Skip to content

Commit 4c4416c

Browse files
authored
Merge branch 'main' into docs-823-break-up-integration-framework-article
2 parents b46233b + 5d1fdc6 commit 4c4416c

File tree

23 files changed

+308
-306
lines changed

23 files changed

+308
-306
lines changed
File renamed without changes.

blog-collector/2025-05-14.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: Version 19.525-42
3+
hide_table_of_contents: true
4+
image: https://help.sumologic.com/img/sumo-square.png
5+
---
6+
7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
9+
In this release, we've enhanced the security and stability of the Collector with added support for security patches and a bug fix.
10+
11+
## Security Fix
12+
13+
- Upgraded `com.google.crypto.tink` to version 1.16.0 to address protobuf-java DOS vulnerability (CVE-2024-7254).
14+
15+
## Bug Fix
16+
17+
- Fixed the improper filtering of `AD` objects when `Exclude Distinguished Name Suffixes` filter is configured.

blog-cse/2025-05-09-content.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,6 @@ This release includes:
2121

2222
Changes are enumerated below.
2323

24-
:::warning attention
25-
We are currently aware of a synchronization issue with updated and new rules not appearing with the specified changes and are working to address the issue ASAP.
26-
:::
27-
2824
### Rules
2925
- [New] OUTLIER-S00033 AWS DynamoDB Outlier in PutItem Events from User
3026
- [Disabled by Default] This rule detects an unusual amount of PutItem events to a DynamoDB resource within an hour time period (DynamoDB data events are required). Verify the user is authorized to modify the DynamoDB tables and instances. This rule is disabled by default due to potential volume of signals, before enabling consider excluding authorized users via match lists, and adjust floor value and model sensitivity as needed.

blog-service/2025-05-13-apps.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: Bitwarden (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- bitwarden
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to introduce the new Bitwarden app for Sumo Logic. This app enables threat detection and identification of high-risk events such as vault exports or SSO deactivation, supporting continuous monitoring and accelerating incident response for credential and secret management workflows. [Learn more](/docs/integrations/saas-cloud/bitwarden).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1637,6 +1637,7 @@
16371637
"/cid/6025": "/docs/integrations/saas-cloud/cisco-vulnerability-management",
16381638
"/cid/6026": "/docs/integrations/saas-cloud/sumo-collection",
16391639
"/cid/6027": "/docs/integrations/saas-cloud/sysdig-secure",
1640+
"/cid/6028": "/docs/integrations/saas-cloud/bitwarden",
16401641
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
16411642
"/cid/10113": "/docs/observability/root-cause-explorer",
16421643
"/cid/10116": "/docs/manage/fields",

docs/integrations/amazon-aws/lambda.md

Lines changed: 41 additions & 31 deletions
Large diffs are not rendered by default.

docs/integrations/microsoft-azure/azure-container-instances.md

Lines changed: 24 additions & 88 deletions
Original file line numberDiff line numberDiff line change
@@ -24,100 +24,15 @@ For more information on supported dimensions, refer to the [Azure documentation]
2424
## Setup
2525

2626
* Set up application logs collection using fluent-bit sidecar container using the [http output plugin](https://docs.fluentbit.io/manual/1.5/pipeline/outputs/http) and the [tail input plugin](https://docs.fluentbit.io/manual/1.5/pipeline/inputs/tail). You must explicitly enable fluent-bit collection for each container group which you want to monitor.
27-
* Set up metrics collection using Azure Metrics Source.
27+
* Metrics collection using our [Azure Metrics Source](/docs/send-data/hosted-collectors/microsoft-source/azure-metrics-source).
2828

2929
:::note
3030
Sumo Logic Metrics source is currently in Beta, to participate, contact your Sumo Logic account executive.
3131
:::
32-
33-
### Configure field in field schema
34-
35-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Fields**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Fields**. You can also click the **Go To...** menu at the top of the screen and select **Fields**.
36-
1. Search for the following fields:
37-
- `tenant_name`. This field is tagged at the collector level. You can get the tenant name using the instructions [here](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tenant-management-read-tenant-name#get-your-tenant-name).
38-
- `location`. The region to which the resource name belongs to.
39-
- `subscription_id`. ID associated with a subscription where the resource is present.
40-
- `resource_group`. The resource group name where the Azure resource is present.
41-
- `provider_name`. Azure resource provider name (for example, Microsoft.Network).
42-
- `resource_type`. Azure resource type (for example, storage accounts).
43-
- `resource_name`. The name of the resource (for example, storage account name).
44-
- `service_type`. Type of the service that can be accessed with a Azure resource.
45-
- `service_name`. Services that can be accessed with an Azure resource (for example, in Azure Container Instances service is Subscriptions).
46-
1. Create the fields if they are not present. Refer to [Manage fields](/docs/manage/fields/#manage-fields).
47-
48-
### Configure field extraction rules
49-
50-
Create the following Field Extraction Rule(s) (FER) for Azure Storage by following the instructions in [Create a Field Extraction Rule](/docs/manage/field-extractions/create-field-extraction-rule/).
51-
52-
#### Azure location extraction FER
53-
54-
```sql
55-
Rule Name: AzureLocationExtractionFER
56-
Applied at: Ingest Time
57-
Scope (Specific Data): tenant_name=*
58-
```
59-
60-
```sql title="Parse Expression"
61-
json "location", "properties.resourceLocation", "properties.region" as location, resourceLocation, service_region nodrop
62-
| replace(toLowerCase(resourceLocation), " ", "") as resourceLocation
63-
| if (!isBlank(resourceLocation), resourceLocation, location) as location
64-
| if (!isBlank(service_region), service_region, location) as location
65-
| if (isBlank(location), "global", location) as location
66-
| fields location
67-
```
68-
69-
#### Resource ID extraction FER
70-
71-
```sql
72-
Rule Name: AzureResourceIdExtractionFER
73-
Applied at: Ingest Time
74-
Scope (Specific Data): tenant_name=*
75-
```
76-
77-
```sql title="Parse Expression"
78-
json "resourceId", "ResourceId" as resourceId1, resourceId2 nodrop
79-
| if (isBlank(resourceId1), resourceId2, resourceId1) as resourceId
80-
| toUpperCase(resourceId) as resourceId
81-
| parse regex field=resourceId "/SUBSCRIPTIONS/(?<subscription_id>[^/]+)" nodrop
82-
| parse field=resourceId "/RESOURCEGROUPS/*/" as resource_group nodrop
83-
| parse regex field=resourceId "/PROVIDERS/(?<provider_name>[^/]+)" nodrop
84-
| parse regex field=resourceId "/PROVIDERS/[^/]+(?:/LOCATIONS/[^/]+)?/(?<resource_type>[^/]+)/(?<resource_name>.+)" nodrop
85-
| parse regex field=resource_name "(?<parent_resource_name>[^/]+)(?:/PROVIDERS/[^/]+)?/(?<service_type>[^/]+)/?(?<service_name>.+)" nodrop
86-
| if (isBlank(parent_resource_name), resource_name, parent_resource_name) as resource_name
87-
| fields subscription_id, location, provider_name, resource_group, resource_type, resource_name, service_type, service_name
88-
```
89-
90-
### Configure metric rules
91-
92-
Create the following metrics rules by following the instructions in [Create a metrics rule](/docs/metrics/metric-rules-editor/#create-a-metrics-rule).
93-
94-
#### Azure observability metadata extraction container instance level
95-
96-
```sql
97-
Rule Name: AzureObservabilityMetadataExtractionAzureContainerInstanceLevel
98-
```
99-
100-
```sql title="Metric match expression"
101-
resourceId=resourceId=/SUBSCRIPTIONS/*/RESOURCEGROUPS/*/PROVIDERS/MICROSOFT.CONTAINERINSTANCE/*/* tenant_name=*
102-
```
103-
| Fields extracted | Metric rule |
104-
|:------------------|:----------------------------|
105-
| subscription_id | $resourceId._1 |
106-
| resource_group | $resourceId._2 |
107-
| provider_name | MICROSOFT.CONTAINERINSTANCE |
108-
| resource_type | $resourceId._3 |
109-
| resource_name | $resourceId._4 |
11032

11133
### Configure metrics collection
11234

113-
:::note
114-
Sumo Logic Metrics source is currently in Beta, to participate, contact your Sumo Logic account executive.
115-
:::
116-
117-
In the Sumo Logic Azure Metrics source configuration,
118-
119-
- To set up the Azure Metrics source in Sumo Logic, refer to the shared beta documentation.
120-
- Configure namespaces as `Microsoft.ContainerInstance/containerGroups`. <br/><img src={useBaseUrl('img/integrations/microsoft-azure/azure-container-instance-namespaces.png')} alt="Azure Container Instance Namespaces" style={{border: '1px solid gray'}} width="500" />
35+
To set up the Azure Metrics source in Sumo Logic, refer to [Azure Metrics Source](/docs/send-data/hosted-collectors/microsoft-source/azure-metrics-source).
12136

12237
### Configure logs collection
12338

@@ -170,6 +85,18 @@ import AppInstallNoDataSourceV2 from '../../reuse/apps/app-install-index-apps-v2
17085

17186
<AppInstallNoDataSourceV2/>
17287

88+
As part of the app installation process, the following fields will be created by default:
89+
90+
- `tenant_name`. This field is tagged at the collector level. You can get the tenant name using the instructions [here](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tenant-management-read-tenant-name#get-your-tenant-name).
91+
- `location`. The region to which the resource name belongs to.
92+
- `subscription_id`. ID associated with a subscription where the resource is present.
93+
- `resource_group`. The resource group name where the Azure resource is present.
94+
- `provider_name`. Azure resource provider name (for example, Microsoft.Network).
95+
- `resource_type`. Azure resource type (for example, storage accounts).
96+
- `resource_name`. The name of the resource (for example, storage account name).
97+
- `service_type`. Type of the service that can be accessed with a Azure resource.
98+
- `service_name`. Services that can be accessed with an Azure resource (for example, in Azure Container Instances the service is Subscriptions).
99+
173100
## Viewing the Azure Container Instances dashboards
174101

175102
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
@@ -180,7 +107,7 @@ import ViewDashboards from '../../reuse/apps/view-dashboards.md';
180107

181108
The **Azure Container Instance - Error Logs** dashboard provides detailed information on the container activity. This dashboard also provides comprehensive overview of Total Errors, Top 10 Errors bar chart, Log Level Error distribution, Error Trend by Container, and Recent Container Logs.
182109

183-
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Azure-Container-Instances/Azure-Container-Instance-Error-Logs.png')} alt="Azure Container Instance - Error Logs" style={{border: '1px solid gray'}} width="800" />
110+
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Azure-Container-Instances/Azure-Container-Instances-Error-Logs.png')} alt="Azure Container Instance - Error Logs" style={{border: '1px solid gray'}} width="800" />
184111

185112
### Administrative Operations
186113

@@ -214,6 +141,15 @@ Use this dashboard to:
214141

215142
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Azure-Container-Instances/Azure-Container-Instances-Policy-and-Recommendations.png')} alt="Azure Container Instances - Policy and Recommendations" style={{border: '1px solid gray'}} width="800" />
216143

144+
### Azure Container Instances alerts
145+
146+
These alerts are metric based and will work for all Azure Container Instances.
147+
148+
| Alert Name | Description | Alert Condition | Recover Condition |
149+
|:-- |:-- |:--|:---------------------|
150+
| `Azure Container Instances - Memory Usage` | This alert is triggered when memory usage is greater than 20 MB. Also warning alert is triggered when the memory usage exceeds 15 MB. | Data volume > 20MB | Data volume < = 20MB |
151+
| `Azure Container Instances - CPU Usage` | This alert is triggered when CPU usage is greater than 100 milicore. Also warning alert is triggered when the CPU usage exceeds 90 millicore. | millicores > 100 | millicores < = 100 |
152+
217153
## Troubleshooting
218154

219155
### HTTP Logs and Metrics Source used by Azure Functions

0 commit comments

Comments
 (0)