Skip to content

Commit 19482b0

Browse files
committed
Merge branch 'main' into faster
2 parents d7ef6bb + ee43f87 commit 19482b0

File tree

3 files changed

+75
-5
lines changed

3 files changed

+75
-5
lines changed

blog-cse/2024-12-20-content.md

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: December 20, 2024 - Content Release
3+
hide_table_of_contents: true
4+
keywords:
5+
- log mappers
6+
- log parsers
7+
- detection rules
8+
image: https://help.sumologic.com/img/sumo-square.png
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
This content release includes:
16+
- New product support for Dragos WorldView Threat Intelligence, Mindpoint Proactive Security Services, and Trust IAM (Identity and Access Management).
17+
- AWS Cloudtrail updates.
18+
- Adds alternate mapping for `user_userId` in anticipation of AWS Identity Center CloudTrail logging change. For more information on the change, see [Important changes to CloudTrail events for AWS IAM Identity Center](https://aws.amazon.com/blogs/security/modifications-to-aws-cloudtrail-event-data-of-iam-identity-center/).
19+
- Parsing and mapping updates for Palo Alto Firewall and Cisco Firepower.
20+
- Rule updates.
21+
22+
Changes are are enumerated below.
23+
24+
## Rules
25+
- [Deleted] FIRST-S00029 First Seen Successful Authentication From Unexpected Country
26+
- Rule has been replaced by FIRST-S00065 as this version was not enabled by default.
27+
- [Updated] FIRST-S00046 First Seen Client Generating MailIItemsAccessed Event from User
28+
- Updated "First Seen" value from ClientInfoString to Client to reduce false positives.
29+
- [Updated] FIRST-S00065 First Seen Successful Authentication From Unexpected Country
30+
- Replaces FIRST-S00029.
31+
32+
## Log Mappers
33+
- [New] Dragos Catch All
34+
- [New] Mindpoint Group Keeper Authentication
35+
- [New] Mindpoint Group Keeper Catch All
36+
- [New] Trust Login Authentication
37+
- [New] Trust Login Catch All
38+
- [Updated] CloudTrail - application-insights.amazonaws.com - ListApplications
39+
- [Updated] CloudTrail - signin.amazonaws.com - All AwsConsoleSignIn events
40+
- [Updated] CloudTrail - sso.amazonaws.com - Federate|ListProfilesForApplication
41+
- [Updated] CloudTrail Default Mapping
42+
- [Updated] Firepower Catch All
43+
- Additional new field mappings to support Firepower events and improve records classification.
44+
- [Updated] Palo Alto Config - Custom Parser
45+
- Adds alternate field mappings.
46+
- [Updated] Palo Alto System - Custom Parser
47+
- Adds alternate field mappings.
48+
- [Updated] Palo Alto System Auth - Custom Parser
49+
- Support additional panorama-auth-success and alternate fields for mapped fields.
50+
51+
## Parsers
52+
- [New] /Parsers/System/Dragos/Dragos
53+
- [New] /Parsers/System/Mindpoint Group/Mindpoint Group Keeper
54+
- [New] /Parsers/System/Trust Login/Trust Login
55+
- [Updated] /Parsers/System/Cisco/Cisco Firepower Syslog
56+
- Adds support for FTD 430002 and 430003 events.
57+
- [Updated] /Parsers/System/Palo Alto/PAN Firewall LEEF
58+
- Adds support for 'panorama-auth-success' events and improves timestamp handling.

docs/manage/deletion-requests.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,14 @@ To cancel a data deletion request:
8787

8888
## Limitations
8989

90+
- You can have up to 2 active deletion requests at a time.
91+
- Each deletion request can include up to 1 petabyte (PB) of scanned data.
92+
- You can delete up to 100,000 messages per request.
93+
- The maximum time range for each deletion request is one year.
94+
- Your system can support up to 10 active concurrent deletion tasks across different customers.
95+
96+
## FAQ
97+
9098
### Handling future ingestion of sensitive data
9199

92100
Customers must manage the future ingestion of sensitive data using [processing rules](/docs/send-data/collection/processing-rules). Deletion requests will only apply to data that has already been indexed, not to data that will be ingested in the future.
@@ -95,10 +103,6 @@ Customers must manage the future ingestion of sensitive data using [processing r
95103

96104
Deletion is restricted to partitions and the default view (sumologic_default) in Sumo Logic. Deletion is currently not supported for other view types, such as [Scheduled Views](/docs/manage/scheduled-views) or ad hoc views created using the save view operator. Sensitive data may still be present in these unsupported views.
97105

98-
### Deletion request limit
99-
100-
Each deletion request is limited to 100,000 messages. This means that any deletion operation can only target up to 100,000 messages at a time.
101-
102106
### Supported operators
103107

104108
Currently, we only support [`as`](/docs/search/search-query-language/search-operators/as), [`concat`](/docs/search/search-query-language/search-operators/concat), [`contains`](/docs/search/search-query-language/search-operators/contains), [`decToHex`](/docs/search/search-query-language/search-operators/dectohex), [`floor`](/docs/search/search-query-language/math-expressions/floor), [`if`](/docs/search/search-query-language/search-operators/if), [`in`](/docs/search/search-query-language/search-operators/in), [`lookup`](/docs/search/search-query-language/search-operators/lookup), [`toLower`](/docs/search/search-query-language/search-operators/tolowercase-touppercase), [`matches`](/docs/search/search-query-language/search-operators/matches), [`parse`](/docs/search/search-query-language/parse-operators), [`toUpper`](/docs/search/search-query-language/search-operators/tolowercase-touppercase), and [`where`](/docs/search/search-query-language/search-operators/where) search query operators.

docs/search/get-started-with-search/search-page/log-level.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,15 @@ Sumo Logic detects five log levels out of the box: FATAL, ERROR, WARN, INFO, and
3535

3636
</details>
3737

38-
Log-Level pattern detection is automatic, meaning you do not need to parse log levels manually or write specific queries to see your distribution of error logs. Just execute a log search, and you'll see:
38+
Log-Level pattern detection is automatic, meaning you do not need to parse log levels manually or write specific queries to see your distribution of error logs.
39+
40+
If the log message is in JSON format, the log level detection method searches for the presence of keys such as "level", "Level", "loglevel", "logLevel", "Loglevel", "LogLevel", "log_level", "log-level", "Log_Level", "Log_level", "severity", or "_loglevel." If any of these keys are identified in the log message, their corresponding values will be considered and displayed in the results. And if the log message is in a non-JSON format, the log level detection method looks for keywords such as "debug", "info/information", "warn/warning", and "error." If any of these keywords are found in the log message, their corresponding values will be considered and displayed in the results.
41+
42+
:::info
43+
If multiple log levels are detected in the message, they will be prioritized in the following order: ERROR > WARN > INFO > DEBUG.
44+
:::
45+
46+
Just execute a log search to see the `_loglevel` field:
3947

4048
<img src={useBaseUrl('img/search/get-started-search/search-page/log-level-legend.png')} width="950" alt="log-level-legend" />
4149

0 commit comments

Comments
 (0)