Skip to content

Commit 177329d

Browse files
committed
Merge branch 'main' into DOCS-752
2 parents e46c954 + b0cc322 commit 177329d

File tree

27 files changed

+365
-122
lines changed

27 files changed

+365
-122
lines changed

blog-cse/2025-03-24-content.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: March 24, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- rules
6+
hide_table_of_contents: true
7+
---
8+
9+
import useBaseUrl from '@docusaurus/useBaseUrl';
10+
11+
This content release includes Threat Intelligence match rules that use the new [`hasThreatMatch`](/docs/cse/rules/cse-rules-syntax/#hasthreatmatch) operator to support both global and custom threat intelligence feeds.
12+
13+
To reduce initial signal volume, basic inbound and outbound IP address threat match rules with a low or medium confidence level are disabled by default (see below). We highly recommend tuning these rules before enabling them to reduce signal volume, and therefore entity risk assignment, to manageable levels.
14+
15+
### Rules
16+
* MATCH-S00999 Threat Intel - IMPHASH Match
17+
* MATCH-S01000 Threat Intel - MD5 Match
18+
* MATCH-S01001 Threat Intel - PEHASH Match
19+
* MATCH-S01002 Threat Intel - SSDEEP Match
20+
* MATCH-S01003 Threat Intel - SHA1 Match
21+
* MATCH-S01004 Threat Intel - SHA256 Match
22+
* MATCH-S01005 Threat Intel - Source Hostname
23+
* MATCH-S01006 Threat Intel - Device Hostname
24+
* MATCH-S01007 Threat Intel - Destination Device Hostname
25+
* MATCH-S01008 Threat Intel - HTTP Hostname
26+
* MATCH-S01009 Threat Intel - HTTP Referrer Hostname
27+
* MATCH-S01010 Threat Intel - DNS Query Domain
28+
* MATCH-S01011 Threat Intel - DNS Reply Domain
29+
* MATCH-S01012 Threat Intel - HTTP Referrer Domain
30+
* MATCH-S01013 Threat Intel - HTTP URL Root Domain
31+
* MATCH-S01014 Threat Intel - HTTP URL FQDN
32+
* MATCH-S01015 Threat Intel - HTTP URL
33+
* MATCH-S01025 Threat Intel - Inbound Traffic from Threat Feed IP (Low Confidence) - Disabled By Default
34+
* MATCH-S01026 Threat Intel - Destination IP Address (Low Confidence) - Disabled By Default
35+
* MATCH-S01027 Threat Intel - Inbound Traffic from Threat Feed IP (Medium Confidence) - Disabled By Default
36+
* MATCH-S01028 Threat Intel - Destination IP Address (Medium Confidence) - Disabled By Default
37+
* MATCH-S01023 Threat Intel - Inbound Traffic from Threat Feed IP (High Confidence)
38+
* MATCH-S01024 Threat Intel - Destination IP Address (High Confidence)
39+
* MATCH-S01018 Threat Intel - Successful Authentication from Threat Feed IP

blog-service/2025-03-20-apps.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: Azure Security - Advisor (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- azure-security-advisor
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
13+
We're excited to introduce the new Azure Security - Advisor app for Sumo Logic. By leveraging this app, security analysts can quickly assess Azure Advisor’s recommendations, track remediation progress over time, and take action to enhance the security and efficiency of their Azure infrastructure. [Learn more](/docs/integrations/microsoft-azure/azure-security-advisor/).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2824,6 +2824,7 @@
28242824
"/cid/30038": "/docs/integrations/microsoft-azure/azure-analysis-services",
28252825
"/cid/30039": "/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights",
28262826
"/cid/30040": "/docs/integrations/microsoft-azure/azure-hdinsight",
2827+
"/cid/30041": "/docs/integrations/microsoft-azure/azure-security-advisor",
28272828
"/cid/21001": "/docs/integrations/google/cloud-alloydb-for-postgresql",
28282829
"/cid/21342": "/docs/send-data/hosted-collectors/microsoft-source/azure-metrics-source",
28292830
"/cid/21343": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source",

docs/api/search-job.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -941,7 +941,11 @@ https://api.sumologic.com/api/v1/search/jobs/37589506F194FC80
941941

942942
## Bash this Search Job
943943

944-
You can use the following script to exercise the API.
944+
You can use the following script to exercise the API.
945+
946+
:::note
947+
Ensure that you send ACCESSID/ACCESSKEY pair even if cookies are sent for the Search Job APIs.
948+
:::
945949

946950
```bash
947951
#!/bin/bash

docs/integrations/amazon-aws/elastic-container-service.md

Lines changed: 79 additions & 107 deletions
Large diffs are not rendered by default.
Lines changed: 186 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,186 @@
1+
---
2+
id: azure-security-advisor
3+
title: Azure Security - Advisor
4+
description: Learn how to assess Azure Advisor’s recommendations, track remediation progress over time, and take action to enhance the security and efficiency of your Azure infrastructure.
5+
---
6+
7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
9+
<img src={useBaseUrl('img/integrations/microsoft-azure/azure-security-advisor.png')} alt="Thumbnail icon" width="50"/>
10+
11+
The **Azure Security - Advisor** app provides security analysts visibility into Azure Advisor’s recommendations on security, reliability, operational excellence, and cost optimization. It helps organizations proactively address risks, improve the cloud infrastructure's resiliency, and optimize Azure resource use.
12+
13+
:::info
14+
This app includes [built-in monitors](#azure-security---advisor-alerts). For details on creating custom monitors, refer to [Create monitors for Azure Security - Advisor app](#create-monitors-for-the-azure-security---advisor-app).
15+
:::
16+
17+
## Log types
18+
19+
You can collect the following logs for the Azure Security - Advisor app:
20+
21+
* [Security Recommendations](https://learn.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations)
22+
* [Cost Recommendations](https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-cost-recommendations)
23+
* [Reliability Recommendations](https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-reliability-recommendations)
24+
* [Operational Excellence Recommendations](https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-operational-excellence-recommendations)
25+
26+
### Sample log messages
27+
28+
<details>
29+
<summary>Recommendation</summary>
30+
31+
```json
32+
{
33+
"schemaId": "azureMonitorCommonAlertSchema",
34+
"data": {
35+
"essentials": {
36+
"alertId": "/subscriptions/11111111-1111-1111-1111-111111111/providers/Microsoft.AlertsManagement/alerts/c37da162-ef73-4621-7a47-7ad188fcf000",
37+
"alertRule": "Sumo-Advisor Inegration",
38+
"targetResourceType": "microsoft.containerservice/managedclusters",
39+
"alertRuleID": "/subscriptions/11111111-1111-1111-1111-111111111/resourceGroups/AG-SUMO/providers/microsoft.insights/activityLogAlerts/Sumo-Advisor Inegration",
40+
"severity": "Sev4",
41+
"signalType": "Activity Log",
42+
"monitorCondition": "Fired",
43+
"targetResourceGroup": "k8sjkse-azure-k8stest",
44+
"monitoringService": "Activity Log - Recommendation",
45+
"alertTargetIDs": [
46+
"/subscriptions/11111111-1111-1111-1111-111111111/resourcegroups/k8sjkse-azure-k8stest/providers/microsoft.containerservice/managedclusters/k8s-19-aks1-31-otc-dev-v4"
47+
],
48+
"configurationItems": [
49+
"k8s-19-aks1-31-otc-dev-v4"
50+
],
51+
"originAlertId": "23e7e500-ff78-6080-4a77-a1eb7f77501c_72d226723d2a3bd9e51379e34ed380ef",
52+
"firedDateTime": "2025-02-28T04:48:41.319118Z",
53+
"description": "Sumo-Advisor Inegration",
54+
"essentialsVersion": "1.0",
55+
"alertContextVersion": "1.0",
56+
"investigationLink": "https://portal.azure.com/#view/Microsoft_Azure_Monitoring_Alerts/Investigation.ReactView/alertId/%2fsubscriptions%2f11111111-1111-1111-1111-111111111%2fresourceGroups%2fk8sjkse-azure-k8stest%2fproviders%2fMicrosoft.AlertsManagement%2falerts%2fc37da162-ef73-4621-7a47-7ad188fcf000"
57+
},
58+
"alertContext": {
59+
"channels": "Operation",
60+
"claims": "{\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\":\"Microsoft.Advisor\"}",
61+
"caller": "Microsoft.Advisor",
62+
"correlationId": "5b3ef3ba-39b3-450c-824c-c26101c26b99",
63+
"eventSource": "Recommendation",
64+
"eventTimestamp": "2025-02-28T04:40:12.4607874+00:00",
65+
"httpRequest": "{\"clientIpAddress\":\"0.0.0.0\"}",
66+
"eventDataId": "23e7e500-ff78-6080-4a77-a1eb7f77501c",
67+
"level": "Informational",
68+
"operationName": "Microsoft.Advisor/recommendations/available/action",
69+
"operationId": "",
70+
"properties": {
71+
"recommendationSchemaVersion": "1.0",
72+
"recommendationCategory": "HighAvailability",
73+
"recommendationImpact": "High",
74+
"recommendationName": "Enable Autoscaling for your system node pools",
75+
"recommendationResourceLink": "https://portal.azure.com/#blade/Microsoft_Azure_Expert/RecommendationListBlade/source/ActivityLog/recommendationTypeId/70829b1a-272b-4728-b418-8f1a56432d33/resourceId/%2Fsubscriptions%2F11111111-1111-1111-1111-111111111%2Fresourcegroups%2Fk8sjkse-azure-k8stest%2Fproviders%2FMicrosoft.ContainerService%2FmanagedClusters%2Fk8s-19-aks1-31-otc-dev-v4",
76+
"recommendationType": "70829b1a-272b-4728-b418-8f1a56432d33"
77+
},
78+
"status": "Active",
79+
"subStatus": "",
80+
"tenantId": "",
81+
"submissionTimestamp": "2025-02-28T04:40:12.4607874+00:00",
82+
"ReceivedTime": "2025-02-28T04:46:34+00:00",
83+
"ingestionTime": "2025-02-28T04:46:37.5062562+00:00",
84+
"Activity Log Event Description": "A new recommendation is available."
85+
},
86+
"customProperties": {
87+
88+
}
89+
}
90+
}
91+
```
92+
</details>
93+
94+
### Sample queries
95+
96+
```sql title="Recommendation"
97+
_sourceCategory=azure/advisor
98+
| json field=_raw
99+
"data.alertContext.properties.recommendationResourceLink", "data.essentials.alertId", "data.alertContext.level", "data.alertContext.properties.recommendationImpact", "data.alertContext.ReceivedTime", "data.alertContext.properties.recommendationName", "data.alertContext.properties.recommendationCategory", "data.essentials.targetResourceType", "data.essentials.targetResourceGroup", "data.alertContext.tenantId", "data.essentials.investigationLink" as recommendation_link, alert_id, severity, impact, recommendation_eval_date,display_name, category,affected_resource_type, affected_resource_name, tenant_id, azure_portal_link nodrop
100+
| parse regex field=alert_id "subscriptions/(?<subscription_id>[a-f0-9\-]+)"
101+
102+
| replace(recommendation_eval_date,/(\.\d+Z)/, "") as recommendation_eval_date
103+
| replace(recommendation_eval_date,"T", " ") as date
104+
| tourl(recommendation_link,display_name) as recommendation
105+
```
106+
107+
## Setup
108+
109+
To send Azure Advisor events to Sumo Logic, you can configure the [Azure Advisor’s alert](https://learn.microsoft.com/en-us/azure/advisor/advisor-alerts-portal) with [Action group](https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/action-groups) as a webhook.
110+
111+
### Step 1: Configure Sumo Logic HTTP source
112+
113+
[Create Sumo Logic HTTP source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-1-configure-an-http-source) and make a note of the HTTP URL.
114+
115+
### Step 2: Create an Azure Advisor alert
116+
117+
Refer to [Create Azure Advisor alerts in the Azure portal](https://learn.microsoft.com/en-us/azure/advisor/advisor-alerts-portal) to configure an Azure Advisor alert for Sumo Logic.
118+
Sumo Logic recommends you to select the **Category and impact level** option in the **Condition** section while creating the alert.
119+
<img src={useBaseUrl('img/integrations/microsoft-azure/create-advisor-alert.png')} alt="Edit Advisor alert" style={{border: '1px solid gray'}} width="800" />
120+
121+
### Step 3: Create an action group
122+
123+
Refer to [Create an action group in the Azure portal](https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/action-groups#create-an-action-group-in-the-azure-portal) to create an action group for the Azure Advisor alert in step 2.
124+
125+
Sumo Logic recommends you to select the **Action type** as **Webhook** and then provide the Sumo Logic HTTP Source URL that you collected from step 1.
126+
<img src={useBaseUrl('img/integrations/microsoft-azure/create-action-group.png')} alt="Create an action group" style={{border: '1px solid gray'}} width="800" />
127+
128+
## Installing the Azure Security - Advisor app
129+
130+
This section shows you how to install the Azure Security - Advisor app for Sumo Logic.
131+
132+
import AppInstall from '../../reuse/apps/app-install.md';
133+
134+
<AppInstall/>
135+
136+
## Viewing the Azure Security - Advisor dashboards
137+
138+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
139+
140+
<ViewDashboards/>
141+
142+
### Advisor Security Recommendations
143+
144+
The **Azure Security - Advisor Security Recommendations** dashboard provides security analysts with insights into security recommendations from Azure Advisor, categorized by severity (high, medium, low) to help prioritize risks. It highlights affected resource types and assets, enabling quick identification of vulnerabilities. A trend analysis graph visualizes recommendation patterns over time, tracking improvements and recurring risks. The Top Action Plan section lists prioritized recommendations with timestamps and affected resources for efficient remediation. Additionally, a summary of recommendations offers a broader view of risks across Azure services, helping security teams enhance their security posture and mitigate vulnerabilities.<br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Security+Recommendations.png')} alt="Advisor Security Recommendations" style={{border: '1px solid gray'}} width="800" />
145+
146+
### Advisor Cost Recommendations
147+
148+
The **Azure Security - Advisor Cost Recommendations** dashboard provides security analysts with cost optimization strategies for Azure, helping identify idle and underutilized resources to reduce cloud spending. It categorizes recommendations by impact level, highlighting priority areas for cost-saving actions. The Affected Resources panel identifies services, such as compute disks, that may benefit from resizing or deallocation. A timeline visualization tracks cost recommendations over time to monitor trends and assess optimization effectiveness. The Cost Recommendation Summary details recommendations, their impact, and associated resources, aiding informed decision-making. This dashboard helps maintain financial efficiency while ensuring optimal resource utilization in Azure.<br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Cost+Recommendations.png')} alt="Advisor Cost Recommendations" style={{border: '1px solid gray'}} width="800" />
149+
150+
### Advisor Reliability Recommendations
151+
152+
The **Azure Security - Advisor Reliability Recommendations** dashboard provides security analysts with insights into reliability risks affecting business-critical applications. It categorizes recommendations by severity (high, medium, low) to help prioritize reliability concerns. The dashboard highlights affected resource types and assets for quick identification of infrastructure issues. A timeline visualization tracks recommendation trends, offering insights into recurring risks. The Top Action Plan section lists prioritized recommendations with timestamps and affected resources for efficient remediation. Additionally, the Security Recommendation Summary provides an overview of reliability risks across Azure services. This dashboard helps security teams enhance system resilience, minimize downtime, and ensure optimal application performance. <br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Reliability+Recommendations.png')} alt="Advisor Reliability Recommendations" style={{border: '1px solid gray'}} width="800" />
153+
154+
### Advisor Operational Excellence Recommendations
155+
156+
The **Azure Security - Advisor Operational Excellence Recommendations** dashboard provides security analysts with insights into optimizing process workflows, enhancing resource manageability, and enforcing deployment best practices. It categorizes recommendations by impact (medium and low) to help prioritize improvements for streamlining cloud operations. The Affected Resources panel highlights impacted services, with a focus on Azure Kubernetes Service (AKS) clusters. A timeline visualization tracks trends in recommendations over time, offering a historical perspective on operational issues. The Recommendation Summary details specific recommendations and associated resources for targeted action. This dashboard helps security teams improve system reliability and maintain efficient cloud operations.<br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Operational+Excellence+Recommendations.png')} alt="Advisor Operational Excellence Recommendations" style={{border: '1px solid gray'}} width="800" />
157+
158+
## Create monitors for the Azure Security - Advisor app
159+
160+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
161+
162+
<CreateMonitors/>
163+
164+
### Azure Security - Advisor alerts
165+
166+
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
167+
|:--|:--|:--|:--|
168+
| `High Impact Alert` | This alert is triggered when new high-impact advisories are generated, enabling security analysts to take immediate action to mitigate risks and maintain system integrity. The High Impact alert for Azure Advisor in Sumo Logic detects security, reliability, operational, or cost-related recommendations classified as high impact. These recommendations indicate critical risks that could significantly affect the security, performance, or efficiency of your Azure environment. | Critical | Count > 0 |
169+
170+
## Upgrade/Downgrade the Azure Security - Advisor app (optional)
171+
172+
import AppUpdate from '../../reuse/apps/app-update.md';
173+
174+
<AppUpdate/>
175+
176+
## Uninstalling the Azure Security - Advisor app (optional)
177+
178+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
179+
180+
<AppUninstall/>
181+
182+
## Troubleshooting
183+
184+
### HTTP Logs and Metrics Source used by Azure Functions
185+
186+
To troubleshoot metrics collection, follow the instructions in [Collect Metrics from Azure Monitor > Troubleshooting metrics collection](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#troubleshooting-metrics-collection).

docs/integrations/microsoft-azure/index.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -268,6 +268,13 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
268268
<p>A guide to the Sumo Logic integration for Azure Relay.</p>
269269
</div>
270270
</div>
271+
<div className="box smallbox card">
272+
<div className="container">
273+
<img src={useBaseUrl('img/integrations/microsoft-azure/azure-security-advisor.png')} alt="Thumbnail icon" width="60"/>
274+
<h4><a href="/docs/integrations/microsoft-azure/azure-security-advisor">Azure Security - Advisor</a></h4>
275+
<p>A guide to the Sumo Logic integration for Azure Security - Advisor.</p>
276+
</div>
277+
</div>
271278
<div className="box smallbox card">
272279
<div className="container">
273280
<a href="/docs/integrations/microsoft-azure/azure-security-defender-for-cloud"><img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-for-cloud.png')} alt="thumbnail icon" width="75"/><h4>Azure Security - Defender for Cloud</h4></a>

0 commit comments

Comments
 (0)