Skip to content

Commit 5b80c44

Browse files
jpipkin1kimsauce
andauthored
DOCS-1034 - Update ACM documentation (#5848)
* Update ACM doc * Update docs/send-data/hosted-collectors/cloud-syslog-source/index.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Change release note date to Oct 16, 2025 --------- Co-authored-by: Kim (Sumo Logic) <[email protected]>
1 parent f5fde5c commit 5b80c44

File tree

6 files changed

+51
-68
lines changed

6 files changed

+51
-68
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Cloud Syslog Source Certificate Fully Transitioned to ACM (Collection)
3+
image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082
4+
keywords:
5+
- certificates
6+
- Cloud Syslog Source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce that Sumo Logic has fully transitioned to AWS Certificate Manager (ACM) certificates for Transport Layer Security (TLS) communication between your cloud syslog sources and Sumo Logic.
13+
14+
In [a previous release note](/release-notes-service/2025/08/01/collection/), we announced that we are transitioning from DigiCert to ACM certificates.
15+
16+
This change provides the following benefits:
17+
* **Automated certificate renewal and deployment**. ACM eliminates the need for future manual renewals, reducing administrative overhead.
18+
* **Simplified infrastructure management for AWS customers**. ACM is deeply integrated into the AWS ecosystem, streamlining your overall infrastructure management. Because Sumo Logic is also on AWS, using ACM provides a seamless experience.
19+
20+
If you use cloud syslog sources to send data to Sumo Logic, download and configure the ACM certificate on your system. For more information and setup instructions, see:
21+
* [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source/)
22+
* [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog)
23+
* [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/)
24+
* [Collect Logs for SentinelOne](/docs/send-data/collect-from-other-data-sources/collect-logs-sentinelone/)
25+
* [Acquia](/docs/integrations/saas-cloud/acquia/#step-2-configure-a-source)

docs/integrations/saas-cloud/acquia.md

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ The Sumo Logic App for Acquia provides visibility into the key components of the
1313

1414
Sumo Logic provides instant visibility across the critical components of the Acquia Platform, helping organizations become more proactive in their site monitoring as well as reducing the mean time to identify and resolve issues.
1515

16-
1716
## Log types
1817

1918
Sumo Logic analyzes the following required Acquia data for more efficient monitoring:
@@ -192,18 +191,13 @@ Be sure to copy and paste your **token** in a secure location. You'll need this
192191

193192
In the procedure below, you'll configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname. Then you'll set up TLS by downloading a cert to your server.
194193

195-
1. Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
196-
* https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt
197-
* https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt.pem
198-
* https://www.amazontrust.com/repository/AmazonRootCA1.cer
194+
1. Download the AWS Certificate Manager (ACM) certificate from the following location: https://www.amazontrust.com/repository/AmazonRootCA1.cer
199195
1. Run the following commands:
200-
* `wget -O digicert_ca.der https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.`
201-
* `openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt`
202-
* `wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer`
203-
* `openssl x509 -inform der -in acm_ca.der -out acm_ca.crt`
204-
* `cat acm_ca.crt digicert_ca.crt > digicert_acm_cas.crt`
205-
* `perl -p -i -e "s/\r//g" digicert_acm_cas.crt`
206-
1. You'll upload the merged cert to the Acquia app when you configure Acquia log forwarding. See [Step 3: Configure logging for Acquia](#step-3-configure-logging-for-acquia).
196+
```bash
197+
wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer
198+
openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
199+
```
200+
1. You'll upload the downloaded cert to the Acquia app when you configure Acquia log forwarding. See [Step 3: Configure logging for Acquia](#step-3-configure-logging-for-acquia).
207201
208202
### Configuring a cloud syslog source
209203

docs/send-data/collect-from-other-data-sources/collect-logs-sentinelone.md

Lines changed: 9 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -23,22 +23,15 @@ The procedure assumes you have wget installed.
2323
:::
2424

2525
To get a token and certificate from Sumo Logic, do the following:
26-
2726
1. Log in to the [Sumo Logic web site](https://www.sumologic.com/).
28-
29-
1. Configure a Cloud Syslog [Hosted Collector](/docs/send-data/collector-faq/#configure-limits-for-collector-caching) and [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source), and generate a Cloud Syslog source token. 
30-
31-
1. Download the server certificate files from https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt and https://www.amazontrust.com/repository/AmazonRootCA1.cer.
32-
33-
1. Go to the location where the cert files are located and open a terminal window.
34-
27+
1. Configure a Cloud Syslog [Hosted Collector](/docs/send-data/collector-faq/#configure-limits-for-collector-caching) and [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source/), and generate a Cloud Syslog source token. 
28+
1. Download the crt server certificate file from https://www.amazontrust.com/repository/AmazonRootCA1.cer.
29+
1. Go to the location where the cert file is located and open a terminal window.
3530
1. Run the following commands:
36-
* `wget -O digicert_ca.der https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.`
37-
* `openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt`
38-
* `wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer`
39-
* `openssl x509 -inform der -in acm_ca.der -out acm_ca.crt`
40-
* `cat acm_ca.crt digicert_ca.crt > digicert_acm_cas.crt`
41-
* `perl -p -i -e "s/\r//g" digicert_acm_cas.crt`
31+
```bash
32+
wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer
33+
openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
34+
```
4235

4336
## Step 2. Configure syslog messages
4437

@@ -47,28 +40,19 @@ In this step, you configure syslog messages from the Management Console.
4740
To configure syslog messages, do the following:
4841

4942
1. In the SentinelOne sidebar, click **Scope**, and then select a scope.
50-
5143
:::note
5244
If you are a Site or Account admin, you must select one Site to be able to open Settings.
5345
:::
54-
5546
1. In the sidebar, click **Settings**.
5647
1. In the Settings toolbar, click **Integrations**. <br/> ![SentinelOne_Integrations_option.png](/img/send-data/SentinelOne_Integrations_option.png)
57-
5848
1. Click **SYSLOG**. The SYSLOG dialog appears.
5949
1. Click the toggle to **Enable SYSLOG**.
6050
1. Enter the **Syslog Host URL** and **port** number.
61-
1. Click **Use SSL secure connection**, then click **Server certificate > Upload** and browse to the location of the merged crt certificate file.
51+
1. Click **Use SSL secure connection**, then click **Server certificate > Upload** and browse to the location of the downloaded crt certificate file.
6252
1. Specify the following **Formatting** options:
63-
6453
* **Information format**: Select **CEF2**
6554
* **SIEM Token**: Paste the Cloud Syslog Source Token generated from Sumo Logic. <br/> ![SentinelOne_SYSLOG_dialog.png](/img/send-data/SentinelOne_SYSLOG_dialog.png)
66-
6755
1. Click **Test**, and then click **Save**.
68-
6956
1. In Sumo Logic, verify that the logs are being ingested by running a search against the Cloud Syslog source you configured in [Step 1](#step-1-geta-token-and-certificate-from-sumo-logic). If you do not see any data coming in after 2-3 minutes, check the following:
70-
7157
* that the Sumo Logic Collector has read access to the logs
72-
* that your time zone is configured correctly.
73-
74-
 
58+
* that your time zone is configured correctly.

docs/send-data/hosted-collectors/cloud-syslog-source/index.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,7 @@ FIPS 140-2 compliance is not available for Cloud Syslog in the FedRAMP deploymen
2727

2828
In the procedure below, you configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname.
2929

30-
Then you set up TLS by downloading a cert to your server (see procedures for [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog/#setup-tls) and [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/#setup-tls)). Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
31-
* https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt
32-
* https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.pem
33-
* https://www.amazontrust.com/repository/AmazonRootCA1.cer
30+
Then you set up TLS by downloading a cert to your server (see procedures for [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog/#setup-tls) and [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/#setup-tls)). Download the AWS Certificate Manager (ACM) certificate from the following location: https://www.amazontrust.com/repository/AmazonRootCA1.cer.
3431

3532
Sumo Logic supports syslog clients, including syslog-ng and rsyslog. Follow the instructions in the appropriate section below to configure your server to send syslog data. If syslog data does not appear in Sumo Logic, refer to
3633
[Troubleshooting](#troubleshooting) below.

docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog.md

Lines changed: 7 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -4,31 +4,22 @@ title: rsyslog
44
description: Learn how to configure your server to send syslog data with rsyslog.
55
---
66

7-
8-
97
Sumo Logic supports syslog clients such as rsyslog. This document has instructions on how to configure your server to send syslog data. If syslog data does not appear in Sumo Logic, refer to the Troubleshooting section in [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source).
108

119
## Set up TLS
1210

1311
Set up Transport Layer Security (TLS).
1412

15-
Download DigiCert and AWS Certificate Manager (ACM) certificates from https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt and
16-
https://www.amazontrust.com/repository/AmazonRootCA1.cer.
13+
Download AWS Certificate Manager (ACM) certificate from https://www.amazontrust.com/repository/AmazonRootCA1.cer.
1714

1815
### rsyslog
1916

20-
For rsyslog, concatenate the ACM root CA with the DigiCert certificate.
21-
22-
To set up your DigiCert and AWS Certificate Manager (ACM) certificate, follow these steps:
17+
To set up your AWS Certificate Manager (ACM) certificate, follow these steps:
2318

2419
```bash
25-
$ cd /etc/rsyslog.d/keys/ca.d
26-
$ wget -O digicert_ca.der https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt
27-
$ openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt
20+
cd /etc/rsyslog.d/keys/ca.d
2821
$ wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer
2922
$ openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
30-
$ cat acm_ca.crt digicert_ca.crt > digicert_acm_cas.crt
31-
$ perl -p -i -e "s/\r//g" digicert_acm_cas.crt
3223
```
3324

3425
### Send data to a Cloud Syslog Source with rsyslog
@@ -49,7 +40,7 @@ $ActionQueueType LinkedList # run asynchronously
4940
$ActionResumeRetryCount -1 # infinite retries if host is down
5041

5142
# RsyslogGnuTLS
52-
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/keys/ca.d/digicert_acm_cas.crt
43+
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/keys/ca.d/acm_ca.crt
5344
$ActionSendStreamDriver gtls
5445
$ActionSendStreamDriverMode 1
5546
$ActionSendStreamDriverAuthMode x509/name
@@ -60,9 +51,7 @@ template(name="SumoFormat" type="string" string="<%pri%>%protocol-version% %time
6051
*.* action(type="omfwd" protocol="tcp" target="syslog.collection.YOUR_DEPLOYMENT.sumologic.com" port="6514" template="SumoFormat")
6152
```
6253

63-
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](https://www.rsyslog.com/doc/configuration/templates.html) or the [rsyslog omfwd documentation](https://www.rsyslog.com/doc/configuration/modules/omfwd.html).
64-
65-
In the template statement, be sure to replace YOUR_TOKEN with your actual token, and YOUR_DEPLOYMENT with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the rsyslog template documentation or the rsyslog omfwd documentation.
54+
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](http://www.rsyslog.com/doc/v7-stable/configuration/templates.html) or the [rsyslog omfwd documentation](http://www.rsyslog.com/doc/v7-stable/configuration/modules/omfwd.html).
6655

6756
**For rsyslog v8 and later**
6857

@@ -76,7 +65,7 @@ $ActionQueueType LinkedList # run asynchronously
7665
$ActionResumeRetryCount -1 # infinite retries if host is down
7766

7867
# RsyslogGnuTLS
79-
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/keys/ca.d/digicert_acm_cas.crt
68+
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/keys/ca.d/acm_ca.crt
8069

8170
template(name="SumoFormat" type="string" string="<%pri%>%protocol-version% %timestamp:::date-rfc3339% %HOSTNAME% %app-name% %procid% %msgid% [YOUR_TOKEN] %msg%\n")
8271

@@ -91,4 +80,4 @@ action(type="omfwd"
9180
StreamDriverPermittedPeers="syslog.collection.*.sumologic.com")
9281
```
9382

94-
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](https://www.rsyslog.com/doc/configuration/templates.html) or the [rsyslog omfwd documentation](https://www.rsyslog.com/doc/configuration/modules/omfwd.html).
83+
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](http://www.rsyslog.com/doc/master/configuration/templates.html) or the [rsyslog omfwd documentation](http://www.rsyslog.com/doc/master/configuration/modules/omfwd.html).

docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,19 @@ title: syslog-ng
44
description: Learn how to configure your server to send syslog data with syslog-ng.
55
---
66

7-
8-
97
Sumo Logic supports syslog clients such as syslog-ng. This document has instructions on how to configure your server to send syslog data. If syslog data does not appear in Sumo Logic, refer to the Troubleshooting section in [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source).
108

119
## Set up TLS
1210

1311
Set up Transport Layer Security (TLS).
1412

15-
Download the DigiCert and AWS Certificate Manager (ACM) certificates from https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt and
16-
https://www.amazontrust.com/repository/AmazonRootCA1.cer.
13+
Download the AWS Certificate Manager (ACM) certificate from https://www.amazontrust.com/repository/AmazonRootCA1.cer.
1714

1815
### syslog-ng
1916

20-
For syslog-ng, place both certificates in the configuration directory, allowing the syslog-ng client to automatically select the appropriate certificate.
17+
For syslog-ng place the certificates in the configuration directory and the syslog-ng client will pick up the certificates working from that directory.
2118

22-
To set up your DigiCert and AWS Certificate Manager (AWS) certificates, follow these steps:
19+
To set up your AWS Certificate Manager (AWS) certificate, follow these steps:
2320

2421
1. Check if you have the directory `/etc/syslog-ng/ca.d`.
2522
1. If you don’t, create it with this command:
@@ -29,9 +26,6 @@ To set up your DigiCert and AWS Certificate Manager (AWS) certificates, follow t
2926
1. Then run:
3027
```bash
3128
$ cd /etc/syslog-ng/ca.d
32-
$ sudo wget -O digicert_ca.der https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt
33-
$ sudo openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt
34-
$ sudo ln -s digicert_ca.crt `openssl x509 -noout -hash -in digicert_ca.crt`.0
3529
$ wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer
3630
$ openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
3731
$ ln -s acm_ca.crt `openssl x509 -noout -hash -in acm_ca.crt`.0

0 commit comments

Comments
 (0)