValue="Markdown"
1609+
values={[
1610+
{label: 'Markdown', value: 'Markdown'},
1611+
{label: 'Result', value: 'Result'},
1612+
]}>
1613+
1614+
<TabItem value="Markdown">
1615+
1616+
```html
1617+
<Iframe url="https://fast.wistia.net/embed/iframe/yebz0v90tx?web_component=true&seo=true&videoFoam=false"
1618+
width="854px"
1619+
height="480px"
1620+
id="wistiaVideo"
1621+
className="video-container"
1622+
display="initial"
1623+
position="relative"
1624+
allow="autoplay; fullscreen"
1625+
allowfullscreen
1626+
/>
1627+
```
1628+
1629+
</TabItem>
1630+
<TabItem value="Result">
1631+
1632+
<Iframe url="https://fast.wistia.net/embed/iframe/yebz0v90tx?web_component=true&seo=true&videoFoam=false"
1633+
width="854px"
1634+
height="480px"
1635+
id="wistiaVideo"
1636+
className="video-container"
1637+
display="initial"
1638+
position="relative"
1639+
allow="autoplay; fullscreen"
1640+
allowfullscreen
1641+
/>
1642+
</TabItem>
1643+
</Tabs>
1644+
1645+
:::note
1646+
Typically you must include `import Iframe from 'react-iframe';` with the markdown. It is not included in the example above because it was already called in the previous markdown for YouTube.
1647+
:::

docs/cse/administration/mitre-coverage.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ Coverage data is updated on the page once a day. To determine your coverage, the
2424

2525
Watch this micro lesson to learn about the MITRE ATT&CK Threat Coverage Explorer.
2626

27+
<!-- old YouTube video embedding
2728
<Iframe url="https://www.youtube.com/embed/O1SmpbL4gos?rel=0"
2829
width="854px"
2930
height="480px"
@@ -34,6 +35,18 @@ Watch this micro lesson to learn about the MITRE ATT&CK Threat Coverage Explorer
3435
allow="accelerometer; clipboard-write; encrypted-media; gyroscope; picture-in-picture"
3536
allowfullscreen
3637
/>
38+
-->
39+
40+
<Iframe url="https://fast.wistia.net/embed/iframe/yebz0v90tx?web_component=true&seo=true&videoFoam=false"
41+
width="854px"
42+
height="480px"
43+
id="wistiaVideo"
44+
className="video-container"
45+
display="initial"
46+
position="relative"
47+
allow="autoplay; fullscreen"
48+
allowfullscreen
49+
/>
3750

3851
## User interface
3952

docs/integrations/microsoft-azure/azure-api-management.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ Azure service sends monitoring data to Azure Monitor, which can then [stream dat
2626
* Logs collection from [Azure Monitor](https://docs.microsoft.com/en-us/azure/monitoring-and-diagnostics/monitoring-get-started) using our [Azure Event Hubs source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/).
2727
* Metrics collection using our [HTTP Logs and Metrics source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/) via Azure Functions deployed using the ARM template.
2828

29-
You must explicitly enable diagnostic settings for each Azure API Management service you want to monitor. You can forward logs to the same event hub provided they satisfy the limitations and permissions as described [here](https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/diagnostic-settings?tabs=portal#destination-limitations).
29+
You must explicitly enable diagnostic settings for each Azure API Management service you want to monitor. You can forward logs to the same Event Hub provided they satisfy the limitations and permissions as described [here](https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/diagnostic-settings?tabs=portal#destination-limitations).
3030

31-
When you configure the event hubs source or HTTP source, plan your source category to ease the querying process. A hierarchical approach allows you to make use of wildcards. For example: `Azure/APIManagement/Logs`, `Azure/APIManagement/Metrics`.
31+
When you configure the Event Hubs source or HTTP source, plan your source category to ease the querying process. A hierarchical approach allows you to make use of wildcards. For example: `Azure/APIManagement/Logs`, `Azure/APIManagement/Metrics`.
3232

3333
### Configure field in field schema
3434

@@ -112,14 +112,14 @@ If this rule already exists, there is no need to create it again.
112112
| service_type | $resourceId._6 |
113113
| service_name | $resourceId._7 |
114114
115-
#### Azure observability metadata extraction application gateway level
115+
#### Azure observability metadata extraction Azure API management level
116116
117117
```sql
118-
Rule Name: AzureObservabilityMetadataExtractionAppGatewayLevel
118+
Rule Name: AzureObservabilityMetadataExtractionAzureAPIManagementLevel
119119
```
120120
121121
```sql title="Metric match expression"
122-
resourceId=/SUBSCRIPTIONS/*/RESOURCEGROUPS/*/PROVIDERS/*/APPLICATIONGATEWAYS/* tenant_name=*
122+
resourceId=/SUBSCRIPTIONS/*/RESOURCEGROUPS/*/PROVIDERS/MICROSOFT.APIMANAGEMENT/SERVICE/* tenant_name=*
123123
```
124124
| Fields extracted | Metric rule |
125125
|:------------------|:------------------------|
@@ -139,7 +139,7 @@ In this section, you will configure a pipeline for shipping metrics from Azure M
139139
1. [Export metrics to Event Hub](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-3-export-metrics-for-a-particular-resource-to-event-hub). Perform below steps for each Azure API Management that you want to monitor.
140140
1. Choose `Stream to an event hub` as destination.
141141
1. Select `AllMetrics`.
142-
1. Use the Event hub namespace created by the ARM template in Step 2 above. You can create a new Event hub or use the one created by ARM template. You can use the default policy `RootManageSharedAccessKey` as the policy name. <br/><img src={useBaseUrl('img/send-data/azure-apimanagement-metrics.png')} alt="Azure application gateway metrics" style={{border: '1px solid gray'}} width="800" />
142+
1. Use the Event Hub namespace created by the ARM template in Step 2 above. You can create a new Event Hub or use the one created by ARM template. You can use the default policy `RootManageSharedAccessKey` as the policy name. <br/><img src={useBaseUrl('img/send-data/azure-apimanagement-metrics.png')} alt="Azure API management metrics" style={{border: '1px solid gray'}} width="800" />
143143
1. Tag the location field in the source with right location value. <br/><img src={useBaseUrl('img/integrations/microsoft-azure/Azure-Storage-Tag-Location.png')} alt="Azure API Management Tag Location" style={{border: '1px solid gray'}} width="400" />
144144
145145
:::note
@@ -153,7 +153,7 @@ In the v2 service tiers, API Management has replaced the capacity metric with se
153153
In this section, you will configure a pipeline for shipping diagnostic logs from Azure Monitor to an Event Hub.
154154
155155
1. To set up the Azure Event Hubs source in Sumo Logic, refer to the [Azure Event Hubs Source for Logs](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/).
156-
1. To create the diagnostic settings in Azure portal, refer to the [Azure documentation](https://learn.microsoft.com/en-gb/azure/data-factory/monitor-configure-diagnostics). Perform the steps below for each Azure application gateway account that you want to monitor.
156+
1. To create the diagnostic settings in Azure portal, refer to the [Azure documentation](https://learn.microsoft.com/en-gb/azure/data-factory/monitor-configure-diagnostics). Perform the steps below for each Azure API management account that you want to monitor.
157157
1. Choose **Stream to an event hub** as the destination.
158158
1. Select `allLogs`.
159159
1. Use the Event Hub namespace and Event Hub name configured in the previous step in the destination details section. You can use the default policy `RootManageSharedAccessKey` as the policy name.<br/><img src={useBaseUrl('img/send-data/azure-apimanagement-logs.png')} alt="Azure API Management logs" style={{border: '1px solid gray'}} width="800" />

0 commit comments

Comments
 (0)