Skip to content

Commit 95e777d

Browse files
authored
Merge branch 'main' into OneLogin-(c2c)
2 parents a78030c + dfbf875 commit 95e777d

File tree

189 files changed

+1149
-499
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

189 files changed

+1149
-499
lines changed

.clabot

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,8 @@
185185
"snyk-bot",
186186
"stephenthedev",
187187
"Apoorvkudesia-sumologic",
188-
"ntanwar-sumo"
188+
"ntanwar-sumo",
189+
"aj-sumo"
189190
],
190191
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
191192
"label": "cla-signed",

blog-service/2025-07-31-apps.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Apps, Solutions, and Collection Integrations - July Release
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- apps
6+
- july-release
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
### Enhancements
13+
14+
- **Updated OpenTelemetry apps**. [Oracle - OpenTelemetry](/docs/integrations/databases/opentelemetry/oracle-opentelemetry/), [SQL Server - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-opentelemetry/), and [SQL Server for Linux - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-linux-opentelemetry/).
15+
- **Updated 1 Webhook app**. [Sentry](/docs/integrations/webhooks/sentry/).

cid-redirects.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -476,6 +476,7 @@
476476
"/05Search/Optimize-Search-Performance": "/docs/search/optimize-search-performance",
477477
"/05Search/Optimize-Search-Performance/Optimizing_Search_with_Partitions": "/docs/search/optimize-search-partitions",
478478
"/docs/manage/queries/optimize-queries": "/docs/search/optimize-search-performance",
479+
"/docs/search/search-across-child-org": "/docs/search/search-across-child-orgs",
479480
"/05Search/Search-Cheat-Sheets": "/docs/search/search-cheat-sheets",
480481
"/05Search/Search-Cheat-Sheets/General-Search-Examples-Cheat-Sheet": "/docs/search/search-cheat-sheets/general-search-examples",
481482
"/05Search/Search-Cheat-Sheets/grep-to-Searching-with-Sumo-Cheat-Sheet": "/docs/search/search-cheat-sheets/grep-searching-with-sumo",
@@ -3802,6 +3803,7 @@
38023803
"/03Send-Data/Collect-from-Other-Data-Sources/Collect_Logs_from_AWS_Lambda_using_Lambda_Extension": "/docs/send-data/collect-from-other-data-sources/collect-aws-lambda-logs-extension",
38033804
"/03Send-Data/Collect-from-Other-Data-Sources/Collecting-Logs-from-a-Local-File-System": "/docs/send-data/installed-collectors/sources/local-file-source",
38043805
"/03Send-Data/Hosted-Collectors/GCP_Metrics_Source": "/docs/send-data/hosted-collectors/google-source/gcp-metrics-source",
3806+
"/03Send-Data/Hosted-Collectors/HTTP-Source": "/docs/send-data/hosted-collectors/http-source/logs-metrics",
38053807
"/03Send-Data/Sources/01Sources-for-Installed-Collectors": "/docs/send-data/installed-collectors/sources",
38063808
"/03Send-Data/Sources/01Sources-for-Installed-Collectors/Local_Windows_Event_Log_Source": "/docs/send-data/installed-collectors/sources/local-windows-event-log-source",
38073809
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon-Web-Services": "/docs/send-data/hosted-collectors/amazon-aws",
@@ -3887,6 +3889,7 @@
38873889
"/Apps/Preview_Apps/Cylance/01Collect_Logs_for_Cylance": "/docs/integrations/security-threat-detection/cylance",
38883890
"/Apps/Preview_Apps/Azure_Audit_App": "/docs/integrations/microsoft-azure/audit",
38893891
"/Apps/Preview_Apps/Azure_Audit+App": "/docs/integrations/microsoft-azure/audit",
3892+
"/Apps/Preview_Apps/Azure_Web_Apps": "/docs/integrations/microsoft-azure/web-apps",
38903893
"/Apps/Windows_App/Windows_App_Dashboards": "/docs/integrations/microsoft-azure",
38913894
"/Beta": "/docs/beta",
38923895
"/Beta/APIs": "/docs/api",

docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-guardduty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ To ingest AWS GuardDuty data into Cloud SIEM:
1111
1. [Configure an HTTP source for GuardDuty](/docs/integrations/amazon-aws/guardduty/#step-1-configure-an-http-source) on a collector. When you configure the source, do the following:
1212
1. Select the **Forward to SIEM** option in the source configuration UI. This will ensure all logs for this source are forwarded to Cloud SIEM.
1313
1. Click the **+Add** link to add a field whose name is `_parser` with value */Parsers/System/AWS/GuardDuty*. This ensures that the GuardDuty logs are parsed and normalized into structured records in Cloud SIEM.
14-
1. [Deploy the Sumo Logic GuardDuty events processor](/docs/integrations/amazon-aws/guardduty/#step-2-deploy-sumo-guardduty-events-processor).
14+
1. [Deploy the Sumo Logic GuardDuty events processor](/docs/integrations/amazon-aws/guardduty/#step-2-deploy-sumo-logic-guardduty-events-processor).
1515
1. To verify that your logs are successfully making it into Cloud SIEM:
1616
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
1717
1. On the **Log Mappings** tab search for "GuardDuty" and check the **Records** columns.

docs/cse/rules/cse-rules-syntax.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -645,16 +645,11 @@ When an entity is processed by a rule using the `hasThreatMatch` function and is
645645
Parameters:
646646
* **`<fields>`**. A list of comma-separated [field names](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/schema/full_schema.md). At least one field name is required.
647647
* **`<filters>`**. A logical expression using [indicator attributes](/docs/security/threat-intelligence/upload-formats/#normalized-json-format). Allowed in the filtering are parentheses `()`; `OR` and `AND` boolean operators; and comparison operators `=`, `<`, `>`, `=<`, `>=`, `!=`. <br/>You can filter on the following indicator attributes:
648-
* `actors`. An identified threat actor such as an individual, organization, or group.
649648
* `confidence` Confidence that the data represents a valid threat, where 100 is highest. Malicious confidence scores from different sources are normalized and mapped to a 0-100 numerical value.
650-
* `id`. ID of the indicator.
651649
* `indicator`. Value of the indicator, such as an IP address, file name, email address, etc.
652-
* `killChain`. The various phases an attacker may undertake to achieve their objectives (for example, `reconnaissance`, `weaponization`, `delivery`, `exploitation`, `installation`, `command-and-control`, `actions-on-objectives`).
653650
* `source`. The source in the Sumo Logic datastore displayed in the **Threat Intelligence** tab.
654-
* `threatType`. The threat type of the indicator (for example, `anomalous-activity`, `anonymization`, `benign`, `compromised`, `malicious-activity`, `attribution`, `unknown`).
651+
* `threat_type`. The threat type of the indicator (for example, `anomalous-activity`, `anonymization`, `benign`, `compromised`, `malicious-activity`, `attribution`, `unknown`).
655652
* `type`. The indicator type (for example, `ipv4-addr`, `domain-name`, `'file:hashes`, etc.)
656-
* `validFrom`. Beginning time this indicator is valid.
657-
* `validUntil`. Ending time this indicator is valid.
658653
* **`<indicators>`**. An optional case insensitive option that describes how indicators should be matched with regard to their validity. Accepted values are:
659654
* `active_indicators`. Match active indicators only (default).
660655
* `expired_indicators`. Match expired indicators only.

docs/cse/troubleshoot/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,4 +21,10 @@ This section contains articles to help you troubleshoot problems with Cloud SIEM
2121
<p>Learn how to troubleshoot problems with log mappers.</p>
2222
</div>
2323
</div>
24+
<div className="box smallbox card">
25+
<div className="container">
26+
<a href="/docs/cse/troubleshoot/troubleshoot-rules"><img src={useBaseUrl('img/icons/operations/too-many-tools.png')} alt="Troubleshoot icon" width="40"/><h4>Troubleshoot Rules</h4></a>
27+
<p>Learn how to troubleshoot problems with rules.</p>
28+
</div>
29+
</div>
2430
</div>

0 commit comments

Comments
 (0)