Skip to content

Commit 6d45080

Browse files
authored
Merge branch 'main' into docs-510-kubernetes-sample-script
2 parents 35cd2cd + 6cb96e0 commit 6d45080

File tree

384 files changed

+1072
-475
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

384 files changed

+1072
-475
lines changed

blog-service/2024-10-22-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1414

1515
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
1616

17-
We're excited to announce the general availability of AI-driven alerts for metrics anomalies, extending our AI-driven alerting to metrics-based monitors. This release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
17+
We're excited to announce the preview of AI-driven alerts for metrics anomalies, extending our AI-driven alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
1818

1919
### Key Features
2020

blog-service/2024-10-29-apps.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: CrowdStrike Spotlight (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- crowdstrike-spotlight
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new CrowdStrike Spotlight app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud CrowdStrike Spotlight source to collect vulnerability logs through the CrowdStrike Spotlight API, helping you to obtain real-time visibility into vulnerabilities across your organization's assets to the security teams.
15+
16+
Explore our technical documentation [here](/docs/integrations/saas-cloud/crowdstrike-spotlight/) to learn how to set up and use the CrowdStrike Spotlight app for Sumo Logic.

blog-service/2024-10-29-manage.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: Scan Budgets (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- scan-budgets
6+
- manage
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We are happy to introduce our new **Usage Management** tab under the **Accounts** section. This feature allows you to define query spending limits, helping prevent unexpected charges and manage Sumo Logic credits, particularly in pay-per-use scenarios by limiting search volume.
15+
16+
Key features include:
17+
18+
- **Org-wide query budget**. Set a budget for queries that applies to all users in the organization.
19+
- **User level and role level query budget**. Set limits on query data volume at the user level and role level.
20+
- **Flexible actions**. Choose what happens when the budget limit is reached. Options include **Display a warning to the user** or **Restrict queries to background scans only**.
21+
22+
Explore our technical documentation [here](/docs/manage/manage-subscription/usage-management/) to learn how to set up and use Scan Budgets.

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2066,6 +2066,7 @@
20662066
"/cid/4018": "/docs/send-data/installed-collectors",
20672067
"/cid/4019": "/docs/send-data/installed-collectors/sources/script-action",
20682068
"/cid/4412": "/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory",
2069+
"/cid/44122": "/docs/integrations/saas-cloud/crowdstrike-spotlight",
20692070
"/cid/4020": "/docs/search/logreduce",
20702071
"/cid/4021": "/docs/search/search-query-language/search-operators/accum",
20712072
"/cid/4022": "/docs/search/search-query-language/search-operators/fields",

docs/contributing/templates/app-template-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The **Split - Users and Groups** dashboard provides a quick snapshot of ....
9898

9999
<!-- #example: The **Split - Users and Groups** dashboard offers concise statistical summaries pertaining to Split users and groups, including administrative actions taken concerning them.-->
100100

101-
## Upgrading the Split app (Optional)
101+
## Upgrade/Downgrade the Split app (Optional)
102102

103103
import AppUpdate from '../../reuse/apps/app-update.md';
104104

docs/cse/administration/create-a-custom-tag-schema.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This topic has instructions for creating a custom tag schema in Cloud SIEM. 
1313

1414
Tags are metadata you can attach to Insights, Signals, Entities, and Rules. Tags are useful for adding context to these Cloud SIEM items. You can also search for and filter items by tag. There are two types of tags: *keyword tags*, which are arbitrary, freeform strings; and *schema keys*, which are predefined key-value pairs. Cloud SIEM provides built-in schemas keys that display in the Cloud SIEM UI with a Sumo label, as shown in the example below. You can’t edit the built-in schemas.
1515

16-
<img src={useBaseUrl('img/cse/built-in-tags.png')} alt="Built-in schema keys" style={{border: '1px solid gray'}} width="400"/>
16+
<img src={useBaseUrl('img/cse/built-in-tags.png')} alt="Built-in schema keys" style={{border: '1px solid gray'}} width="800"/>
1717

1818
Schema tags can enforce specific tag values and prevent confusion from variations in tag values. For example, you might want to ensure the use of standard server identifiers, such as “FinanceServer”, rather than “Server-Finance” or “Finance_Server”. 
1919

@@ -22,8 +22,8 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
2222
## Define a custom tag schema
2323

2424
1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Tag Schemas**.<br/>[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Tag Schemas**. You can also click the **Go To...** menu at the top of the screen and select **Tag Schemas**.
25-
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schemas-page.png')} alt="Tag schemas page" style={{border: '1px solid gray'}} width="800"/>
26-
1. The **Tag Schema** popup appears. The screenshot below shows a previously configured tag schema. <br/><img src={useBaseUrl('img/cse/tag-schema-filled-in.png')} alt="Example tag schema" style={{border: '1px solid gray'}} width="800"/>
25+
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schema-empty.png')} alt="Create tag schema" style={{border: '1px solid gray'}} width="400"/>
26+
1. The **Tag Schema** popup appears.
2727
1. **Key**. Enter an identifier for the tag you’re defining. It won’t appear in the UI for assigning tags to a content item, unless you leave the **Label** field blank.
2828
1. **Label**. Enter a label for the tag. If you supply a label, that’s what will appear in the UI for assigning tags to a content item.
2929
1. **Content Types**. Select the types that you want the tag to be
@@ -33,6 +33,7 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
3333
* **Entity** The options do not include **Signal** or **Insight**. Signals and Insights inherit tag values from the rule(s) or Custom Insight definition that triggered the Signal or Insight and involved Entities.
3434
1. **Allow Custom Values**. Check this box to allow users to add additional allowable values to the tag schema. Otherwise, when applying the tag users may only select one of the values you define in the **Value Options** section below.
3535
1. **Value Options**. If **Allow Custom Values** is not checked, you must define at least one value for the tag:
36-
* **Value**. Enter an allowable value for the tag.
37-
* **Label**. Enter a label for the value.
38-
* **Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="800"/>
36+
* **Enter Value**. Enter an allowable value for the tag.
37+
* **Enter Label**. Enter a label for the value.
38+
* **Enter Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="400"/>
39+

docs/cse/administration/create-cse-actions.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ You can configure an Action to send information about an Insight to another syst
5252
What gets sent to the target system depends on the Action type. For some types—Slack, Microsoft Teams, and PagerDuty—the notification contains a summary of the Insight with the following information:
5353

5454
* The Entity the Insight fired on.
55-
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to. In the example below, the “Initial Access” tactic is shown.
56-
* A link to the Insight in Cloud SIEM. <br/><img src={useBaseUrl('img/cse/received-email.png')} alt="Example notification" width="600" />
55+
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to.
56+
* A link to the Insight in Cloud SIEM.
5757

5858
For the other Action types—AWS Simple Notification Service (SNS), Demisto (Cortex XSOAR), HTTP POST v2, and Slack Webhook—the notification includes the Insight itself in JSON format, and in some cases Signals or Records, depending on how you configure the Action.
5959

@@ -92,9 +92,11 @@ The notification sent by a Rule Action contains the name of the rule and the re
9292
* **Rule**. Click **When Automatically Disabled** to generate a notification when Cloud SIEM disables a rule.
9393
1. **Active**. Move the slider to the right if you’d like the Action to be enabled upon creation.
9494

95+
Continue filling out the dialog box depending on the type of action you are creating.
96+
9597
### AWS Simple Notification Service (SNS)
9698

97-
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to SNS.
99+
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to the AWS Simple Notification Service (SNS).
98100

99101
You can configure the action to authenticate with SNS using your AWS Access Key and Secret Access Key, or using the **AssumeRole** method.
100102

@@ -103,7 +105,7 @@ You can configure the action to authenticate with SNS using your AWS Access Key
103105
1. **Assume Role ARN**. Enter the AssumeRole ARN, if that's how you want to authenticate. Enter the Sumo Logic AWS account ID. For the Sumo Logic ID, see [Create a role manually using the AWS console](/docs/send-data/hosted-collectors/amazon-aws/grant-access-aws-product#create-a-role-manually-using-the-aws-console).
104106
1. **Topic ARN**. Enter the ARN of the SNS topic.
105107
1. **Region**. Enter the AWS region for the SNS topic. 
106-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/sns.png')} alt="AWS simple notification service action" style={{border: '1px solid gray'}} width="500" />
108+
1. Click **Create**.
107109

108110
### Demisto (Cortex XSOAR)
109111

@@ -115,14 +117,14 @@ When you run this Action type for an Insight, Cloud SIEM sends the full Insight
115117
1. **Create Incident API Endpoint**. Select `/incident/json`.
116118
1. **Extra Headers**. Enter any additional headers you want to send, as line-delimited key:value pairs.
117119
1. **Exclude Records**. Move the slider to the right if you don’t want to include Records in the notification.
118-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/demisto-action.png')} alt="Example Demisto action" style={{border: '1px solid gray'}} width="500" />
120+
1. Click **Create**.
119121

120122
### Email
121123

122124
This Action type sends an email notification.
123125

124126
1. **Recipients**. Enter a comma-separated list of the email addresses to send the notification to.
125-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/email-action.png')} alt="Example email action" style={{border: '1px solid gray'}} width="500" />
127+
1. Click **Create**.
126128

127129
When this Action runs on an Insight, the email notification contains:
128130

@@ -149,7 +151,7 @@ in Cloud SIEM.
149151
1. **Include Signals**. Move the slider to the right to send the Signals associated with the Insight in the POST. 
150152
1. **Include Records**. Move the slider to the right to send the Records associated with the Signal in the POST. 
151153
1. **Record Fields to Include**. If desired, provide a comma-delimited list of selected Record fields to include (instead of all Record fields).
152-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/http-post-v2.png')} alt="Example HTTP Post V2 action" style={{border: '1px solid gray'}} width="500" />
154+
1. Click **Create**.
153155

154156
### Microsoft Teams
155157

@@ -162,15 +164,15 @@ Create a Webhook connection for the Microsoft Teams channel to which emails shou
162164
#### Configure Action in Cloud SIEM
163165

164166
1. **URL**. Enter the URL for the Webhook connection you created above. 
165-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/microsoft-teams.png')} alt="Example Microsoft Teams action" style={{border: '1px solid gray'}} width="500" />
167+
1. Click **Create**.
166168

167169
### PagerDuty
168170

169171
This Action types sends a notification to PagerDuty.
170172

171173
1. **Service Key**. Enter your PagerDuty service key.
172174
1. **Subdomain**. Enter your PagerDuty account subdomain.
173-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/pagerduty.png')} alt="Example PagerDuty action" style={{border: '1px solid gray'}} width="500" />
175+
1. Click **Create**.
174176

175177
The notification contains:
176178

@@ -192,29 +194,27 @@ Lookups will consume RF API credits.
192194
1. On the **Generate New Token** page:
193195
1. **Name**. Enter a name for the token. 
194196
1. **Integration**. Select “Sumologic” from the list of integrations.
195-
1. Click **Generate**. <br/><img src={useBaseUrl('img/cse/rf-api-token.png')} alt="Generate New API token dialog" style={{border: '1px solid gray'}} width="400" />
197+
1. Click **Generate**.
196198
1. Copy and save the token.
197199

198200
#### Create Action in Cloud SIEM
199201

200202
1. **API Key**. Enter the Recorded Future API token you generated for the Sumo Logic integration. 
201203
1. **Enrich Insights**. Move the slider to the right to enrich Insights.
202204
1. **Enrich Signals of Insights**. Move the slider to the right to enrich Signals.
203-
1. Click **Create**.<br/><img src={useBaseUrl('img/cse/recorded-future.png')} alt="Example recorded Future action" style={{border: '1px solid gray'}} width="500" />
205+
1. Click **Create**.
204206

205207
####  View Recorded Future Enrichments
206208

207-
To view an Enrichment that’s been added to an Insight or Signal, navigate to the item and select the **Enrichments** tab.
208-
209-
<img src={useBaseUrl('img/cse/rf-enrichments.png')} alt="Example recorded Future enrichments" style={{border: '1px solid gray'}} width="600" />
209+
To view an Enrichment that’s been added to an Insight or Signal, navigate to the item and select the [**Enrichments**](/docs/cse/integrations/enrichments-and-indicators/#enrichments) tab.
210210

211211
### Slack
212212

213213
This Action type sends a message to a Slack channel.
214214

215215
1. **API Key**. Enter your Slack API key.
216216
1. **Channel**. Enter the Slack Channel that messages should go to.
217-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/slack.png')} alt="Example Slack action" style={{border: '1px solid gray'}} width="500" />
217+
1. Click **Create**.
218218

219219
If the Action was run on an Insight, the message contains:
220220

@@ -233,4 +233,4 @@ Create a Webhook connection for the Slack channel to which Insights should be se
233233
#### Configure Action in Cloud SIEM
234234

235235
1. **Webhook URL**. Enter the URL of the Webhook you created above.
236-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/slack-webhook.png')} alt="Example Slack webhook action" style={{border: '1px solid gray'}} width="500" />
236+
1. Click **Create**.

docs/cse/administration/create-cse-context-actions.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -107,10 +107,6 @@ The only required parameter in the URL is `{{value}}`. Depending on your use cas
107107

108108
`https://www.criminalip.io/asset/report/{{value}}`
109109

110-
For example:
111-
112-
<img src={useBaseUrl('img/cse/context-action-criminal-ip-example.png')} alt="Criminal IP context action example" style={{border: '1px solid gray'}} width="500"/>
113-
114110
## Template parameters for Context Actions
115111

116112
The table below defines the parameters you can use in the URL template for a Context Action.

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,17 +42,17 @@ Rule authors can also write rules that look for threat intelligence information
4242
### Create a threat intelligence source from Cloud SIEM UI
4343

4444
1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
45-
1. Click **Add Source** on the **Threat Intelligence** page. <br/><img src={useBaseUrl('img/cse/threat-intel-page2.png')} alt="Threat Intelligence page" width="800"/>
46-
1. Click **Custom** on the **Add Source** popup. <br/><img src={useBaseUrl('img/cse/custom-button.png')} alt="Custom button" width="600"/>
47-
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source. <br/><img src={useBaseUrl('img/cse/add-custom-source.png')} alt="Add new source" width="600"/>
45+
1. Click **Add Source** on the **Threat Intelligence** page.
46+
1. Click **Custom** on the **Add Source** popup.
47+
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
4848
1. Click **Add Custom Source**.
4949

5050
Your new source should now appear on the **Threat Intelligence** page.
5151

5252
### Enter indicators manually
5353

54-
1. On the **Threat Intelligence** page, click the name of the source you want to update. <br/><img src={useBaseUrl('img/cse/click-name.png')} alt="List of sources" width="800"/>
55-
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**. <br/><img src={useBaseUrl('img/cse/threat-details.png')} alt="List of indicators" width="800"/>
54+
1. On the **Threat Intelligence** page, click the name of the source you want to update.
55+
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
5656
1. On the **New Threat Intelligence Indicator** popup.
5757
1. **Value**. Enter an IP address, hostname, URL, or file hash.
5858
Your entry must be one of:
@@ -72,7 +72,7 @@ Your new source should now appear on the **Threat Intelligence** page.
7272
### Upload a file of indicators 
7373

7474
If you have a large number of indicators to add to your source, you can
75-
save time by creating a .csv file and uploading it to Cloud SIEM. <br/><img src={useBaseUrl('img/cse/import-indicators.png')} alt="'Import Indicators from CSV' dialog" width="400"/>
75+
save time by creating a .csv file and uploading it to Cloud SIEM.
7676

7777
#### Create a CSV file
7878

0 commit comments

Comments
 (0)