Skip to content

Commit 364a177

Browse files
authored
Merge branch 'main' into SUMO-249359
2 parents dd45f0d + b977dc5 commit 364a177

File tree

4 files changed

+19
-19
lines changed

4 files changed

+19
-19
lines changed

docs/alerts/monitors/create-monitor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,8 @@ To create a monitor from the [Metrics Explorer](/docs/metrics/metrics-queries/me
5151
1. On the **Metrics Explorer** page:
5252
1. Enter a metrics query.<br/><img src={useBaseUrl('img/alerts/query-metrics-explorer-view.png')} alt="Metrics explorer query" style={{border: '1px solid gray'}} width="800"/>
5353
1. In the **Thresholds** section, define the critical and warning thresholds for your metrics query.<br/><img src={useBaseUrl('img/alerts/thresholdonly-metrics-explorer-view.png')} alt="Screenshot of the Metrics Explorer in Sumo Logic, displaying a line chart for node memory utilization over time. The chart shows the memory utilization metric from 17:42:12 to 17:57:12 on 21/02/2023. The right side of the screen includes a thresholds panel with critical and warning thresholds set to 500000000 and 80, respectively. The 'Fill remaining area as green' option is toggled off." style={{border: '1px solid gray'}} width="800"/>
54-
1. Click the three-dot kebab icon button at the end of the query field and select **Create a Monitor**.<br/><img src={useBaseUrl('img/monitors/create-monitor.png')} alt="Screenshot of the Metrics Explorer in Sumo Logic, showing the dropdown menu accessed via the three vertical dots icon. The menu includes options for Basic Mode, Duplicate Query, Create a Monitor, and Create an SLO. The option 'Create a Monitor' is highlighted. Below the menu, the thresholds panel shows critical and warning thresholds set to 500000000 and 80, respectively, with the 'Fill remaining area as green' option toggled off." style={{border: '1px solid gray'}} width="400"/>
55-
1. The **New Monitor** will open with prefilled data based on the threshold values you set in the previous steps.<br/><img src={useBaseUrl('img/monitors/new-monitor-window.png')} alt="Screenshot of the 'New Monitor' setup page in Sumo Logic, specifically focusing on the Trigger Conditions section. The Monitor Type is set to Metrics and Detection Method to Static. The query is set for node memory utilization for a specific collector. The Alert Grouping options include one alert per monitor or one alert per time series. The Trigger Type section shows critical alerts set to trigger when the result is greater than or equal to 500000000 within 15 minutes. The recovery settings are enabled to recover automatically when the result is less than 500000000 within a 15-minute window. Historical Trend is displayed below, with a dashed red line indicating the threshold." style={{border: '1px solid gray'}} width="600"/>
54+
1. Click the three-dot kebab icon button at the end of the query field and select **Create a Monitor**.<br/><img src={useBaseUrl('img/alerts/monitors/create-monitor.png')} alt="Screenshot of the Metrics Explorer in Sumo Logic, showing the dropdown menu accessed via the three vertical dots icon. The menu includes options for Basic Mode, Duplicate Query, Create a Monitor, and Create an SLO. The option 'Create a Monitor' is highlighted. Below the menu, the thresholds panel shows critical and warning thresholds set to 500000000 and 80, respectively, with the 'Fill remaining area as green' option toggled off." style={{border: '1px solid gray'}} width="400"/>
55+
1. The **New Monitor** will open with prefilled data based on the threshold values you set in the previous steps.<br/><img src={useBaseUrl('img/alerts/monitors/new-monitor-window.png')} alt="Screenshot of the 'New Monitor' setup page in Sumo Logic, specifically focusing on the Trigger Conditions section. The Monitor Type is set to Metrics and Detection Method to Static. The query is set for node memory utilization for a specific collector. The Alert Grouping options include one alert per monitor or one alert per time series. The Trigger Type section shows critical alerts set to trigger when the result is greater than or equal to 500000000 within 15 minutes. The recovery settings are enabled to recover automatically when the result is less than 500000000 within a 15-minute window. Historical Trend is displayed below, with a dashed red line indicating the threshold." style={{border: '1px solid gray'}} width="600"/>
5656
1. In the **Trigger Type** section, enable the checkbox that corresponds to the threshold value that you want to use (Critical and/or Warning).
5757
* The threshold values will be the same as defined in the Metrics page for both Critical and Warning thresholds.
5858
* Set all other parameters to default, including the window (15 minutes) and the **at all times** box.
@@ -119,7 +119,7 @@ In this step, you'll need to provide a logs or metrics query. This is not applic
119119

120120
**Logs** monitors can have one query up to 15,000 characters long.
121121

122-
**Metrics** monitors can have up to 6 queries. When providing multiple metrics queries, use the letter labels to reference a query row. The monitor will automatically detect the query that triggers your alert, and will mark that row with a notification bell icon. See [Joined metrics queries](/docs/metrics/metrics-queries/metrics-explorer/#join-metric-queries) for details.<br/><img src={useBaseUrl('img/monitors/metrics-monitor-query-row.png')} alt="Screenshot of the 'New Monitor' setup page in Sumo Logic, showing the Trigger Conditions section. Metrics is selected as the Monitor Type and Static as the Detection Method. The query includes two metrics: CPU_Sys and CPU_User, with an alert condition combining both metrics (#B + #C). A bell icon is highlighted on the left side." style={{border: '1px solid gray'}} width="700"/>
122+
**Metrics** monitors can have up to 6 queries. When providing multiple metrics queries, use the letter labels to reference a query row. The monitor will automatically detect the query that triggers your alert, and will mark that row with a notification bell icon. See [Joined metrics queries](/docs/metrics/metrics-queries/metrics-explorer/#join-metric-queries) for details.<br/><img src={useBaseUrl('img/alerts/monitors/metrics-monitor-query-row.png')} alt="Screenshot of the 'New Monitor' setup page in Sumo Logic, showing the Trigger Conditions section. Metrics is selected as the Monitor Type and Static as the Detection Method. The query includes two metrics: CPU_Sys and CPU_User, with an alert condition combining both metrics (#B + #C). A bell icon is highlighted on the left side." style={{border: '1px solid gray'}} width="700"/>
123123

124124
### Anomaly or Outlier Direction
125125

docs/alerts/webhook-connections/servicenow/set-up-searches.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ Before you can set up searches for ServiceNow, you'll need to configure a [Servi
2323
1. Choose an option from the **Run Frequency** menu:
2424

2525
* **Never.** Choose this option to temporarily **turn off a scheduled search**.
26-
* **Real Time.** Enterprise and paid trial customers can use this option to set up [Real Time Alerts](../../../alerts/scheduled-searches/create-real-time-alert.md).
2726
* **Every 15 Minutes.** The search will run for the first time when you save the schedule, and then every 15 minutes after that.
2827
* **Hourly.** The search will run for the first time at the top of the next hour after you save the schedule, and then every hour after that. * **Every 2, 4, 6, 8, or 12 Hours.** The search will run for the first time at the top of the hour you choose.
2928
* **Daily.** Choose the time you'd like to run the search every day. A Daily search will cover exactly 24 hours of activity. You can change the schedule whenever you'd like.

docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
66

77
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/microsoft-sentinel.png')} alt="microsoft-sentinel" width="100"/>
88

9-
***Version: 1.4
10-
Updated: Oct 14, 2024***
9+
***Version: 1.5
10+
Updated: Oct 22, 2024***
1111

1212
Microsoft Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise.
1313

@@ -18,6 +18,7 @@ Microsoft Sentinel is a cloud-native security information and event manager (SIE
1818
* **List Incidents** (*Enrichment*) - Get a list of all incidents.
1919
* **Search Into Sentinel Events** (*Enrichment*) - Query into a Sentinel event.
2020
* **List Incident Entities** (*Enrichment*) - Get all incident related entities.
21+
* **List Incident Entities V2** (*Enrichment*) - Get all incident related entities and enrich Sentinel entities with additional information to Cloud SOAR entities.
2122
* **Add Incident Comment** (*Containment*) - Add a new incident comment.
2223
* **Delete Incident** (*Containment*) - Delete an incident.
2324
* **Update Incident** (*Containment*) - Update an incident.
@@ -37,4 +38,8 @@ Microsoft Sentinel is a cloud-native security information and event manager (SIE
3738
+ renamed action Incidents Daemon Sentinel to Microsoft Sentinel Incidents Daemon
3839
+ added new action List Incident Alerts
3940
* October 14, 2024 (v1.4)
40-
+ Updated the integration by adding two new fields (**API Root** and **Login Endpoint**) to the configuration
41+
+ Updated the integration by adding two new fields (**API Root** and **Login Endpoint**) to the configuration
42+
+ October 22, 2024 (v1.5)
43+
+ Added new action **List Incident Entities V2**
44+
+ Updated the integration by adding a new fields (**Cloud SOAR URL API URL**, **Access ID** , **Access Key**) to the configuration
45+

docs/send-data/collect-from-other-data-sources/vmware-vrealize-log-insight.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ title: VMware vRealize Log Insight
44
description: This page shows you how to configure log collection for VMware vRealize Log Insight and then forward your logs to Sumo Logic. VMware vRealize Log Insight is a log management and analytics tool.
55
---
66

7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
79
This page shows you how to configure log collection for VMware vRealize Log Insight and then forward your logs to Sumo Logic. VMware vRealize Log Insight is a log management and analytics tool.
810

911
## Prerequisites
@@ -22,21 +24,15 @@ These instructions apply to vRealize Log Insight 8.0, may differ for earlier ver
2224

2325
To set up vRealize Log Insight log collection for Sumo Logic, do the following:
2426

25-
1. Log in to vRealize Log Insight UI, and navigate to **Management > Event Forwarding**.
26-
27-
![vRealize_EventForwarding.png](/img/send-data/vRealize_EventForwarding.png)
28-
29-
1. Add a new connection by clicking **New Destination**.
30-
31-
![vRealize_New-Destination.png](/img/send-data/vRealize_New-Destination.png)
32-
27+
1. Sign in to vRealize Log Insight UI, and navigate to **Management > Event Forwarding**.<br/><img src={useBaseUrl('/img/send-data/vRealize_EventForwarding.png')} alt="vRealize_EventForwarding" style={{border: '1px solid gray'}} width="400"/>
28+
1. Add a new connection by clicking **New Destination**.<br/><img src={useBaseUrl('/img/send-data/vRealize_New-Destination.png')} alt="vRealize_New-Destination" style={{border: '1px solid gray'}} width="600"/>
3329
1. In the Edit Destination dialog, specify the following information. Optionally, you can also add additional tags and also filter the events on this popup.
34-
35-
![vRealize_Edit-Destination.png](/img/send-data/vRealize_Edit-Destination.png)
36-
30+
:::note
31+
Select the **Transport** type as **UDP** if you are handling multiple messages.
32+
:::
33+
<br/><img src={useBaseUrl('/img/send-data/vRealize_Edit-Destination.png')} alt="vRealize_Edit-Destination" style={{border: '1px solid gray'}} width="600"/>
3734
1. **Test** and **Save** the connection.
3835
1. Verify logs in Sumo Logic. The following is a sample log message of vRealize forwarded events.
39-
4036
```
4137
<167> 2019-12-15T13:08:16.441Z esxi1.esxlab.com Rhttpproxy: verbose rhttpproxy[2099567]
4238
[Originator@6876 sub=Proxy Req 07995] Resolved endpoint :

0 commit comments

Comments
 (0)