Skip to content

Commit 71570b0

Browse files
committed
Merge branch 'docs-1209-update-image-tagging-in-metrics-and-observability' of github.com:SumoLogic/sumologic-documentation into docs-1209-update-image-tagging-in-metrics-and-observability
2 parents ce0ac3d + f2316df commit 71570b0

File tree

19 files changed

+548
-120
lines changed

19 files changed

+548
-120
lines changed

docs/cloud-soar/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar_label: Overview
77
import useBaseUrl from '@docusaurus/useBaseUrl';
88
import StaticIpAddresses from '../reuse/static-ips-automation-service.md';
99

10-
Cloud SOAR automates triage, investigation, and remediation of threats for security professionals. The open integrations framework allows you to connect to many third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR).
10+
Cloud SOAR automates triage, investigation, and remediation of threats for security professionals. Its open integrations framework allows you to connect to many third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR).
1111

1212
## Why Cloud SOAR?
1313

docs/observability/aws/deploy-use-aws-observability/before-you-deploy.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,10 @@ If you are already collecting AWS metrics, logs, and/or events, we recommend tha
3636
:::note
3737
For the AWS Observability Solution, you must use the default scope when generating the Access ID and Key; custom scopes are not supported.
3838
:::
39+
* **[Disabled allowlist](https://www.sumologic.com/help/docs/manage/security/create-allowlist-ip-cidr-addresses/) for login and APIs**. During the installation/upgrade of the AWSO solution, the allowlist for login and APIs must remain disabled because the solution creates Lambda functions that uses AWS-managed public network infrastructure. When this Lambda makes outbound calls (such as to Sumo Logic APIs), the traffic is routed through AWS public IP address ranges, which are dynamic and cannot be fixed or predicted.
40+
* The AWS Observability solution comes with [pre-packaged alerts](https://www.sumologic.com/help/docs/observability/aws/deploy-use-aws-observability/configure-alerts/) in the form of Sumo Logic Monitors. To understand more about their capabilities, please visit the [Monitors page](https://www.sumologic.com/help/docs/alerts/monitors/).
3941
* **AWS credentials**. To deploy the solution, you will need to log onto the AWS Console. For the CloudFormation template deployment option, your AWS role must have the permissions described by this [JSON file](https://sumologic-appdev-aws-sam-apps.s3.amazonaws.com/AWSObservabilityCFTemplatePermissions.json). As necessary, you may add JSON text to an existing or a new policy associated with an AWS IAM role as described in the [AWS documentation](https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-create-and-attach-iam-policy.html). For Terraform deployment options, see the \*.tmpl files in this folder [aws-observability-terraform/source-module/templates/](https://github.com/SumoLogic/sumologic-solution-templates/tree/master/aws-observability-terraform/source-module/templates).
4042
* Set up the [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-install.html) and configure the AWS CLI as described in the [AWS documentation](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html) if you would like to use an AWS profile for Terraform script based deployment.
41-
* The AWS Observability solution comes with pre-packaged alerts in the form of Sumo Logic Monitors. To understand more about their capabilities please visit the Monitors page.
4243
* For AWS services exporting to CloudWatch Logs, make sure logs are exported to log groups:
4344
* RDS - Enable publishing of logs to CloudWatch by following instructions in [Collect Amazon RDS CloudTrail logs](/docs/integrations/amazon-aws/rds/#collect-amazon-rds-cloudwatch-logs).
4445
* API Gateway - Enable Access Logs for each respective API by following instructions in Step 3 of [Collect access logs for AWS API Gateway](/docs/integrations/amazon-aws/api-gateway/#collect-access-logs-for-aws-api-gateway). Make sure you have the following prefix `/aws/apigateway/<apiid>/<stagename>` while creating the log group.

docs/platform-services/automation-service/app-central/integrations/microsoft-ews-graph.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
77

88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/microsoft-ews.png')} alt="microsoft-ews" width="100"/>
99

10-
***Version: 1.1
11-
Updated: Oct 31, 2025***
10+
***Version: 1.2
11+
Updated: Nov 21, 2025***
1212

1313
Perform actions on Microsoft EWS mailboxes and accounts using Graph API.
1414

@@ -137,4 +137,7 @@ Email Gateway
137137
## Change Log
138138

139139
* September 10, 2025 - First upload
140-
* October 31, 2025 - Fixed issue in the **Download Mail As EML action**.
140+
* October 31, 2025 (v1.1) - Fixed issue in the **Download Mail As EML** action.
141+
* November 21, 2025 (v1.2)
142+
+ Fixed issue in the **Search Emails Extended** action.
143+
+ Converted `has_attachments` and `is_unread` from text fields to list fields with true/false options.

0 commit comments

Comments
 (0)