Skip to content

Commit a078f18

Browse files
committed
Remove network sensor articles
1 parent cffbe82 commit a078f18

14 files changed

+90
-1239
lines changed

blog-cse/2024/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ Changes are enumerated below.
209209

210210
#### Cloud SIEM network sensor end-of-life
211211

212-
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/sensors/ingest-zeek-logs/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
212+
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
213213

214214
Learn more [here](/docs/cse/sensors/network-sensor-end-of-life/).
215215

blog-cse/2025-04-30-application.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
### April 30, 2025 - Application Update
2+
3+
#### Cloud SIEM network sensor end-of-life
4+
5+
As [previously announced](/release-notes-cse/2024/12/31/#november-8-2024---application-update), the Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. Support for the feature ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
6+
7+
Learn more [here](/docs/cse/sensors/network-sensor-end-of-life/).

docs/cse/index.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,6 @@ This section contains the following topics:
4949
<p>Learn about Cloud SIEM Schema v3, schema attributes, and the Record processing pipeline.</p>
5050
</div>
5151
</div>
52-
<div className="box smallbox card">
53-
<div className="container">
54-
<a href="/docs/cse/sensors"><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="Shield on a cloud icon" width="40"/><h4>Sensors</h4></a>
55-
<p>Cloud SIEM Sensors collect log and event data from your infrastructure and applications.</p>
56-
</div>
57-
</div>
5852
<div className="box smallbox card">
5953
<div className="container">
6054
<a href="/docs/cse/integrations"><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="Shield on a cloud icon" width="40"/><h4>Integrations</h4></a>

docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md

Lines changed: 80 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,10 @@ This section has instructions for collecting Corelight Zeek log messages and sen
1111

1212
These instructions are for Corelight Zeek logs sent as JSON over syslog.
1313

14+
:::note
15+
The Sumo Logic Product Team has continued our on-premise network sensor feature for Sumo Logic Cloud SIEM (see [release note](/release-notes-cse#cloud-siem-network-sensor-end-of-life)). This article describes how to use Zeek as a network sensor to provide equivalent monitoring of your network.
16+
:::
17+
1418
## Step 1: Configure collection
1519

1620
In this step, you configure a Syslog Source to collect Corelight Zeek log messages. You can configure the source on an existing Installed Collector or create a new collector. If you’re going to use an existing collector, jump to [Configure a Syslog Source](#configure-a-syslog-source) below. Otherwise, create a new collector as described in [Configure an Installed Collector](#configure-an-installed-collector) below, and then create the Syslog Source on the collector.
@@ -53,22 +57,88 @@ In this step, you configure a Syslog Source to collect Corelight Zeek log messag
5357

5458
In this step you configure Zeek to send log messages to the Sumo Logic platform. For instructions, see [Corelight JSON Streaming documentation](https://github.com/corelight/json-streaming-logs).
5559

56-
## Step 3: Cloud SIEM Ingest Configuration
60+
## Step 3: Enable parsing and mapping of Zeek logs
61+
62+
After configuring the appropriate source, use one of the methods described below to provide information Cloud SIEM requires to parse and map Zeek logs.
63+
64+
This configuration step is required to ensure that Cloud SIEM knows how to parse incoming Zeek logs, correctly map the log fields to schema attributes, and create Cloud SIEM records. The most important bit of information is what type of data a particular log contains. Zeek has a variety of log types, for example `conn` for TCP/UDP/ICMP connections, `http` for HTTP requests and replies, and `ftp` for FTP activity.
65+
66+
So, how to determine whether a Zeek log is a `conn`, `http`, `ftp`, or some other log type? Zeek logs don’t contain a key that explicitly holds a value that is only the log type identifier. There are two options for dealing with this:
67+
68+
* Use Corelight to add a field to each Zeek log that identifies its log type. See [Use Corelight](#use-corelight) below.
69+
* Use Sumo Logic Field Extraction Rules (FERs) to create fields that provide the log type and other data that enables Cloud SIEM to parse and map the logs. See [Use FERs](#use-fers).
70+
71+
### Use Corelight
72+
73+
With this method, you use Corelight’s [json-streaming-logs](https://github.com/corelight/json-streaming-logs), a Bro script package that creates JSON formatted logs, and adds an extension field, named _path that identifies the Zeek log type to each Zeek log. Then, you map that field to **Event ID** in a Sumo Logic ingest mapping.
74+
75+
After installing the `json-streaming-logs` package, follow these instructions to set up the Sumo Logic mapping.
76+
77+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Sumo Logic**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**.
78+
1. On the **Ingest Mappings** tab, click **+ Add Ingest Mapping**.<br/><img src={useBaseUrl('img/cse/ingest-mappings.png')} alt="Ingest mappings" style={{border: '1px solid gray'}} width="800"/>
79+
1. On the **Add Ingest Mapping** tab:
80+
1. **Source Category**. Enter the Source Category value you assigned to the Source you configured above.
81+
1. **Format**. Choose **Bro/Zeek JSON**.
82+
1. **Event ID**. Enter `{_path}`.
83+
1. **Enabled**. Use the slider to enable the mapping if you’re ready to receive Zeek logs.
84+
1. Click **Save**.<br/><img src={useBaseUrl('img/cse/create-mapping.png')} alt="Create mapping" style={{border: '1px solid gray'}} width="400"/>
85+
86+
### Use FERs
87+
88+
With this method, you use Sumo Logic Field Extraction Rules (FERs) to extract fields from each Zeek log. The fields you extract will provide the information necessary for Cloud SIEM to correctly parse and map the logs. 
89+
90+
Here’s an example Bro log from the Security Onion platform. 
91+
92+
```
93+
{"TAGS":".source.s_bro_conn","SOURCEIP":"127.0.0.1","PROGRAM":"bro_conn","PRIORITY":"notice","MESSAGE":"{\"ts\":\"2020-05-28T10:32:51.997054Z\",\"uid\":\"Cu3KVA2TbWqZm1Z0S6\",\"id.orig_h\":\"1.2.3.4\",\"id.orig_p\":16030,\"id.resp_h\":\"5.6.7.8\",\"id.resp_p\":161,\"proto\":\"udp\",\"duration\":30.000317811965942,\"orig_bytes\":258,\"resp_bytes\":0,\"conn_state\":\"S0\",\"local_orig\":true,\"local_resp\":true,\"missed_bytes\":0,\"history\":\"D\",\"orig_pkts\":6,\"orig_ip_bytes\":426,\"resp_pkts\":0,\"resp_ip_bytes\":0,\"sensorname\":\"test\"}","ISODATE":"2020-05-28T10:34:24+00:00","HOST_FROM":"somehost","HOST":"somehost","FILE_NAME":"/nsm/bro/logs/current/conn.log","FACILITY":"user"}
94+
```
95+
96+
In the log above, the content of the Bro log is the value of the `MESSAGE` key. Note that no key in the log explicitly states the log type, which is `conn`
97+
98+
To enable Cloud SIEM to successfully process the log, we need to create the following fields listed in the table below.
99+
100+
<table>
101+
<tr>
102+
<td><strong>Field</strong></td>
103+
<td><strong>Parse Expression</strong> </td>
104+
</tr>
105+
<tr>
106+
<td><code>_siemMessage</code> </td>
107+
<td><code>json field=_raw "MESSAGE" as _siemMessage</code> </td>
108+
</tr>
109+
<tr>
110+
<td><code>_siemEventId</code></td>
111+
<td><code>json field=_raw "PROGRAM" as _siemEventId | parse regex field=_siemEventId "bro_(?&lt;_siemEventId>.*)"</code> </td>
112+
</tr>
113+
<tr>
114+
<td><code>_siemFormat</code></td>
115+
<td><code>"bro" as _siemFormat</code></td>
116+
</tr>
117+
<tr>
118+
<td><code>_siemVendor</code></td>
119+
<td><code>"bro" as _siemVendor</code></td>
120+
</tr>
121+
<tr>
122+
<td><code>_siemProduct</code></td>
123+
<td><code>"bro" as _siemProduct</code></td>
124+
</tr>
125+
</table>
57126

58-
In this step, you configure a Sumo Logic Ingest Mapping in Cloud SIEM for the source category assigned to your source or collector you configured in [Step 1](#step-1-configure-collection). The mapping tells Cloud SIEM the information it needs to select the right mapper to process messages that have been tagged with that source category. 
127+
Perform these steps for each of the FERs.
59128

60-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then and under **Integrations** select **Sumo Logic**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**.
61-
1. On the **Ingest Mappings** tab, click **+ Add Ingest Mapping**.
62-
1. On the **Add Ingest Mapping** popup:
63-
1. **Source Category**. Enter the category you assigned to the HTTP Source or Hosted Collector in [Step 1](#step-1-configure-collection)
64-
1. **Format**. Enter *Bro/Zeek JSON*.  
65-
1. **Event ID**. *`{_path}`*.<br/><img src={useBaseUrl('img/cse/corelight-edit-mapping.png')} alt="Corelight edit mappings" style={{border: '1px solid gray'}} width="400"/>
66-
1. Click **Create** to save the mapping.
129+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Field Extraction Rules**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Field Extraction Rules**. You can also click the **Go To...** menu at the top of the screen and select **Field Extraction Rules**.
130+
1. Click **Add Rule**.
131+
1. In the **Add Field Extraction Rule** pane:
132+
1. **Rule Name**. Enter a meaningful name for the rule.
133+
1. **Applied At**. Click Ingest Time. 
134+
1. **Scope**. Click **Specific Data**.
135+
1. **Parse Expression**. Enter the parse expression shown in the table above for the field the rule will extract.
136+
1. Click **Save**.<br/><img src={useBaseUrl('img/cse/example-fer.png')} alt="Example FER" style={{border: '1px solid gray'}} width="400"/>
67137

68138
## Step 4: Verify Ingestion
69139

70140
In this step, you verify that your logs are successfully making it into Cloud SIEM. 
71141

72142
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
73143
1. On the **Log Mappings** tab search for "Zeek" and check the **Records** columns. <br/><img src={useBaseUrl('img/cse/corelight-record-volume.png')} alt="Corelight record volume" style={{border: '1px solid gray'}} width="800"/>
74-
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Corelight Zeek security records.<br/><img src={useBaseUrl('img/cse/corelight-search.png')} alt="Corelight search" style={{border: '1px solid gray'}} width="400"/>
144+
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Corelight Zeek security records.<br/><img src={useBaseUrl('img/cse/corelight-search.png')} alt="Corelight search" style={{border: '1px solid gray'}} width="400"/>

docs/cse/rules/import-yara-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1313

1414
This section has instructions for importing YARA rules from GitHub into Cloud SIEM.
1515

16-
YARA rules are an open source framework for identifying malware. Cloud SIEM runs YARA rules against files uploaded by the [network sensor](/docs/cse/sensors/network-sensor-deployment-guide). When a file matches a YARA rule, Cloud SIEM creates a special record which results in a “file analysis” signal being created.  Once you’ve imported rules, Cloud SIEM will sync with the repository no less than every hour.
16+
YARA rules are an open source framework for identifying malware. Cloud SIEM runs YARA rules against files uploaded by the [network sensor](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek/). When a file matches a YARA rule, Cloud SIEM creates a special record which results in a “file analysis” signal being created.  Once you’ve imported rules, Cloud SIEM will sync with the repository no less than every hour.
1717

1818
To import YARA rules:
1919

docs/cse/sensors/index.md

Lines changed: 0 additions & 45 deletions
This file was deleted.

0 commit comments

Comments
 (0)