You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're excited to announce that Sumo Logic has fully transitioned to AWS Certificate Manager (ACM) certificates for Transport Layer Security (TLS) communication between your cloud syslog sources and Sumo Logic.
13
+
14
+
In [a previous release note](/release-notes-service/2025/08/01/collection/), we announced that we are transitioning from DigiCert to ACM certificates.
15
+
16
+
This change provides the following benefits:
17
+
***Automated certificate renewal and deployment**. ACM eliminates the need for future manual renewals, reducing administrative overhead.
18
+
***Simplified infrastructure management for AWS customers**. ACM is deeply integrated into the AWS ecosystem, streamlining your overall infrastructure management. Because Sumo Logic is also on AWS, using ACM provides a seamless experience.
19
+
20
+
If you use cloud syslog sources to send data to Sumo Logic, download and configure the ACM certificate on your system. For more information and setup instructions, see:
Copy file name to clipboardExpand all lines: docs/integrations/saas-cloud/acquia.md
+6-12Lines changed: 6 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,6 @@ The Sumo Logic App for Acquia provides visibility into the key components of the
13
13
14
14
Sumo Logic provides instant visibility across the critical components of the Acquia Platform, helping organizations become more proactive in their site monitoring as well as reducing the mean time to identify and resolve issues.
15
15
16
-
17
16
## Log types
18
17
19
18
Sumo Logic analyzes the following required Acquia data for more efficient monitoring:
@@ -192,18 +191,13 @@ Be sure to copy and paste your **token** in a secure location. You'll need this
192
191
193
192
In the procedure below, you'll configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname. Then you'll set up TLS by downloading a cert to your server.
194
193
195
-
1. Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
1. You'll upload the merged cert to the Acquia app when you configure Acquia log forwarding. See [Step 3: Configure logging for Acquia](#step-3-configure-logging-for-acquia).
openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
199
+
```
200
+
1. You'll upload the downloaded cert to the Acquia app when you configure Acquia log forwarding. See [Step 3: Configure logging for Acquia](#step-3-configure-logging-for-acquia).
Copy file name to clipboardExpand all lines: docs/send-data/collect-from-other-data-sources/collect-logs-sentinelone.md
+9-25Lines changed: 9 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,22 +23,15 @@ The procedure assumes you have wget installed.
23
23
:::
24
24
25
25
To get a token and certificate from Sumo Logic, do the following:
26
-
27
26
1. Log in to the [Sumo Logic web site](https://www.sumologic.com/).
28
-
29
-
1. Configure a Cloud Syslog [Hosted Collector](/docs/send-data/collector-faq/#configure-limits-for-collector-caching) and [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source), and generate a Cloud Syslog source token.
30
-
31
-
1. Download the server certificate files from https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt and https://www.amazontrust.com/repository/AmazonRootCA1.cer.
32
-
33
-
1. Go to the location where the cert files are located and open a terminal window.
34
-
27
+
1. Configure a Cloud Syslog [Hosted Collector](/docs/send-data/collector-faq/#configure-limits-for-collector-caching) and [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source/), and generate a Cloud Syslog source token.
28
+
1. Download the crt server certificate file from https://www.amazontrust.com/repository/AmazonRootCA1.cer.
29
+
1. Go to the location where the cert file is located and open a terminal window.
openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
34
+
```
42
35
43
36
## Step 2. Configure syslog messages
44
37
@@ -47,28 +40,19 @@ In this step, you configure syslog messages from the Management Console.
47
40
To configure syslog messages, do the following:
48
41
49
42
1. In the SentinelOne sidebar, click **Scope**, and thenselecta scope.
50
-
51
43
:::note
52
44
If you are a Site or Account admin, you must selectone Site to be able to open Settings.
53
45
:::
54
-
55
46
1. In the sidebar, click **Settings**.
56
47
1. In the Settings toolbar, click **Integrations**. <br/>
57
-
58
48
1. Click **SYSLOG**. The SYSLOG dialog appears.
59
49
1. Click the toggle to **Enable SYSLOG**.
60
50
1. Enter the **Syslog Host URL** and **port** number.
61
-
1. Click **Use SSL secure connection**, then click **Server certificate > Upload** and browse to the location of the merged crt certificate file.
51
+
1. Click **Use SSL secure connection**, then click **Server certificate > Upload** and browse to the location of the downloaded crt certificate file.
62
52
1. Specify the following **Formatting** options:
63
-
64
53
***Information format**: Select **CEF2**
65
54
***SIEM Token**: Paste the Cloud Syslog Source Token generated from Sumo Logic. <br/>
66
-
67
55
1. Click **Test**, and then click **Save**.
68
-
69
56
1. In Sumo Logic, verify that the logs are being ingested by running a search against the Cloud Syslog source you configured in [Step 1](#step-1-geta-token-and-certificate-from-sumo-logic). If you do not see any data coming in after 2-3 minutes, check the following:
70
-
71
57
* that the Sumo Logic Collector has read access to the logs
Copy file name to clipboardExpand all lines: docs/send-data/hosted-collectors/cloud-syslog-source/index.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,7 @@ FIPS 140-2 compliance is not available for Cloud Syslog in the FedRAMP deploymen
27
27
28
28
In the procedure below, you configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname.
29
29
30
-
Then you set up TLS by downloading a cert to your server (see procedures for [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog/#setup-tls) and [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/#setup-tls)). Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
Then you set up TLS by downloading a cert to your server (see procedures for [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog/#setup-tls) and [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/#setup-tls)). Download the AWS Certificate Manager (ACM) certificate from the following location: https://www.amazontrust.com/repository/AmazonRootCA1.cer.
34
31
35
32
Sumo Logic supports syslog clients, including syslog-ng and rsyslog. Follow the instructions in the appropriate section below to configure your server to send syslog data. If syslog data does not appear in Sumo Logic, refer to
Copy file name to clipboardExpand all lines: docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog.md
+7-18Lines changed: 7 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,31 +4,22 @@ title: rsyslog
4
4
description: Learn how to configure your server to send syslog data with rsyslog.
5
5
---
6
6
7
-
8
-
9
7
Sumo Logic supports syslog clients such as rsyslog. This document has instructions on how to configure your server to send syslog data. If syslog data does not appear in Sumo Logic, refer to the Troubleshooting section in [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source).
10
8
11
9
## Set up TLS
12
10
13
11
Set up Transport Layer Security (TLS).
14
12
15
-
Download DigiCert and AWS Certificate Manager (ACM) certificates from https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt and
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](https://www.rsyslog.com/doc/configuration/templates.html) or the [rsyslog omfwd documentation](https://www.rsyslog.com/doc/configuration/modules/omfwd.html).
64
-
65
-
In the template statement, be sure to replace YOUR_TOKEN with your actual token, and YOUR_DEPLOYMENT with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the rsyslog template documentation or the rsyslog omfwd documentation.
54
+
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](http://www.rsyslog.com/doc/v7-stable/configuration/templates.html) or the [rsyslog omfwd documentation](http://www.rsyslog.com/doc/v7-stable/configuration/modules/omfwd.html).
66
55
67
56
**For rsyslog v8 and later**
68
57
@@ -76,7 +65,7 @@ $ActionQueueType LinkedList # run asynchronously
76
65
$ActionResumeRetryCount -1 # infinite retries if host is down
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](https://www.rsyslog.com/doc/configuration/templates.html) or the [rsyslog omfwd documentation](https://www.rsyslog.com/doc/configuration/modules/omfwd.html).
83
+
In the template statement, be sure to replace `YOUR_TOKEN` with your actual token, and `YOUR_DEPLOYMENT` with your deployment. Properties in the string begin and end with `%`. All other texts and white space are treated literally. For more information about rsyslog configuration, see the [rsyslog template documentation](http://www.rsyslog.com/doc/master/configuration/templates.html) or the [rsyslog omfwd documentation](http://www.rsyslog.com/doc/master/configuration/modules/omfwd.html).
Copy file name to clipboardExpand all lines: docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng.md
+3-9Lines changed: 3 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,22 +4,19 @@ title: syslog-ng
4
4
description: Learn how to configure your server to send syslog data with syslog-ng.
5
5
---
6
6
7
-
8
-
9
7
Sumo Logic supports syslog clients such as syslog-ng. This document has instructions on how to configure your server to send syslog data. If syslog data does not appear in Sumo Logic, refer to the Troubleshooting section in [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source).
10
8
11
9
## Set up TLS
12
10
13
11
Set up Transport Layer Security (TLS).
14
12
15
-
Download the DigiCert and AWS Certificate Manager (ACM) certificates from https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt and
Download the AWS Certificate Manager (ACM) certificate from https://www.amazontrust.com/repository/AmazonRootCA1.cer.
17
14
18
15
### syslog-ng
19
16
20
-
For syslog-ng, place both certificates in the configuration directory, allowing the syslog-ng client to automatically select the appropriate certificate.
17
+
For syslog-ng place the certificates in the configuration directory and the syslog-ng client will pick up the certificates working from that directory.
21
18
22
-
To set up your DigiCert and AWS Certificate Manager (AWS) certificates, follow these steps:
19
+
To set up your AWS Certificate Manager (AWS) certificate, follow these steps:
23
20
24
21
1. Check if you have the directory `/etc/syslog-ng/ca.d`.
25
22
1. If you don’t, create it with this command:
@@ -29,9 +26,6 @@ To set up your DigiCert and AWS Certificate Manager (AWS) certificates, follow t
0 commit comments