You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: blog-cse/2024/12-31.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -209,7 +209,7 @@ Changes are enumerated below.
209
209
210
210
#### Cloud SIEM network sensor end-of-life
211
211
212
-
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/sensors/ingest-zeek-logs/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
212
+
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
213
213
214
214
Learn more [here](/docs/cse/sensors/network-sensor-end-of-life/).
As [previously announced](/release-notes-cse/2024/12/31/#november-8-2024---application-update), the Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. Support for the feature ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
6
+
7
+
Learn more [here](/docs/cse/sensors/network-sensor-end-of-life/).
Copy file name to clipboardExpand all lines: docs/cse/index.md
-6Lines changed: 0 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,12 +49,6 @@ This section contains the following topics:
49
49
<p>Learn about Cloud SIEM Schema v3, schema attributes, and the Record processing pipeline.</p>
50
50
</div>
51
51
</div>
52
-
<divclassName="box smallbox card">
53
-
<divclassName="container">
54
-
<ahref="/docs/cse/sensors"><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="Shield on a cloud icon" width="40"/><h4>Sensors</h4></a>
55
-
<p>Cloud SIEM Sensors collect log and event data from your infrastructure and applications.</p>
56
-
</div>
57
-
</div>
58
52
<divclassName="box smallbox card">
59
53
<divclassName="container">
60
54
<ahref="/docs/cse/integrations"><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="Shield on a cloud icon" width="40"/><h4>Integrations</h4></a>
Copy file name to clipboardExpand all lines: docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md
+80-10Lines changed: 80 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,10 @@ This section has instructions for collecting Corelight Zeek log messages and sen
11
11
12
12
These instructions are for Corelight Zeek logs sent as JSON over syslog.
13
13
14
+
:::note
15
+
The Sumo Logic Product Team has continued our on-premise network sensor feature for Sumo Logic Cloud SIEM (see [release note](/release-notes-cse#cloud-siem-network-sensor-end-of-life)). This article describes how to use Zeek as a network sensor to provide equivalent monitoring of your network.
16
+
:::
17
+
14
18
## Step 1: Configure collection
15
19
16
20
In this step, you configure a Syslog Source to collect Corelight Zeek log messages. You can configure the source on an existing Installed Collector or create a new collector. If you’re going to use an existing collector, jump to [Configure a Syslog Source](#configure-a-syslog-source) below. Otherwise, create a new collector as described in [Configure an Installed Collector](#configure-an-installed-collector) below, and then create the Syslog Source on the collector.
@@ -53,22 +57,88 @@ In this step, you configure a Syslog Source to collect Corelight Zeek log messag
53
57
54
58
In this step you configure Zeek to send log messages to the Sumo Logic platform. For instructions, see [Corelight JSON Streaming documentation](https://github.com/corelight/json-streaming-logs).
55
59
56
-
## Step 3: Cloud SIEM Ingest Configuration
60
+
## Step 3: Enable parsing and mapping of Zeek logs
61
+
62
+
After configuring the appropriate source, use one of the methods described below to provide information Cloud SIEM requires to parse and map Zeek logs.
63
+
64
+
This configuration step is required to ensure that Cloud SIEM knows how to parse incoming Zeek logs, correctly map the log fields to schema attributes, and create Cloud SIEM records. The most important bit of information is what type of data a particular log contains. Zeek has a variety of log types, for example `conn` for TCP/UDP/ICMP connections, `http` for HTTP requests and replies, and `ftp` for FTP activity.
65
+
66
+
So, how to determine whether a Zeek log is a `conn`, `http`, `ftp`, or some other log type? Zeek logs don’t contain a key that explicitly holds a value that is only the log type identifier. There are two options for dealing with this:
67
+
68
+
* Use Corelight to add a field to each Zeek log that identifies its log type. See [Use Corelight](#use-corelight) below.
69
+
* Use Sumo Logic Field Extraction Rules (FERs) to create fields that provide the log type and other data that enables Cloud SIEM to parse and map the logs. See [Use FERs](#use-fers).
70
+
71
+
### Use Corelight
72
+
73
+
With this method, you use Corelight’s [json-streaming-logs](https://github.com/corelight/json-streaming-logs), a Bro script package that creates JSON formatted logs, and adds an extension field, named _path that identifies the Zeek log type to each Zeek log. Then, you map that field to **Event ID** in a Sumo Logic ingest mapping.
74
+
75
+
After installing the `json-streaming-logs` package, follow these instructions to set up the Sumo Logic mapping.
76
+
77
+
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Sumo Logic**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**.
78
+
1. On the **Ingest Mappings** tab, click **+ Add Ingest Mapping**.<br/><img src={useBaseUrl('img/cse/ingest-mappings.png')} alt="Ingest mappings" style={{border: '1px solid gray'}} width="800"/>
79
+
1. On the **Add Ingest Mapping** tab:
80
+
1.**Source Category**. Enter the Source Category value you assigned to the Source you configured above.
81
+
1.**Format**. Choose **Bro/Zeek JSON**.
82
+
1.**Event ID**. Enter `{_path}`.
83
+
1.**Enabled**. Use the slider to enable the mapping if you’re ready to receive Zeek logs.
With this method, you use Sumo Logic Field Extraction Rules (FERs) to extract fields from each Zeek log. The fields you extract will provide the information necessary for Cloud SIEM to correctly parse and map the logs.
89
+
90
+
Here’s an example Bro log from the Security Onion platform.
In the log above, the content of the Bro log is the value of the `MESSAGE` key. Note that no key in the log explicitly states the log type, which is `conn`.
97
+
98
+
To enable Cloud SIEM to successfully process the log, we need to create the following fields listed in the table below.
99
+
100
+
<table>
101
+
<tr>
102
+
<td><strong>Field</strong></td>
103
+
<td><strong>Parse Expression</strong> </td>
104
+
</tr>
105
+
<tr>
106
+
<td><code>_siemMessage</code> </td>
107
+
<td><code>json field=_raw "MESSAGE" as _siemMessage</code> </td>
In this step, you configure a Sumo Logic Ingest Mapping in Cloud SIEM for the source category assigned to your source or collector you configured in [Step 1](#step-1-configure-collection). The mapping tells Cloud SIEM the information it needs to select the right mapper to process messages that have been tagged with that source category.
127
+
Perform these steps for each of the FERs.
59
128
60
-
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then and under **Integrations** select **Sumo Logic**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**.
61
-
1. On the **Ingest Mappings** tab, click **+ Add Ingest Mapping**.
62
-
1. On the **Add Ingest Mapping** popup:
63
-
1.**Source Category**. Enter the category you assigned to the HTTP Source or Hosted Collector in [Step 1](#step-1-configure-collection).
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Field Extraction Rules**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Field Extraction Rules**. You can also click the **Go To...** menu at the top of the screen and select **Field Extraction Rules**.
130
+
1. Click **Add Rule**.
131
+
1. In the **Add Field Extraction Rule** pane:
132
+
1.**Rule Name**. Enter a meaningful name for the rule.
133
+
1.**Applied At**. Click Ingest Time.
134
+
1.**Scope**. Click **Specific Data**.
135
+
1.**Parse Expression**. Enter the parse expression shown in the table above for the field the rule will extract.
In this step, you verify that your logs are successfully making it into Cloud SIEM.
71
141
72
142
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
73
143
1. On the **Log Mappings** tab search for "Zeek" and check the **Records** columns. <br/><img src={useBaseUrl('img/cse/corelight-record-volume.png')} alt="Corelight record volume" style={{border: '1px solid gray'}} width="800"/>
74
-
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Corelight Zeek security records.<br/><img src={useBaseUrl('img/cse/corelight-search.png')} alt="Corelight search" style={{border: '1px solid gray'}} width="400"/>
144
+
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Corelight Zeek security records.<br/><img src={useBaseUrl('img/cse/corelight-search.png')} alt="Corelight search" style={{border: '1px solid gray'}} width="400"/>
Copy file name to clipboardExpand all lines: docs/cse/rules/import-yara-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
13
13
14
14
This section has instructions for importing YARA rules from GitHub into Cloud SIEM.
15
15
16
-
YARA rules are an open source framework for identifying malware. Cloud SIEM runs YARA rules against files uploaded by the [network sensor](/docs/cse/sensors/network-sensor-deployment-guide). When a file matches a YARA rule, Cloud SIEM creates a special record which results in a “file analysis” signal being created. Once you’ve imported rules, Cloud SIEM will sync with the repository no less than every hour.
16
+
YARA rules are an open source framework for identifying malware. Cloud SIEM runs YARA rules against files uploaded by the [network sensor](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek/). When a file matches a YARA rule, Cloud SIEM creates a special record which results in a “file analysis” signal being created. Once you’ve imported rules, Cloud SIEM will sync with the repository no less than every hour.
0 commit comments