You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DOCS-27 - Update docs for Network Sensor end-of-life (#4662)
* Update Zeek article
* Update screenshots
* Link to eol notice
* Release note
* Updates from reviews
* Remove note on Zeek article
* Change end of support date to April 30 2025
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/sensors/ingest-zeek-logs/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
12
+
13
+
Learn more [here](/docs/cse/sensors/network-sensor-end-of-life/).
Copy file name to clipboardExpand all lines: docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md
-5Lines changed: 0 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,6 @@ This section has instructions for collecting Corelight Zeek log messages and sen
11
11
12
12
These instructions are for Corelight Zeek logs sent as JSON over syslog.
13
13
14
-
:::note
15
-
The [Cloud SIEM Network Sensor](/docs/cse/sensors/network-sensor-deployment-guide/) also utilizes Zeek, so If you're using the sensor, using Corelight Zeek would be redundant.
16
-
:::
17
-
18
-
19
14
## Step 1: Configure collection
20
15
21
16
In this step, you configure a Syslog Source to collect Corelight Zeek log messages. You can configure the source on an existing Installed Collector or create a new collector. If you’re going to use an existing collector, jump to [Configure a Syslog Source](#configure-a-syslog-source) below. Otherwise, create a new collector as described in [Configure an Installed Collector](#configure-an-installed-collector) below, and then create the Syslog Source on the collector.
Copy file name to clipboardExpand all lines: docs/cse/sensors/ingest-zeek-logs.md
+45-42Lines changed: 45 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,46 +12,9 @@ This topic has instructions for ingesting Zeek logs into Cloud SIEM.
12
12
13
13
Cloud SIEM uses [Zeek](https://zeek.org/) (formerly known as Bro) for network visibility. Zeek is an open source network analysis framework that organizes packets into flows, decodes common protocols, performs file extraction, SSL certificate validation, OS fingerprinting and more. Zeek can be extended through plugins for additional detection capabilities.
14
14
15
-
## Best collection method: Network Sensor
15
+
## Supported collection method: Sumo Logic Source
16
16
17
-
Sumo Logic recommends using Cloud SIEM’s Network Sensor to collect Zeek logs and upload them to an HTTP Source on a Sumo Logic Hosted Collector. This is far and away the preferred method: it ensures that supported Bro policies are enabled and that the supported Bro output format is configured. It also results in the creation of Cloud SIEM Records from the raw Zeek log messages. For instructions, see [Network Sensor Deployment Guide](/docs/cse/sensors/network-sensor-deployment-guide).
18
-
19
-
The Network Sensor extracts files observed over cleartext protocols that match selected MIME types. You can configure what types will be extracted using the [extracted_file_types](/docs/cse/sensors/network-sensor-deployment-guide) property in the Network Sensor’s configuration file, `trident-sensor.cfg`. By default the sensor will upload password-protected zip files and the following types of executables:
20
-
21
-
*`application/x-dosexec`
22
-
*`application/x-msdownload`
23
-
*`application/x-msdos-program`
24
-
25
-
:::note
26
-
YARA [file analysis](/docs/cse/rules/import-yara-rules) is supported only for files extracted by the Network Sensor. If you use
27
-
your own Zeek deployment and ingest logs using a Sumo Logic Source you cannot also upload extracted files.
28
-
:::
29
-
30
-
### Filtering Zeek logs
31
-
32
-
This section describes two methods you can use to filter the logs that the Network Sensor sends to Cloud SIEM.
33
-
34
-
* You can configure a Berkeley Packet Filter (BPF) filter using the [filter](/docs/cse/sensors/network-sensor-deployment-guide) parameter in Network Sensor’s configuration file, `trident-sensor.cfg`. This is the most efficient filtering mechanism as it is performed before Network Sensor processing.
35
-
36
-
The value of the `filter` parameter is an expression that begins with `not`. This example expression ensures the that the Network Sensor won't process any traffic involving host `a.b.c.com` or host `d.e.f.com`:
37
-
38
-
`not ( host a.b.c.com ) and not ( host d.e.f.com )`
39
-
40
-
For information about BPF filter syntax, see https://biot.com/capstats/bpf.html.
41
-
42
-
* You can also filter by Zeek log type using the [skipped_log_types](/docs/cse/sensors/network-sensor-deployment-guide) property in `trident-sensor.cfg`. The default value of `skipped_log_types` is:
You can add additional Zeek log types to the list to exclude them.
49
-
50
-
The BPF filter is applied before `skipped_log_types`. So, given the example BPF filter above, if you add `dns` to the `skipped_log_types` value, you won't ingest logs related to traffic involving hosts `a.b.c.com` or `d.e.f.com`, and you won't ingest DNS data.
51
-
52
-
## Alternative collection method: Sumo Logic Source
53
-
54
-
Although the Network Sensor is the preferred method for collecting Zeek logs, there is an alternative. If you already have a Zeek deployment, you can collect logs using a Sumo Logic Collector and Source.
17
+
If you already have a Zeek deployment, you can collect logs using a Sumo Logic Collector and Source.
55
18
56
19
:::note
57
20
This method requires that your Zeek logs are in JSON format.
@@ -60,7 +23,6 @@ This method requires that your Zeek logs are in JSON format.
60
23
### Configure a Sumo Logic Source
61
24
62
25
In this step, you configure a Sumo Logic Source on an Sumo Logic Installed Collector. Choose the appropriate Source type based on:
63
-
64
26
* If you already have a method of forwarding Zeek logs in JSON format in Syslog format to a collector in your environment, you can use a Syslog Source to ingest the logs.
65
27
* If you’re not set up to use Syslog, and have Zeek log files stored on a filesystem, you can use a Local File Source to ingest the logs.
66
28
@@ -85,8 +47,8 @@ After installing the `json-streaming-logs` package, follow these instructions to
85
47
1. On the **Sumo Logic Ingest Mappings** page, click **Create**.<br/><img src={useBaseUrl('img/cse/ingest-mappings.png')} alt="Ingest mappings" style={{border: '1px solid gray'}} width="800"/>
86
48
1. On the **Create Sumo Logic Mapping** page:
87
49
1.**Source Category**. Enter the Source Category value you assigned to the Source you configured above in [Configure a Sumo Logic Source](#configure-a-sumo-logic-source).
88
-
1.**Format**. Choose Bro/Zeek JSON.
89
-
1.**Event ID**. Enter *_path*.
50
+
1.**Format**. Choose **Bro/Zeek JSON**.
51
+
1.**Event ID**. Enter `{_path}`.
90
52
1.**Enabled**. Use the slider to enable the mapping if you’re ready to receive Zeek logs.
This section describes using the Cloud SIEM Network Sensor. [Network Sensor has reached its end of life](/docs/cse/sensors/network-sensor-end-of-life/). Instead, use Zeek. For more information, see [Supported collection method: Sumo Logic Source](#supported-collection-method-sumo-logic-source) above.
112
+
:::
113
+
114
+
You can use Cloud SIEM’s Network Sensor to collect Zeek logs and upload them to an HTTP Source on a Sumo Logic Hosted Collector. This method ensures that supported Bro policies are enabled and that the supported Bro output format is configured. It also results in the creation of Cloud SIEM Records from the raw Zeek log messages. For instructions, see [Network Sensor Deployment Guide](/docs/cse/sensors/network-sensor-deployment-guide).
115
+
116
+
The Network Sensor extracts files observed over cleartext protocols that match selected MIME types. You can configure what types will be extracted using the [extracted_file_types](/docs/cse/sensors/network-sensor-deployment-guide) property in the Network Sensor’s configuration file, `trident-sensor.cfg`. By default the sensor will upload password-protected zip files and the following types of executables:
117
+
118
+
*`application/x-dosexec`
119
+
*`application/x-msdownload`
120
+
*`application/x-msdos-program`
121
+
122
+
:::note
123
+
YARA [file analysis](/docs/cse/rules/import-yara-rules) is supported only for files extracted by the Network Sensor. If you use your own Zeek deployment and ingest logs using a Sumo Logic Source you can't also upload extracted files.
124
+
:::
125
+
126
+
### Filtering Zeek logs
127
+
128
+
This section describes two methods you can use to filter the logs that the Network Sensor sends to Cloud SIEM.
129
+
130
+
* You can configure a Berkeley Packet Filter (BPF) filter using the [filter](/docs/cse/sensors/network-sensor-deployment-guide) parameter in Network Sensor’s configuration file, `trident-sensor.cfg`. This is the most efficient filtering mechanism as it is performed before Network Sensor processing.
131
+
132
+
The value of the `filter` parameter is an expression that begins with `not`. This example expression ensures the that the Network Sensor won't process any traffic involving host `a.b.c.com` or host `d.e.f.com`:
133
+
134
+
`not ( host a.b.c.com ) and not ( host d.e.f.com )`
135
+
136
+
For information about BPF filter syntax, see https://biot.com/capstats/bpf.html.
137
+
138
+
* You can also filter by Zeek log type using the [skipped_log_types](/docs/cse/sensors/network-sensor-deployment-guide) property in `trident-sensor.cfg`. The default value of `skipped_log_types` is:
You can add additional Zeek log types to the list to exclude them.
145
+
146
+
The BPF filter is applied before `skipped_log_types`. So, given the example BPF filter above, if you add `dns` to the `skipped_log_types` value, you won't ingest logs related to traffic involving hosts `a.b.c.com` or `d.e.f.com`, and you won't ingest DNS data.
Copy file name to clipboardExpand all lines: docs/cse/sensors/log-sensor-troubleshooting.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,9 @@ title: Log Sensor Troubleshooting
4
4
description: Learn how to collect Log Sensor status and data to support troubleshooting efforts.
5
5
---
6
6
7
-
7
+
:::caution end-of-life
8
8
The Cloud SIEM Log Sensor has reached end of life and is no longer supported. Please migrate to a Sumo Logic Hosted Collector or Installed Collector. For more information, see the [end of life notice](https://app.getbeamer.com/cloudsiementerprise/en/end-of-life-notice-_-cloud-siem-enterprise-sensors).
9
+
:::
9
10
10
11
The Cloud SIEM Log Sensor collects log data and sends it to the legacy Cloud SIEM server. (The Log Sensor does not send log data to the Sumo Logic platform. Sumo Logic collectors serve that purpose.)
Copy file name to clipboardExpand all lines: docs/cse/sensors/network-sensor-deployment-guide.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,11 @@ description: Learn about Network Sensor deployment planning, standard sensor pla
6
6
---
7
7
8
8
import useBaseUrl from '@docusaurus/useBaseUrl';
9
+
import SensorEOL from '../../reuse/cloud-siem-network-sensor-eol.md';
10
+
11
+
:::caution end-of-life
12
+
<SensorEOL/>
13
+
:::
9
14
10
15
This section has instructions for deploying the Cloud SIEM Network Sensor. It covers deployment planning, standard sensor placement, sensor requirements, installation, general configuration, and helpful commands.
Copy file name to clipboardExpand all lines: docs/cse/sensors/network-sensor-end-of-life.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,9 @@ description: Cloud SIEM Network Sensor has reached its end-of-life and will no l
10
10
11
11
import useBaseUrl from '@docusaurus/useBaseUrl';
12
12
13
-
At Sumo Logic, we pride ourselves on being a leading SaaS log analytics company for observability and security solutions. Our strategic focus centers on delivering cloud-based solutions, as we firmly believe that SaaS represents the most effective means to deliver substantial value and a seamless experience to our customer base.
13
+
At Sumo Logic, we pride ourselves on being a leading SaaS log analytics company that helps make the digital world faster, more reliable, and more secure by unifying insights to ignite action through the power of logs.
14
14
15
-
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. This end-of-life notification for Sumo Logic's network sensor means the feature will no longer receive support or updates based on the timelines listed below. We believe this to be the best course of action to keep our development focus on delivering world class detection and response capabilities.
15
+
We’re always looking at ways to innovate, drive more value, and provide a seamless experience for our customers. In this vein we are discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. This end-of-life notification for Sumo Logic's network sensor means the feature will no longer receive support or updates based on the timelines listed below. We believe this to be the best course of action to keep our development focus on delivering world class detection and response capabilities.
16
16
17
17
We fully recognize that this decision may have implications for your business operations, and we are committed to planning with you and your security team to minimize disruptions. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/sensors/ingest-zeek-logs/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
18
18
@@ -24,5 +24,5 @@ If you have any questions, please don't hesitate to reach out to your Sumo Logic
24
24
| :-- | :-- | :-- |
25
25
| End-of-life announcement | The date this feature is announced as end-of-life. | November 8, 2024 |
26
26
| End of software release | The last date that Sumo Logic may release any final software maintenance releases or bug fixes. After this date, Sumo Logic will no longer develop, repair, maintain, or test product software. | November 8, 2024 |
27
-
| Last date of support | The last date to receive applicable support for the feature as entitled by active support contracts or by applicable warrant terms and conditIons. After this date, all support services for this feature are unavailable and the feature becomes obsolete. |January 31, 2025 |
27
+
| Last date of support | The last date to receive applicable support for the feature as entitled by active support contracts or by applicable warrant terms and conditIons. After this date, all support services for this feature are unavailable and the feature becomes obsolete. |April 30, 2025 |
Copy file name to clipboardExpand all lines: docs/cse/sensors/network-sensor-troubleshooting.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,11 @@ description: Learn how to troubleshoot problems with the Cloud SIEM Network Sens
5
5
---
6
6
7
7
import useBaseUrl from '@docusaurus/useBaseUrl';
8
+
import SensorEOL from '../../reuse/cloud-siem-network-sensor-eol.md';
9
+
10
+
:::caution end-of-life
11
+
<SensorEOL/>
12
+
:::
8
13
9
14
The Cloud SIEM Network Sensor is a flexible network security monitor that monitors IP networks and collects flow and protocol session data, building audit records of network communications. As with all network sensors, performance is a key consideration for proper operation and comprehensive data collection. The installation of the Cloud SIEM network sensor configures the sensor with reasonable defaults for many environments. For other environments, such as high throughput deployments, Sumo Logic advises the use of a supported 3rd party Bro/Zeek sensor offering or a custom Zeek cluster deployment.
Copy file name to clipboardExpand all lines: docs/cse/sensors/sensor-download-locations.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,14 @@ title: Sensor Download Locations
4
4
description: The Cloud SIEM Network sensor can be downloaded from a static URL that is specific to your Cloud SIEM deployment.
5
5
---
6
6
7
+
import useBaseUrl from '@docusaurus/useBaseUrl';
8
+
import SensorEOL from '../../reuse/cloud-siem-network-sensor-eol.md';
7
9
8
-
The Cloud SIEM Network sensor can be downloaded from a static URL that is specific to your Cloud SIEM deployment. Each Sumo Logic deployment has URLs used to download sensor software. If you are not sure which endpoint to use, see How can I determine which endpoint I should use?
10
+
:::caution end-of-life
11
+
<SensorEOL/>
12
+
:::
13
+
14
+
The Cloud SIEM Network Sensor can be downloaded from a static URL that is specific to your Cloud SIEM deployment. Each Sumo Logic deployment has URLs used to download sensor software. If you are not sure which endpoint to use, see How can I determine which endpoint I should use?
This article describes using the Cloud SIEM Network Sensor. [Network Sensor has reached its end of life](/docs/cse/sensors/network-sensor-end-of-life/). Instead, use Zeek. For more information, see [Ingest Zeek Logs](/docs/cse/sensors/ingest-zeek-logs/).
0 commit comments