Skip to content

Commit 8f75894

Browse files
JV0812jpipkin1
andauthored
Atlassian app doc (#4647)
* Atlassian app doc * minor fix * images added * Update docs/integrations/saas-cloud/atlassian.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/saas-cloud/atlassian.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/saas-cloud/atlassian.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]>
1 parent e061795 commit 8f75894

File tree

9 files changed

+176
-1
lines changed

9 files changed

+176
-1
lines changed

blog-service/2024-10-17-apps.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Atlassian (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- atlassian
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Atlassian app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Atlassian source to collect events logs through the Events API, helping you to to monitor critical events such as user activities, policy changes, group and API token creations, and product access.
15+
16+
Explore our technical documentation [here](/docs/integrations/saas-cloud/atlassian/) to learn how to set up and use the Atlassian app for Sumo Logic.

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1578,6 +1578,7 @@
15781578
"/cid/10204": "/docs/integrations/saas-cloud/cato-networks",
15791579
"/cid/10198": "/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting",
15801580
"/cid/10193": "/docs/integrations/saas-cloud/asana",
1581+
"/cid/10181": "/docs/integrations/saas-cloud/atlassian",
15811582
"/cid/10197": "/docs/integrations/saas-cloud/symantec-web-security-service",
15821583
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
15831584
"/cid/10113": "/docs/observability/root-cause-explorer",

docs/integrations/product-list/product-list-a-l.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
7777
| <img src={useBaseUrl('img/integrations/misc/aria-logo.png')} alt="Thumbnail icon" width="50"/> | [Aria](https://www.ariacybersecurity.com/cybersecurity-products/aria-packet-intelligence/) | Partner integration: [Aria](https://www.ariacybersecurity.com/aria-packet-intelligence-app/) |
7878
| <img src={useBaseUrl('img/send-data/armis-icon.png')} alt="Thumbnail icon" width="75"/> | [Armis](https://www.armis.com/) | App: [Armis](/docs/integrations/saas-cloud/armis/) <br/>Collector: [Armis API Integration Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/armis-api-source/) |
7979
| <img src={useBaseUrl('img/send-data/asana-icon.png')} alt="Thumbnail icon" width="50"/> | [Asana](https://asana.com/) | App: [Asana](/docs/integrations/saas-cloud/asana/) <br/>Collector: [Asana Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/asana-source/) |
80-
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/atlassian-confluence.png')} alt="Thumbnail icon" width="75"/> | [Atlassian](https://www.atlassian.com) | Apps: <br/>- [Jira](/docs/integrations/app-development/jira/) <br/>- [Jira Cloud](/docs/integrations/app-development/jira-cloud/) <br/>- [Jira - OpenTelemetry](/docs/integrations/app-development/opentelemetry/jira-opentelemetry/) <br/>Automation integrations: <br/>- [Atlassian Confluence](/docs/platform-services/automation-service/app-central/integrations/atlassian-confluence/) <br/>- [Atlassian Jira](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira/) <br/>- [Atlassian Jira V2](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira-v2/) <br/>Collector: [Atlassian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source/)<br/>Cloud SIEM integration: [Atlassian](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/4d40dc7a-b95e-476c-9fb0-7163ea7fd335.md) <br/>Webhooks: <br/>- [Webhook Connection for Jira Cloud](/docs/alerts/webhook-connections/jira-cloud/) <br/>- [Webhook Connection for Jira Server](/docs/alerts/webhook-connections/jira-server/) <br/>- [Webhook Connection for Jira Service Desk](/docs/alerts/webhook-connections/jira-service-desk/) |
80+
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/atlassian-confluence.png')} alt="Thumbnail icon" width="75"/> | [Atlassian](https://www.atlassian.com) | Apps: <br/>- [Atlassian](/docs/integrations/saas-cloud/atlassian/) <br/>- [Jira](/docs/integrations/app-development/jira/) <br/>- [Jira Cloud](/docs/integrations/app-development/jira-cloud/) <br/>- [Jira - OpenTelemetry](/docs/integrations/app-development/opentelemetry/jira-opentelemetry/) <br/>Automation integrations: <br/>- [Atlassian Confluence](/docs/platform-services/automation-service/app-central/integrations/atlassian-confluence/) <br/>- [Atlassian Jira](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira/) <br/>- [Atlassian Jira V2](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira-v2/) <br/>Collector: [Atlassian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source/)<br/>Cloud SIEM integration: [Atlassian](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/4d40dc7a-b95e-476c-9fb0-7163ea7fd335.md) <br/>Webhooks: <br/>- [Webhook Connection for Jira Cloud](/docs/alerts/webhook-connections/jira-cloud/) <br/>- [Webhook Connection for Jira Server](/docs/alerts/webhook-connections/jira-server/) <br/>- [Webhook Connection for Jira Service Desk](/docs/alerts/webhook-connections/jira-service-desk/) |
8181
| <img src={useBaseUrl('img/integrations/misc/automation-anywhere-logo.png')} alt="Thumbnail icon" width="50"/> | [Automation Anywhere](https://www.automationanywhere.com/) | Partner integration: [Automation Anywhere](https://docs.automationanywhere.com/bundle/enterprise-v2019/page/enterprise-cloud/topics/control-room/administration/settings/setting-up-sumo-logic.html) |
8282
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/automox.png')} alt="Thumbnail icon" width="100"/> | [Automox](https://www.automox.com/) | Automation integration: [Automox](/docs/platform-services/automation-service/app-central/integrations/automox/) <br/>Collector: [Automox Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/automox-source) |
8383
| <img src={useBaseUrl('img/integrations/saml/auth0.png')} alt="Thumbnail icon" width="50"/> | [Auth0](https://auth0.com/) | App: [Auth0](/docs/integrations/saml/auth0/) <br/>Cloud SIEM integration: [Auth0](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/f002a19c-876e-4a33-8be0-ed3b922d19bc.md) <br/>Collector: [Auth0 - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0/) <br/>Partner integration: [Auth0](https://auth0.com/docs/customize/log-streams/sumo-logic-dashboard) |
Lines changed: 151 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,151 @@
1+
---
2+
id: atlassian
3+
title: Atlassian
4+
sidebar_label: Atlassian
5+
description: Monitor and analyze the critical events of Atlassian data.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/send-data/atlassian-icon.png')} alt="atlassian-icon" width="40" />
11+
12+
The Sumo Logic app for Atlassian provides comprehensive visibility into your organization's Atlassian environment, including Confluence, Jira, and Bitbucket. This app helps security and IT teams monitor critical events such as user activities, policy changes, group and API token creations, and product access, all of which are essential for security audits and compliance tracking. With pre-configured dashboards, you can quickly detect suspicious behavior like unauthorized access, configuration changes, and potential insider threats. Geolocation features helps you to identify the physical origin of actions, which is valuable for investigating abnormal activity from unusual regions. The app also tracks key security events such as failed logins, API accesses, and policy updates, allowing security teams to ensure that Atlassian services are being used securely and efficiently. This app is essential for maintaining governance and security within the Atlassian suite.
13+
14+
:::info
15+
This app includes [built-in monitors](#atlassian-monitors). For details on creating custom monitors, refer to [Create monitors for Atlassian app](#create-monitors-for-atlassian-app).
16+
:::
17+
18+
## Log types
19+
20+
This app uses Sumo Logic’s Atlassian Source to collect [Event Logs](https://developer.atlassian.com/cloud/admin/organization/rest/api-group-events/#api-group-events) from Atlassian.
21+
22+
### Sample log message
23+
24+
```json title="Event Log"
25+
{
26+
"type": "events",
27+
"id": "606a97f7-f2d9-4007-91a7-8adyc1s328bf",
28+
"attributes": {
29+
"time": "2024-10-03T10:44:26.457Z",
30+
"action": "jira_issue_viewed",
31+
"actor": {
32+
"id": "557058:bd955be1-e2d3-41e4-a3be-70bf24d0444e",
33+
"name": "xyzabc",
34+
"email": "[email protected]",
35+
"links": {
36+
"alt": "https://admin.atlassian.com/s/cee46caf-81e6-41b6-b8a0-a767d9/users/557058:bd955be1-e2d3-41e4-a3be-70bf24d0444e",
37+
"self": "https://api.atlassian.com/users/557058:bd955be1-e2d3-41e470bf24d0444e/manage/profile"
38+
}
39+
},
40+
"context": [],
41+
"container": [
42+
{
43+
"id": "cee46caf-81e6-41b6-b8723f8067d9",
44+
"type": "sites",
45+
"attributes": {
46+
"siteName": "gmail",
47+
"product": "software",
48+
"issueId": "284408",
49+
"issueKeyOrId": "WEB-21003",
50+
"siteHostName": "https://gmail.atlassian.net"
51+
},
52+
"links": {
53+
"alt": "https://gmail.atlassian.net/browse/WEB-21003"
54+
}
55+
}
56+
],
57+
"location": {
58+
"ip": "91.225.122.155",
59+
"countryName": "Ukraine",
60+
"regionName": "Kyiv City",
61+
"city": "Kyiv"
62+
}
63+
},
64+
"links": {
65+
"self": "https://api.atlassian.com/admin/v1/orgs/eced9542-6842-bcb1-3662afe713d7/events/606a97f7-f2d907-91a7-8ad4c1f328bf"
66+
},
67+
"message": {
68+
"content": "Viewed Jira issue WEB-21003",
69+
"format": "simple"
70+
}
71+
}
72+
```
73+
74+
### Sample queries
75+
76+
```sql title="Events by Action"
77+
_sourceCategory="Labs/Atlassian"
78+
| json "attributes.actor.name", "attributes.action", "attributes.location.countryName", "id", "message.content", "attributes.location.city", "attributes.location.regionName", "attributes.location.ip", "attributes.actor.email", "attributes.time", "type", "attributes.context[*].attributes" as actor, action, country, id, message, city, region, ip, actor_email, time, type, action_performed_against nodrop
79+
80+
// global filters
81+
| where actor matches "{{actor}}"
82+
| where action matches "{{action}}"
83+
84+
| count by id, action
85+
| count as frequency by action
86+
| sort by frequency
87+
```
88+
89+
## Set up collection
90+
91+
To set up [Cloud-to-Cloud Integration Atlassian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source) for the Atlassian app, follow the instructions provided. These instructions will guide you through the process of creating a source using the Atlassian Source category, which you will need to use when installing the app. By following these steps, you can ensure that your Atlassian app is properly integrated and configured to collect and analyze your Atlassian data.
92+
93+
## Installing the Atlassian app
94+
95+
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
96+
97+
<AppInstall2/>
98+
99+
## Viewing Atlassian dashboards
100+
101+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
102+
103+
<ViewDashboards/>
104+
105+
### Overview
106+
107+
The **Atlassian - Overview** dashboard provides a comprehensive overview of key actions and events across the Atlassian environment, offering critical insights for security teams. It displays the total number of events, breaks down actions by type (for example, user logins, API access, and policy changes), and visualizes event frequency over time to help detect abnormal activity patterns.
108+
109+
The top actors and their associated actions are highlighted, allowing quick identification of potential security risks. Additionally, the geolocation maps identify where actors and risky activities are originating from, offering further context for threat detection. The recent events table gives granular details, including timestamps, actor names, and countries, aiding in a thorough investigation of any security incidents. This dashboard is instrumental for detecting unauthorized access, policy violations, and other suspicious activity within the Atlassian ecosystem. <br/><img src={useBaseUrl('img/integrations/saas-cloud/atlassian-overview.png')} alt="atlassian-Overview" width="750"/>
110+
111+
### Jira, Confluence, and Bitbucket
112+
113+
The **Atlassian - Jira, Confluence, and Bitbucket** dashboard provides a holistic view of user activities across the three platforms, making it a crucial tool for security teams. It offers insights into key actions such as sprint management in Jira, space permissions in Confluence, and user account modifications in Bitbucket.
114+
115+
Security professionals can use this dashboard to track the frequency of Jira events, such as sprint creations, updates, and closures, along with user roles and permission changes. The Confluence section monitors critical events related to permission alterations, while Bitbucket tracks password resets, user activations, and deactivations, helping detect unauthorized account actions. The *Events Over Time* section enables trend analysis of activity spikes and the *Recently Added Security Levels* highlights any updates in project security. The geolocation mapping of actors offers added visibility into where activities originate, helping identify potential geographic threats.<br/><img src={useBaseUrl('img/integrations/saas-cloud/atlassian-jira-confluence-and-bitbucket.png')} alt="atlassian-jira-confluence-and-bitbucke" width="750"/>
116+
117+
### User Activity
118+
119+
The **Atlassian - User Activity** dashboard provides a comprehensive overview of critical user actions and security-related events within the Atlassian platform. It monitors key activities such as user creation, role assignment, API token generation, and policy changes, helping security teams detect unauthorized account modifications or policy alterations. The dashboard includes visualizations of login attempts (both successful and failed attempts) and tracks access granted to users over time, aiding in the identification of potential security breaches or abnormal access patterns. A detailed events summary table provides insights into who performed specific actions and from which geographical locations, which is crucial for identifying suspicious activity. This dashboard is a valuable tool for security teams to oversee user activity, policy enforcement, and system integrity.<br/><img src={useBaseUrl('img/integrations/saas-cloud/atlassian-user-activity.png')} alt="atlassian-user-activity" width="750"/>
120+
121+
## Create monitors for Atlassian app
122+
123+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
124+
125+
<CreateMonitors/>
126+
127+
### Atlassian monitors
128+
129+
The Atlassian monitors are designed for security purpose to focus on monitoring key activities and potential threats across Atlassian environments. These alerts provide real-time visibility into critical actions, enabling security teams to respond quickly to anomalies or policy violations.
130+
131+
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
132+
|:--|:--|:--|:--|
133+
| `Events from Risky Locations` | This alert is fired when the user actions are originating from high-risk locations (Afghanistan, China, Cuba, North Korea, Iran, Libya, Nigeria, Sudan, Syria, and Yemen) based on geographical profiles. This helps detect potential account compromise or malicious activities. | Critical | Count > 0 |
134+
| `User addition to group` | This alert is fired when when users are added to groups, ensuring that changes in group memberships, especially those with elevated privileges, are legitimate. | Critical | Count > 1|
135+
| `API Token Created` | This alert is fired during the creation of API tokens, which can be exploited if misused. Monitoring this ensures that only authorized users are generating API tokens for secure integrations. | Critical | Count > 0 |
136+
| `User Granted Product Access` | This alert fires when users are granted access to specific Atlassian products, helping ensure that only authorized individuals gain access to sensitive tools or data. | Critical | Count > 5 |
137+
| `Failed Login events` | This alert is fired when there is failed login attempts, which can indicate brute force attacks or unauthorized access attempts. Repeated failures may suggest a compromised user account. | Critical | Count > 5 |
138+
| `Login exceeds set parameters` | This alert is fired when logins exceed predefined thresholds, such as login attempts or unusual session durations, which could signal suspicious activity. | Critical | Count > 1 |
139+
| `Change in Policy` | This alert is fired when there is changes in organizational policies, such as user access controls or security settings, helping prevent unauthorized modifications that could lead to vulnerabilities. | Critical | Count > 0 |
140+
141+
## Upgrading the Atlassian app (Optional)
142+
143+
import AppUpdate from '../../reuse/apps/app-update.md';
144+
145+
<AppUpdate/>
146+
147+
## Uninstalling the Atlassian app (Optional)
148+
149+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
150+
151+
<AppUninstall/>

docs/integrations/saas-cloud/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
5757
<p>Monitor and analyze the Asana data to detect potential security threats related to user activity.</p>
5858
</div>
5959
</div>
60+
<div className="box smallbox card">
61+
<div className="container">
62+
<a href="/docs/integrations/saas-cloud/atlassian"><img src={useBaseUrl('img/send-data/atlassian-icon.png')} alt="atlassian-icon.png" width="60" /><h4>Atlassian</h4></a>
63+
<p>Monitor and analyze the critical events of Atlassian data.</p>
64+
</div>
65+
</div>
6066
<div className="box smallbox card">
6167
<div className="container">
6268
<a href="/docs/integrations/saas-cloud/box"><img src={useBaseUrl('img/integrations/saas-cloud/box.png')} alt="icon" width="80"/><h4>Box</h4></a>

sidebars.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2441,6 +2441,7 @@ integrations: [
24412441
'integrations/saas-cloud/akamai-datastream',
24422442
'integrations/saas-cloud/armis',
24432443
'integrations/saas-cloud/asana',
2444+
'integrations/saas-cloud/atlassian',
24442445
'integrations/saas-cloud/box',
24452446
'integrations/saas-cloud/cato-networks',
24462447
'integrations/saas-cloud/cisco-meraki-c2c',
363 KB
Loading
626 KB
Loading
398 KB
Loading

0 commit comments

Comments
 (0)