Skip to content

Commit 7b67be8

Browse files
authored
Merge branch 'main' into docs-513-root-cause-explorer-deprecation-release-note
2 parents e3d5f3e + 550f591 commit 7b67be8

File tree

386 files changed

+1257
-488
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

386 files changed

+1257
-488
lines changed

blog-collector/2024-10-31.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: Version 19.514-1
3+
hide_table_of_contents: true
4+
image: https://help.sumologic.com/img/sumo-square.png
5+
---
6+
7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
9+
<a href="https://help.sumologic.com/release-notes-collector/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
10+
11+
In this release, we've enhanced the security and stability of the Collector with added support for security patches and bug fixes.
12+
13+
### Security Fixes
14+
15+
- Upgraded `com.fasterxml.jackson.core` to version 2.15.4 to address jackson-core vulnerability (CVE-2023-0067).
16+
- Upgraded `org.apache.avro:avro` to version 1.11.4 to address ion-java vulnerability (CVE-2024-47561).
17+
18+
### Bug Fix
19+
20+
- Fixed the intermittent collector crash issue for AD source.
21+

blog-cse/2024-10-31-content.md

Lines changed: 157 additions & 0 deletions
Large diffs are not rendered by default.

blog-service/2024-10-14-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ We're excited to announce that when you create a role, you can select **Index Ac
1717
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
1818

1919
:::note
20-
These changes are rolling out across deployments incrementally and will be available on all deployments by October 25, 2024.
20+
These changes are rolling out across deployments incrementally and will be available on all deployments by November 15, 2024.
2121
:::
2222

2323
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role).

blog-service/2024-10-22-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1414

1515
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
1616

17-
We're excited to announce the general availability of AI-driven alerts for metrics anomalies, extending our AI-driven alerting to metrics-based monitors. This release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
17+
We're excited to announce the preview of AI-driven alerts for metrics anomalies, extending our AI-driven alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
1818

1919
### Key Features
2020

blog-service/2024-10-29-apps.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: CrowdStrike Spotlight (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- crowdstrike-spotlight
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new CrowdStrike Spotlight app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud CrowdStrike Spotlight source to collect vulnerability logs through the CrowdStrike Spotlight API, helping you to obtain real-time visibility into vulnerabilities across your organization's assets to the security teams.
15+
16+
Explore our technical documentation [here](/docs/integrations/saas-cloud/crowdstrike-spotlight/) to learn how to set up and use the CrowdStrike Spotlight app for Sumo Logic.

blog-service/2024-10-29-manage.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: Scan Budgets (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- scan-budgets
6+
- manage
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We are happy to introduce our new **Usage Management** tab under the **Accounts** section. This feature allows you to define query spending limits, helping prevent unexpected charges and manage Sumo Logic credits, particularly in pay-per-use scenarios by limiting search volume.
15+
16+
Key features include:
17+
18+
- **Org-wide query budget**. Set a budget for queries that applies to all users in the organization.
19+
- **User level and role level query budget**. Set limits on query data volume at the user level and role level.
20+
- **Flexible actions**. Choose what happens when the budget limit is reached. Options include **Display a warning to the user** or **Restrict queries to background scans only**.
21+
22+
Explore our technical documentation [here](/docs/manage/manage-subscription/usage-management/) to learn how to set up and use Scan Budgets.

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2066,6 +2066,7 @@
20662066
"/cid/4018": "/docs/send-data/installed-collectors",
20672067
"/cid/4019": "/docs/send-data/installed-collectors/sources/script-action",
20682068
"/cid/4412": "/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory",
2069+
"/cid/44122": "/docs/integrations/saas-cloud/crowdstrike-spotlight",
20692070
"/cid/4020": "/docs/search/logreduce",
20702071
"/cid/4021": "/docs/search/search-query-language/search-operators/accum",
20712072
"/cid/4022": "/docs/search/search-query-language/search-operators/fields",

docs/contributing/templates/app-template-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The **Split - Users and Groups** dashboard provides a quick snapshot of ....
9898

9999
<!-- #example: The **Split - Users and Groups** dashboard offers concise statistical summaries pertaining to Split users and groups, including administrative actions taken concerning them.-->
100100

101-
## Upgrading the Split app (Optional)
101+
## Upgrade/Downgrade the Split app (Optional)
102102

103103
import AppUpdate from '../../reuse/apps/app-update.md';
104104

docs/cse/administration/create-a-custom-tag-schema.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This topic has instructions for creating a custom tag schema in Cloud SIEM. 
1313

1414
Tags are metadata you can attach to Insights, Signals, Entities, and Rules. Tags are useful for adding context to these Cloud SIEM items. You can also search for and filter items by tag. There are two types of tags: *keyword tags*, which are arbitrary, freeform strings; and *schema keys*, which are predefined key-value pairs. Cloud SIEM provides built-in schemas keys that display in the Cloud SIEM UI with a Sumo label, as shown in the example below. You can’t edit the built-in schemas.
1515

16-
<img src={useBaseUrl('img/cse/built-in-tags.png')} alt="Built-in schema keys" style={{border: '1px solid gray'}} width="400"/>
16+
<img src={useBaseUrl('img/cse/built-in-tags.png')} alt="Built-in schema keys" style={{border: '1px solid gray'}} width="800"/>
1717

1818
Schema tags can enforce specific tag values and prevent confusion from variations in tag values. For example, you might want to ensure the use of standard server identifiers, such as “FinanceServer”, rather than “Server-Finance” or “Finance_Server”. 
1919

@@ -22,8 +22,8 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
2222
## Define a custom tag schema
2323

2424
1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Tag Schemas**.<br/>[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Tag Schemas**. You can also click the **Go To...** menu at the top of the screen and select **Tag Schemas**.
25-
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schemas-page.png')} alt="Tag schemas page" style={{border: '1px solid gray'}} width="800"/>
26-
1. The **Tag Schema** popup appears. The screenshot below shows a previously configured tag schema. <br/><img src={useBaseUrl('img/cse/tag-schema-filled-in.png')} alt="Example tag schema" style={{border: '1px solid gray'}} width="800"/>
25+
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schema-empty.png')} alt="Create tag schema" style={{border: '1px solid gray'}} width="400"/>
26+
1. The **Tag Schema** popup appears.
2727
1. **Key**. Enter an identifier for the tag you’re defining. It won’t appear in the UI for assigning tags to a content item, unless you leave the **Label** field blank.
2828
1. **Label**. Enter a label for the tag. If you supply a label, that’s what will appear in the UI for assigning tags to a content item.
2929
1. **Content Types**. Select the types that you want the tag to be
@@ -33,6 +33,7 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
3333
* **Entity** The options do not include **Signal** or **Insight**. Signals and Insights inherit tag values from the rule(s) or Custom Insight definition that triggered the Signal or Insight and involved Entities.
3434
1. **Allow Custom Values**. Check this box to allow users to add additional allowable values to the tag schema. Otherwise, when applying the tag users may only select one of the values you define in the **Value Options** section below.
3535
1. **Value Options**. If **Allow Custom Values** is not checked, you must define at least one value for the tag:
36-
* **Value**. Enter an allowable value for the tag.
37-
* **Label**. Enter a label for the value.
38-
* **Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="800"/>
36+
* **Enter Value**. Enter an allowable value for the tag.
37+
* **Enter Label**. Enter a label for the value.
38+
* **Enter Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="400"/>
39+

docs/cse/administration/create-cse-actions.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ You can configure an Action to send information about an Insight to another syst
5252
What gets sent to the target system depends on the Action type. For some types—Slack, Microsoft Teams, and PagerDuty—the notification contains a summary of the Insight with the following information:
5353

5454
* The Entity the Insight fired on.
55-
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to. In the example below, the “Initial Access” tactic is shown.
56-
* A link to the Insight in Cloud SIEM. <br/><img src={useBaseUrl('img/cse/received-email.png')} alt="Example notification" width="600" />
55+
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to.
56+
* A link to the Insight in Cloud SIEM.
5757

5858
For the other Action types—AWS Simple Notification Service (SNS), Demisto (Cortex XSOAR), HTTP POST v2, and Slack Webhook—the notification includes the Insight itself in JSON format, and in some cases Signals or Records, depending on how you configure the Action.
5959

@@ -92,9 +92,11 @@ The notification sent by a Rule Action contains the name of the rule and the re
9292
* **Rule**. Click **When Automatically Disabled** to generate a notification when Cloud SIEM disables a rule.
9393
1. **Active**. Move the slider to the right if you’d like the Action to be enabled upon creation.
9494

95+
Continue filling out the dialog box depending on the type of action you are creating.
96+
9597
### AWS Simple Notification Service (SNS)
9698

97-
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to SNS.
99+
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to the AWS Simple Notification Service (SNS).
98100

99101
You can configure the action to authenticate with SNS using your AWS Access Key and Secret Access Key, or using the **AssumeRole** method.
100102

@@ -103,7 +105,7 @@ You can configure the action to authenticate with SNS using your AWS Access Key
103105
1. **Assume Role ARN**. Enter the AssumeRole ARN, if that's how you want to authenticate. Enter the Sumo Logic AWS account ID. For the Sumo Logic ID, see [Create a role manually using the AWS console](/docs/send-data/hosted-collectors/amazon-aws/grant-access-aws-product#create-a-role-manually-using-the-aws-console).
104106
1. **Topic ARN**. Enter the ARN of the SNS topic.
105107
1. **Region**. Enter the AWS region for the SNS topic. 
106-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/sns.png')} alt="AWS simple notification service action" style={{border: '1px solid gray'}} width="500" />
108+
1. Click **Create**.
107109

108110
### Demisto (Cortex XSOAR)
109111

@@ -115,14 +117,14 @@ When you run this Action type for an Insight, Cloud SIEM sends the full Insight
115117
1. **Create Incident API Endpoint**. Select `/incident/json`.
116118
1. **Extra Headers**. Enter any additional headers you want to send, as line-delimited key:value pairs.
117119
1. **Exclude Records**. Move the slider to the right if you don’t want to include Records in the notification.
118-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/demisto-action.png')} alt="Example Demisto action" style={{border: '1px solid gray'}} width="500" />
120+
1. Click **Create**.
119121

120122
### Email
121123

122124
This Action type sends an email notification.
123125

124126
1. **Recipients**. Enter a comma-separated list of the email addresses to send the notification to.
125-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/email-action.png')} alt="Example email action" style={{border: '1px solid gray'}} width="500" />
127+
1. Click **Create**.
126128

127129
When this Action runs on an Insight, the email notification contains:
128130

@@ -149,7 +151,7 @@ in Cloud SIEM.
149151
1. **Include Signals**. Move the slider to the right to send the Signals associated with the Insight in the POST. 
150152
1. **Include Records**. Move the slider to the right to send the Records associated with the Signal in the POST. 
151153
1. **Record Fields to Include**. If desired, provide a comma-delimited list of selected Record fields to include (instead of all Record fields).
152-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/http-post-v2.png')} alt="Example HTTP Post V2 action" style={{border: '1px solid gray'}} width="500" />
154+
1. Click **Create**.
153155

154156
### Microsoft Teams
155157

@@ -162,15 +164,15 @@ Create a Webhook connection for the Microsoft Teams channel to which emails shou
162164
#### Configure Action in Cloud SIEM
163165

164166
1. **URL**. Enter the URL for the Webhook connection you created above. 
165-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/microsoft-teams.png')} alt="Example Microsoft Teams action" style={{border: '1px solid gray'}} width="500" />
167+
1. Click **Create**.
166168

167169
### PagerDuty
168170

169171
This Action types sends a notification to PagerDuty.
170172

171173
1. **Service Key**. Enter your PagerDuty service key.
172174
1. **Subdomain**. Enter your PagerDuty account subdomain.
173-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/pagerduty.png')} alt="Example PagerDuty action" style={{border: '1px solid gray'}} width="500" />
175+
1. Click **Create**.
174176

175177
The notification contains:
176178

@@ -192,29 +194,27 @@ Lookups will consume RF API credits.
192194
1. On the **Generate New Token** page:
193195
1. **Name**. Enter a name for the token. 
194196
1. **Integration**. Select “Sumologic” from the list of integrations.
195-
1. Click **Generate**. <br/><img src={useBaseUrl('img/cse/rf-api-token.png')} alt="Generate New API token dialog" style={{border: '1px solid gray'}} width="400" />
197+
1. Click **Generate**.
196198
1. Copy and save the token.
197199

198200
#### Create Action in Cloud SIEM
199201

200202
1. **API Key**. Enter the Recorded Future API token you generated for the Sumo Logic integration. 
201203
1. **Enrich Insights**. Move the slider to the right to enrich Insights.
202204
1. **Enrich Signals of Insights**. Move the slider to the right to enrich Signals.
203-
1. Click **Create**.<br/><img src={useBaseUrl('img/cse/recorded-future.png')} alt="Example recorded Future action" style={{border: '1px solid gray'}} width="500" />
205+
1. Click **Create**.
204206

205207
####  View Recorded Future Enrichments
206208

207-
To view an Enrichment that’s been added to an Insight or Signal, navigate to the item and select the **Enrichments** tab.
208-
209-
<img src={useBaseUrl('img/cse/rf-enrichments.png')} alt="Example recorded Future enrichments" style={{border: '1px solid gray'}} width="600" />
209+
To view an Enrichment that’s been added to an Insight or Signal, navigate to the item and select the [**Enrichments**](/docs/cse/integrations/enrichments-and-indicators/#enrichments) tab.
210210

211211
### Slack
212212

213213
This Action type sends a message to a Slack channel.
214214

215215
1. **API Key**. Enter your Slack API key.
216216
1. **Channel**. Enter the Slack Channel that messages should go to.
217-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/slack.png')} alt="Example Slack action" style={{border: '1px solid gray'}} width="500" />
217+
1. Click **Create**.
218218

219219
If the Action was run on an Insight, the message contains:
220220

@@ -233,4 +233,4 @@ Create a Webhook connection for the Slack channel to which Insights should be se
233233
#### Configure Action in Cloud SIEM
234234

235235
1. **Webhook URL**. Enter the URL of the Webhook you created above.
236-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/slack-webhook.png')} alt="Example Slack webhook action" style={{border: '1px solid gray'}} width="500" />
236+
1. Click **Create**.

0 commit comments

Comments
 (0)