Skip to content

Commit 97e107c

Browse files
authored
Merge branch 'main' into app_central_axana
2 parents 3f2d78a + 2086983 commit 97e107c

File tree

12 files changed

+119
-11
lines changed

12 files changed

+119
-11
lines changed

blog-service/2024/12-31.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -425,10 +425,6 @@ We're excited to announce that when you create a role, you can select **Index Ac
425425

426426
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
427427

428-
:::note
429-
These changes are rolling out across deployments incrementally and will be available on all deployments by March 14, 2025.
430-
:::
431-
432428
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role).
433429

434430
### October 14, 2024 (Collection)

docs/alerts/scheduled-searches/generate-cse-signals.md

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ For a more detailed description of the options you can configure for a scheduled
1515

1616
## Requirements for the search query
1717

18+
When you [create a scheduled search](/docs/alerts/scheduled-searches/schedule-search/) to generate signals in Cloud SIEM, you start by creating a search query.
19+
1820
This section describes the requirements for your scheduled search, which include a minimum set of fields to be returned, and renaming message fields as necessary to match attribute names in the selected Cloud SIEM record type schema.  
1921

2022
### Required fields
@@ -42,7 +44,6 @@ enable signal generation:
4244
If the `stage` field contains a Tactic that isn't in the MITRE ATT&CK framework, a signal will not be generated, but a record will be. 
4345
:::
4446
* At least one entity field:
45-
4647
* `device_ip`
4748
* `device_mac`
4849
* `device_natIp`
@@ -56,16 +57,35 @@ enable signal generation:
5657
* `srcDevice_ip`
5758
* `srcDevice_mac`
5859
* `srcDevice_natIp`
59-
* `user_username`  
60+
* `user_username`
6061

6162
### Renaming message fields
6263

6364
When you configure a Scheduled Search to create Cloud SIEM signals, you are prompted to select a [Cloud SIEM record type](/docs/cse/schema/cse-record-types/). The fields returned by your search must match an attribute in the record type you select. A field whose name does not match a Cloud SIEM attribute will not be populated in the record created from the Schedule Search results. For more about Cloud SIEM attribute names, see [Attributes You Can Map to Records](/docs/cse/schema/attributes-map-to-records/).
6465

66+
### Example
67+
68+
Let's suppose that `user_username` is the entity field we want to use, and its value needs to be mapped to `actor.email`. Then you need to add the following line to the query: `actor.email as user_username`.
69+
70+
And because the final output of this query is an aggregate, and Cloud SIEM signals expect `normalizedfield`, `stage`, and `entity`, we need need to add those in the `count` expression.
71+
72+
This is how the final query might look:
73+
74+
```txt
75+
((_index=sec_record_* objectType=*)
76+
AND _sourcename = "Google Apps Audit Event")
77+
AND _sourcecategory = "GoogleWorkspace/Groups"
78+
| 5 as normalizedseverity
79+
| "Initial Access" as stage
80+
| json auto
81+
| actor.email as user_username
82+
| count by events.name, events.type, actor.email, event.parameters.user_email, event.parameters.group_email, user_username, stage, normalizedseverity
83+
```
84+
6585
## Scheduling the search
6686

6787
1. After creating and saving your search, click the save icon.<br/><img src={useBaseUrl('img/alerts/save-as.png')} alt="Save the search" style={{border: '1px solid gray'}} width="800"/>
68-
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" width="500"/>
88+
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" style={{border: '1px solid gray'}} width="500"/>
6989
:::note
7090
The name of your scheduled search will appear as the signal name in Cloud SIEM.
7191
:::

docs/platform-services/automation-service/app-central/integrations/atlassian-jira-cloud.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ Updated: March 20 , 2025***
1212

1313
Jira is a proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management.
1414

15+
:::note
16+
This integration uses the [Jira REST API v3](https://developer.atlassian.com/cloud/jira/platform/rest/v3/intro/#version).
17+
:::
18+
1519
## Actions
1620

1721
* **Add Comment to Issue** *(Notification)* - Add a comment to the specified issue.
@@ -73,4 +77,4 @@ Ticketing System
7377

7478
## Change Log
7579

76-
* March 20, 2025 - First upload
80+
* March 20, 2025 - First upload

docs/platform-services/automation-service/app-central/integrations/atlassian-jira-v2.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ Updated: September 2 , 2024***
1212

1313
Jira is a proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management.
1414

15+
:::note
16+
This integration uses the [Jira REST API v2](https://developer.atlassian.com/cloud/jira/platform/rest/v2/intro/#version).
17+
:::
18+
1519
## Actions
1620

1721
* **Add Comment to Issue** *(Notification)* - Add a comment to the specified issue.
@@ -99,4 +103,4 @@ Ticketing System
99103
* May 13, 2024 (v2.7) - A new JSON Custom field has been added to update the issue status Action
100104
* May 23, 2024 (v2.8) - Updated the Add Issue Attachments To Incident action
101105
* June 20, 2024 (v2.9) - New action: Download Attachment
102-
* September 2, 2024 (v2.10) - Updated the Update Issue action
106+
* September 2, 2024 (v2.10) - Updated the Update Issue action

docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
77

88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/crowdstrike-falcon.png')} alt="crowdstrike-falcon" width="100"/>
99

10-
***Version: 1.13
11-
Updated: Feb 21, 2025***
10+
***Version: 1.14
11+
Updated: April 23, 2025***
1212

1313
The CrowdStrike Falcon integration allows you to pull and update Detections/Incidents, and search Incidents/Devices/Detections.
1414

@@ -72,3 +72,5 @@ import IntegrationsAuth from '../../../../reuse/integrations-authentication.md';
7272
+ Alerts CrowdStrike Falcon Daemon
7373
* February 21, 2025 (v1.13) - Added new action
7474
+ Get IDP Device Info
75+
* April 23, 2025 (v1.14) - Updated the Integration
76+
+ Refactored the code to improve performance and maintainability.
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
id: intelliparse
3+
title: Intelliparse Mode (Beta)
4+
description: Intelliparse mode extends automatic parsing to unstructured logs, allowing you to search and filter logs even when they don’t follow a consistent format like JSON.
5+
---
6+
7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
9+
<head>
10+
<meta name="robots" content="noindex" />
11+
</head>
12+
13+
<p><a href="/docs/beta"><span className="beta">Beta</span></a></p>
14+
15+
This feature is currently available to select customers. Contact your Sumo Logic account representative to request access.
16+
17+
We've introduced a new parsing mode in the Log Search UI: Intelliparse mode. It extends automatic parsing to unstructured logs, allowing you to search and filter logs even when they don’t follow a consistent format like JSON.
18+
19+
<!-- link to Copilot unstructured logs doc -->
20+
21+
## Available parsing modes
22+
23+
You can now choose from three parsing options in the log search UI:
24+
25+
* **Intelliparse (new)**. Combines JSON parsing with automatic parsing of unstructured logs using pre-discovered parsers.
26+
* [**Auto Parse**](/docs/search/get-started-with-search/build-search/dynamic-parsing). JSON blocks within logs are automatically parsed.
27+
* **Manual**. No automatic parsing applied.
28+
29+
<img src={useBaseUrl('img/search/get-started-search/build-search/log-search-parsing-modes.png')} alt="log-search-parsing-modes.png" style={{border: '1px solid gray'}} width="700"/>
30+
31+
## How Intelliparse mode works
32+
33+
When you enable Intelliparse mode:
34+
* Logs are parsed using a set of parsers discovered from your recently used dashboards.
35+
* Fields are extracted automatically from both structured and unstructured logs.
36+
* A hidden operator is applied to your query to power this functionality behind the scenes.
37+
38+
## Benefits
39+
40+
* **No Field Extraction Rules (FERs) required**. Get field-level insights without manual parsing.
41+
* **Works with your existing dashboards**. Parsers are derived from log panels in recently viewed or edited dashboards.
42+
* **Improved field visibility**. Fields parsed through Intelliparse mode appear in the Messages tab and can be used in queries, filters, and dashboards.
43+
44+
## Example
45+
46+
If your dashboard includes a query like:
47+
48+
```sql
49+
_sourceCategory=cassandra "Dropped table"
50+
| parse "table '*' from database '*'" as db.table, db.name
51+
```
52+
53+
Then any matching unstructured logs like:
54+
55+
`2025-04-09 11:20:25 * Dropped table 'logins' from database 'auth'`
56+
57+
will be parsed automatically in Intelliparse mode, extracting:
58+
59+
* `db.table = "logins"`
60+
* `db.name = "auth"`
61+
62+
:::info
63+
* Parsers are discovered automatically from dashboard content. No manual setup needed.
64+
* If a dashboard is modified, the associated parser will update. Deleted dashboards do not currently delete parsers.
65+
* Queries using Intelliparse mode include a hidden intelliparse operator, injected automatically.
66+
:::
67+
68+
## How Copilot uses Intelliparse mode
69+
70+
Even if you don’t manually enable Intelliparse mode, you may encounter it when using [Sumo Logic Copilot](/docs/search/copilot).
71+
72+
Copilot uses Intelliparse mode in the background to:
73+
* Automatically parse unstructured logs for natural language queries.
74+
* Discover field names and values for more accurate suggestions and translations.
75+
* Generate search queries that include the hidden `intelliparse` operator.
76+
77+
This integration allows Copilot to work with raw, unstructured log data; no setup required on your part.
78+
79+
<!-- When Copilot - Unstructured Logs (Beta) doc has been published, crosslink from there...
80+
Want to learn more about Intelliparse mode? See how it works in Log Search
81+
https://sumologic.atlassian.net/browse/DOCS-752
82+
--->
49.8 KB
Loading

static/img/alerts/options.png

62.7 KB
Loading
18.5 KB
Loading

static/img/alerts/save-as.png

88.2 KB
Loading

0 commit comments

Comments
 (0)