Skip to content

Commit a5c524d

Browse files
authored
Appflow updated for V2 apps (#4880)
* Appflow updated for V2 apps * updated additional app docs with collection process info * minor fix * minor fix * converted to reuse file * minor path fix * Update app-collection-option-2.md * Update app-collection-option-3.md
1 parent b628ee1 commit a5c524d

35 files changed

+1075
-631
lines changed

docs/integrations/saas-cloud/1password.md

Lines changed: 39 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ description: The Sumo Logic App for 1Password helps you monitor your 1Password a
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
<img src={useBaseUrl('img/integrations/1password/1password.png')} alt="Thumbnail icon" width="75"/>
10+
<img src={useBaseUrl('img/integrations/1password/1password.png')} alt="Thumbnail icon" width="55"/>
1111

1212
1Password is a secure and convenient password manager for documents, credit card information, and addresses. The Sumo Logic app for 1Password enables you to monitor sign-in and item usage events within your 1Password account. It offers insights into failed and successful authentications, breaking down events by client applications, type, category, users, and geo-location, while also identifying outliers and analyzing threats related to sign-ins. Furthermore, the app provides in-depth tracking of critical security activities such as account activations, deletions, email changes, and group creations. It visualizes audit events by geographic location, highlights risky areas, and offers detailed logs of recent access activities and role changes. This app helps secure your 1Password vault by delivering comprehensive insights into user actions and threat intelligence on clients accessing shared vaults.
1313

@@ -25,7 +25,10 @@ The 1Password app uses the following logs:
2525

2626
### Sample log messages
2727

28-
```json title="Sign-in attempt Event"
28+
<details>
29+
<summary>Sign-in attempt Event</summary>
30+
31+
```json
2932
{
3033
"uuid": "56YE2TYN2VFYRLNSHKPW5NVT5E",
3134
"session_uuid": "A5K6COGVRVEJXJW3XQZGS7VAMM",
@@ -52,8 +55,12 @@ The 1Password app uses the following logs:
5255
}
5356
}
5457
```
58+
</details>
59+
60+
<details>
61+
<summary>Item Usage Event</summary>
5562

56-
```json title="Item Usage Event"
63+
```json
5764
{
5865
"uuid": "56YE2TYN2VFYRLNSHKPW5NVT5E",
5966
"timestamp": "2020-06-11T16:32:50-03:00",
@@ -77,8 +84,12 @@ The 1Password app uses the following logs:
7784
"action": "secure-copy"
7885
}
7986
```
87+
</details>
88+
89+
<details>
90+
<summary>Audit Events Log</summary>
8091

81-
```json title="Audit Events Log"
92+
```json
8293
{
8394
"uuid": "56YE2TYN2VFYRLNSHKPW5NVT5E",
8495
"timestamp": "2023-03-15T16:33:50-03:00",
@@ -114,6 +125,7 @@ The 1Password app uses the following logs:
114125
}
115126
}
116127
```
128+
</details>
117129

118130
### Sample queries
119131

@@ -155,15 +167,33 @@ _sourceCategory="app/"
155167
| fields -_messageTime
156168
```
157169

158-
## Collecting logs for 1Password
170+
## Collection configuration and app installation
171+
172+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
173+
174+
<CollectionConfiguration/>
175+
176+
:::important
177+
Use the [Cloud-to-Cloud Integration for 1Password](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your 1Password app is properly integrated and configured to collect and analyze your 1Password data.
178+
:::
179+
180+
### Create a new collector and install the app
181+
182+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
183+
184+
<AppCollectionOPtion1/>
185+
186+
### Use an existing collector and install the app
187+
188+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
159189

160-
Follow the instructions for setting up [Cloud-to-Cloud Integration for 1Password App](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source) to create the source and use the same source category while installing the app.
190+
<AppCollectionOPtion2/>
161191

162-
## Installing the 1Password app
192+
### Use an existing source and install the app
163193

164-
import AppInstall from '../../reuse/apps/app-install-v2.md';
194+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
165195

166-
<AppInstall/>
196+
<AppCollectionOPtion3/>
167197

168198
## Viewing 1Password dashboards
169199

docs/integrations/saas-cloud/abnormal-security.md

Lines changed: 31 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,10 @@ This app uses the Abnormal Security Source to collect [threat logs](https://app.
1717

1818
### Sample log messages
1919

20-
```json title="Threat Logs"
20+
<details>
21+
<summary>Threat Logs</summary>
22+
23+
```json
2124
{
2225
"abxMessageId": -569518315069455395,
2326
"abxPortalUrl": "https://portal.abnormalsecurity.com/home/threat-center/remediation-history/-569518315069455395",
@@ -64,8 +67,12 @@ This app uses the Abnormal Security Source to collect [threat logs](https://app.
6467
]
6568
}
6669
```
70+
</details>
71+
72+
<details>
73+
<summary>Case Logs</summary>
6774

68-
```json title="Case Logs"
75+
```json
6976
{
7077
"cases": [
7178
{
@@ -79,6 +86,7 @@ This app uses the Abnormal Security Source to collect [threat logs](https://app.
7986
"total": 1
8087
}
8188
```
89+
</details>
8290

8391
### Sample queries
8492

@@ -112,17 +120,32 @@ _sourceCategory="Labs/AbnormalSecurity" sourcetype case_log
112120

113121
```
114122

115-
## Set up collection
123+
## Collection configuration and app installation
124+
125+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
126+
127+
<CollectionConfiguration/>
128+
:::important
129+
Use the [Cloud-to-Cloud Integration for Abnormal Security](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/abnormal-security-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Abnormal Security app is properly integrated and configured to collect and analyze your Abnormal Security data.
130+
:::
131+
132+
### Create a new collector and install the app
133+
134+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
135+
136+
<AppCollectionOPtion1/>
137+
138+
### Use an existing collector and install the app
116139

117-
To set up the Cloud-to-Cloud Integration Abnormal Security Source for the Abnormal Security app, follow the instructions provided [here](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/abnormal-security-source/). These instructions will guide you through the process of creating a source using the Abnormal Security Source category, which you will need to use when installing the app. By following these steps, you can ensure that your Abnormal Security app is properly integrated and configured to collect and analyze your Abnormal Security data.
140+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
118141

119-
## Installing the Abnormal Security app
142+
<AppCollectionOPtion2/>
120143

121-
This section has instructions for installing the Abnormal Security App for Sumo Logic and descriptions of each of the dashboards.
144+
### Use an existing source and install the app
122145

123-
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
146+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
124147

125-
<AppInstall2/>
148+
<AppCollectionOPtion3/>
126149

127150
## Viewing Abnormal Security dashboards​
128151

docs/integrations/saas-cloud/airtable.md

Lines changed: 34 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,24 @@
22
id: airtable
33
title: Airtable
44
sidebar_label: Airtable
5-
description: The Sumo Logic App for the Airtable App offers functionality for monitoring and analyzing your organization's Airtable audit logs.
5+
description: The Sumo Logic app for the Airtable app offers functionality for monitoring and analyzing your organization's Airtable audit logs.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

1010
<img src={useBaseUrl('img/send-data/airtable-icon.png')} alt="airtable-icon.png" width="50" />
1111

12-
The Airtable App for Sumo Logic monitors and analyzes your organization's Airtable audit logs, providing insights into user activity, data trends, and security events. This app is based on the Airtable Audit Logs, which provide detailed information on all actions performed in your Airtable account.
12+
The Airtable app for Sumo Logic monitors and analyzes your organization's Airtable audit logs, providing insights into user activity, data trends, and security events. This app is based on the Airtable Audit Logs, which provide detailed information on all actions performed in your Airtable account.
1313

14-
The Airtable App makes it simple to import data from your Airtable audit logs into Sumo Logic, where you can perform real-time analysis and build dashboards to visualize key metrics. You can monitor security events and gain insights into user activity across your organization.
14+
The Airtable app makes it simple to import data from your Airtable audit logs into Sumo Logic, where you can perform real-time analysis and build dashboards to visualize key metrics. You can monitor security events and gain insights into user activity across your organization.
1515

16-
The Airtable App allows you to:
16+
The Airtable app allows you to:
1717
* Keep track of user activity within your Airtable account in real-time.
1818
* Analyze user actions, identify failed executions, and track trends over time.
1919
* View a summary of audit logs in table format, enabling you to identify anomalous behavior and potential security threats.
2020
* Create customized dashboards to visualize important metrics and track key performance indicators.
2121

22-
The Airtable App also offers a pre-built dashboard that enables you to start monitoring your Airtable audit logs right away. The Airtable App for Sumo Logic is especially useful for organizations that must comply with regulatory requirements or maintain a high level of security. With the ability to monitor user activity and track changes in real time, you can quickly identify potential issues and respond to security incidents as they occur.
22+
The Airtable app also offers a pre-built dashboard that enables you to start monitoring your Airtable audit logs right away. The Airtable App for Sumo Logic is especially useful for organizations that must comply with regulatory requirements or maintain a high level of security. With the ability to monitor user activity and track changes in real time, you can quickly identify potential issues and respond to security incidents as they occur.
2323

2424
## Log type
2525

@@ -29,6 +29,9 @@ To understand how to access detailed records of changes made to the Airtable Ent
2929

3030
### Sample log messages
3131

32+
<details>
33+
<summary>Click to view the sample log message</summary>
34+
3235
```json
3336
{
3437
"enterpriseaccountid": "entdfgc0BXGp",
@@ -58,6 +61,7 @@ To understand how to access detailed records of changes made to the Airtable Ent
5861
}
5962
}
6063
```
64+
</details>
6165

6266
### Sample queries
6367

@@ -70,13 +74,33 @@ _sourceCategory="Labs/airtable"
7074
| count_distinct (action_id)
7175
```
7276

73-
## Installing the Airtable app
77+
## Collection configuration and app installation
78+
79+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
80+
81+
<CollectionConfiguration/>
82+
83+
:::important
84+
Use the [Cloud-to-Cloud Integration for Airtable](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/airtable-source) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Airtable app is properly integrated and configured to collect and analyze your Airtable data.
85+
:::
86+
87+
### Create a new collector and install the app
88+
89+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
90+
91+
<AppCollectionOPtion1/>
92+
93+
### Use an existing collector and install the app
94+
95+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
96+
97+
<AppCollectionOPtion2/>
7498

75-
Before you begin, collect logs from Airtable API and ingest them into Sumo Logic. Refer to the [Airtable API Cloud-to-Cloud Integration](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/airtable-source/) to create the source and use the same source category while installing the app.
99+
### Use an existing source and install the app
76100

77-
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
101+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
78102

79-
<AppInstall2/>
103+
<AppCollectionOPtion3/>
80104

81105
## Viewing Airtable dashboards​
82106

@@ -86,7 +110,7 @@ import ViewDashboards from '../../reuse/apps/view-dashboards.md';
86110

87111
### Overview
88112

89-
**Airtable - Overview** dashboard provides a high-level view of key metrics related to Airtable platform user activity, audits, and execution. It contains widgets that display data such as total audit logs and failed executions, action distribution, and top-performing actions and users. The dashboard also provides information on activity trends over time and user locations. The Audit Log Summary widget provides a quick overview of all platform activity. Overall, the dashboard helps users quickly understand how the platform is used and identify areas for improvement.<br/><img src={useBaseUrl('img/integrations/saas-cloud/airtable-overview.png')} alt="airtable-overview.png" width="600"/>
113+
The **Airtable - Overview** dashboard provides a high-level view of key metrics related to Airtable platform user activity, audits, and execution. It contains widgets that display data such as total audit logs and failed executions, action distribution, and top-performing actions and users. The dashboard also provides information on activity trends over time and user locations. The Audit Log Summary widget provides a quick overview of all platform activity. Overall, the dashboard helps users quickly understand how the platform is used and identify areas for improvement.<br/><img src={useBaseUrl('img/integrations/saas-cloud/airtable-overview.png')} alt="airtable-overview.png" width="600"/>
90114

91115
## Upgrade/Downgrade the Airtable app (Optional)
92116

docs/integrations/saas-cloud/atlassian.md

Lines changed: 30 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ This app uses Sumo Logic’s Atlassian Source to collect [Event Logs](https://de
2121

2222
### Sample log message
2323

24+
<details>
25+
<summary>Event Log</summary>
26+
2427
```json title="Event Log"
2528
{
2629
"type": "events",
@@ -70,6 +73,7 @@ This app uses Sumo Logic’s Atlassian Source to collect [Event Logs](https://de
7073
}
7174
}
7275
```
76+
</details>
7377

7478
### Sample queries
7579

@@ -86,17 +90,37 @@ _sourceCategory="Labs/Atlassian"
8690
| sort by frequency
8791
```
8892

89-
## Set up collection
93+
## Collection configuration and app installation
94+
95+
Depending on the set up collection method, you can configure and install the app in three ways:
96+
97+
- **[Create a new collector and install the app](#create-a-new-collector-and-install-the-app)**. Create a new Sumo Logic Cloud-to-Cloud (C2C) source under a new Sumo Logic Collector and later install the app; Or
98+
- **[Use an existing collector and install the app](#use-an-existing-collector-and-install-the-app)**. Create a new Sumo Logic Cloud-to-Cloud (C2C) source under an existing Sumo Logic Collector and later install the app; Or
99+
- **[Use existing source and install the app](#use-an-existing-source-and-install-the-app)**. Use your existing configured Sumo Logic Cloud-to-Cloud (C2C) source and install the app.
100+
101+
:::important
102+
Use the [Cloud-to-Cloud Integration for Atlassian](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Atlassian app is properly integrated and configured to collect and analyze your Atlassian data.
103+
:::
104+
105+
### Create a new collector and install the app
106+
107+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
108+
109+
<AppCollectionOPtion1/>
110+
111+
### Use an existing collector and install the app
112+
113+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
90114

91-
To set up [Cloud-to-Cloud Integration Atlassian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source) for the Atlassian app, follow the instructions provided. These instructions will guide you through the process of creating a source using the Atlassian Source category, which you will need to use when installing the app. By following these steps, you can ensure that your Atlassian app is properly integrated and configured to collect and analyze your Atlassian data.
115+
<AppCollectionOPtion2/>
92116

93-
## Installing the Atlassian app
117+
### Use an existing source and install the app
94118

95-
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
119+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
96120

97-
<AppInstall2/>
121+
<AppCollectionOPtion3/>
98122

99-
## Viewing Atlassian dashboards
123+
## Viewing the Atlassian dashboards
100124

101125
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
102126

0 commit comments

Comments
 (0)