Skip to content

Commit b280984

Browse files
authored
Merge branch 'main' into docs-888-more-improvements-to-automation-integrations
2 parents 59aaf79 + e745718 commit b280984

File tree

113 files changed

+3120
-2950
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+3120
-2950
lines changed

blog-service/2025-05-29-manage.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Access Key Rotation (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- manage
6+
- organizations
7+
- mssps
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
We're happy to introduce a new way to rotate access keys, as well as a new access keys expiration policy. Together these help to make your account more secure by encouraging regular API key updates.
14+
15+
[Learn more](/docs/manage/security/access-keys/#access-keys-expiration-policy).

cid-redirects.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -440,7 +440,6 @@
440440
"/05Search/Get-Started-with-Search/Visualizations/Group-By-Operator": "/docs/search/search-query-language/search-operators",
441441
"/05Search/Live-Tail": "/docs/search/live-tail",
442442
"/05Search/Live-Tail/About-Live-Tail": "/docs/search/live-tail/about-live-tail",
443-
"/Search": "/docs/search",
444443
"/Search/Anomaly_Detection": "/docs/alerts/monitors/create-monitor",
445444
"/Search/Live-Tail": "/docs/search/live-tail/about-live-tail",
446445
"/Search/Live-Tail/About-Live-Tail": "/docs/search/live-tail/about-live-tail",
@@ -3116,6 +3115,8 @@
31163115
"/Manage/Collection/Processing-Rules/Metrics_Include_and_Exclude_Rules": "/docs/send-data/collection/processing-rules/metrics-include-and-exclude-rules",
31173116
"/Manage/Collection/Restart_Collectors": "/docs/send-data/collection/restart-collectors",
31183117
"/Manage/Collectors_and_Sources/Processing_Rules": "/docs/send-data/collection/processing-rules",
3118+
"/Manage/Collectors_and_Sources/Manage_Collectors/Edit_a_Collector": "/docs/send-data/collection/edit-collector",
3119+
"/Manage/Collectors_and_Sources/Manage_Sources": "/docs/send-data/collection",
31193120
"/Manage/Connections-and-Integrations": "/docs/alerts/webhook-connections",
31203121
"/docs/manage/connections-integrations/webhook-connections": "/docs/alerts/webhook-connections",
31213122
"/docs/manage/connections-integrations/webhook-connections/set-up-webhook-connections": "/docs/alerts/webhook-connections/set-up-webhook-connections",
@@ -3309,6 +3310,7 @@
33093310
"/Manage/Security/Access_Keys": "/docs/manage/security/access-keys",
33103311
"/Manage/Security/Access_Keys/Create_Access_Keys": "/docs/manage/security/access-keys",
33113312
"/Manage/Security/Audit_Event_Index": "/docs/manage/security/audit-indexes/audit-event-index",
3313+
"/docs/audit/audit-events": "/docs/manage/security/audit-indexes",
33123314
"/Manage/Security/Audit-Index": "/docs/manage/security/audit-indexes/audit-index",
33133315
"/Manage/Security/Create-an-Allowlist-for-IP-or-CIDR-Addresses": "/docs/manage/security/create-allowlist-ip-cidr-addresses",
33143316
"/Manage/Security/Create-a-Whitelist-for-IP-or-CIDR-Addresses": "/docs/manage/security/create-allowlist-ip-cidr-addresses",
@@ -3582,6 +3584,7 @@
35823584
"/Send_Data/Sources/Script_Source/Cron_Examples_and_Reference": "/docs/send-data/installed-collectors/sources/script-source/cron-examples-reference",
35833585
"/Send_Data/Sources/Source_timestamp_and_time_zone_options/Timestamp_conventions": "/docs/send-data/reference-information/time-reference",
35843586
"/Send_Data/Sources/AWS_S3_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
3587+
"/Send_Data/Sources/Amazon_S3_Audit_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
35853588
"/Send_Data/01_Design_Your_Deployment/Best_Practices:_Good_Source_Category,_Bad_Source_Category": "/docs/send-data/best-practices",
35863589
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon_Web_Services": "/docs/send-data/hosted-collectors/amazon-aws",
35873590
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon_Web_Services/AWS_S3_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
@@ -3874,6 +3877,7 @@
38743877
"/Beta/Installation_Tokens": "/docs/manage/security/installation-tokens",
38753878
"/Beta/Metadata_Ingest_Budgets": "/docs/manage/ingestion-volume/ingest-budgets/daily-volume",
38763879
"/Beta/Metrics-Rules": "/docs/metrics/metric-rules-editor",
3880+
"/Beta/Monitors": "/docs/alerts/monitors",
38773881
"/Beta/Saved_beta_content/Beta---Library/Apps_in_Sumo_Logic/01_Sumo_Logic_Apps": "/docs/integrations",
38783882
"/Beta/SLO_Reliability_Management": "/docs/observability/reliability-management-slo",
38793883
"/Beta/SLO_Reliability_Management/Access_and_Create_SLOs": "/docs/observability/reliability-management-slo",
@@ -3888,6 +3892,7 @@
38883892
"/Dashboards_and_Alerts/Alerts/Create_a_Real_Time_Alert": "/docs/alerts/scheduled-searches/create-real-time-alert",
38893893
"/Dashboards_and_Alerts/Alerts/Save_to_Index": "/docs/alerts/scheduled-searches/save-to-index",
38903894
"/Dashboards-and-Alerts/Alerts": "/docs/alerts",
3895+
"/Dashboards-and-Alerts/Alerts/01-Scheduled-Searches": "/docs/alerts/scheduled-searches",
38913896
"/Dashboards-and-Alerts/Alerts/02-Schedule-a-Search": "/docs/alerts/scheduled-searches/schedule-search",
38923897
"/Dashboards-and-Alerts/Alerts/Create-an-Email-Alert": "/docs/alerts/scheduled-searches/create-email-alert",
38933898
"/Dashboards-and-Alerts/Alerts/04-Create-an-Email-Alert": "/docs/alerts/scheduled-searches/create-email-alert",

docs/api/getting-started.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Sumo Logic has several deployments that are assigned depending on the geographic
8787

8888
Sumo Logic redirects your browser to the correct login URL and also redirects Collectors to the correct endpoint. However, if you're using an API you'll need to manually direct your API client to the correct Sumo Logic API URL.
8989

90-
<table><small>
90+
<table>
9191
<tr>
9292
<td>Deployment</td>
9393
<td>Service Endpoint (login URL)</td>
@@ -183,7 +183,6 @@ https://endpoint9.collection.us2.sumologic.com/</td>
183183
<td>syslog.collection.us2.sumologic.com</td>
184184
<td>https://open-collectors.us2.sumologic.com</td>
185185
</tr>
186-
</small>
187186
</table>
188187

189188
### Which endpoint should I should use?

docs/cse/get-started-with-cloud-siem/intro-for-administrators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ As a Cloud SIEM admin, you'll use both the Sumo Logic UI and the Cloud SIEM UI.
5959

6060
| Sumo Logic UI | Cloud SIEM UI |
6161
| :-- | :-- |
62-
| <ul><li>Add collectors and data sources.</li><li>Write field extraction rues.</li><li>Configure partitions and data tiers</li><li>Forward data to Cloud SIEM.</li><li>Configure RBAC controls.</li></ul> | <ul><li>Configure log and ingest mappings.</li><li>Create custom content, such as rules, match lists, and insights.</li><li>Customize actions, context actions, and other workflows.</li></ul>|
62+
| <ul><li>Add collectors and data sources.</li><li>Write field extraction rules.</li><li>Configure partitions and data tiers</li><li>Forward data to Cloud SIEM.</li><li>Configure RBAC controls.</li></ul> | <ul><li>Configure log and ingest mappings.</li><li>Create custom content, such as rules, match lists, and insights.</li><li>Customize actions, context actions, and other workflows.</li></ul>|
6363

6464
In the Sumo Logic UI, you'll add the collectors and data sources that will be used in Cloud SIEM. You can write field extraction rules, which help parse your logs so they can be better used as records in Cloud SIEM. You can also configure partitions and data tiers in Sumo Logic, and decide which data gets forwarded to Cloud SIEM. Finally, you configure users and roles for both Sumo Logic and Cloud SIEM using the Sumo Logic interface.
6565

docs/integrations/amazon-aws/aws-privatelink.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ With the NLB-created and ALB-registered as a target, requests over AWS PrivateL
3737

3838
Sumo Logic exposes AWS PrivateLink endpoints to different [regions that depend on your Sumo Logic deployment](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security). If you're using the VPC in a different region where the Sumo Logic PrivateLink endpoint service is set up, you need to set up VPC peering. Either way, you need to create an endpoint.
3939

40-
<table><small>
40+
<table>
4141
<tr>
4242
<td><strong>Deployment</strong></td>
4343
<td><strong>Collection Endpoint</strong></td>
@@ -107,7 +107,7 @@ https://endpoint9.collection.us2.sumologic.com</td>
107107
<td>https://open-collectors.us2.sumologic.com</td>
108108
<td>us-west-2</td>
109109
</tr>
110-
</small></table>
110+
</table>
111111

112112

113113
### Create an endpoint to connect with the Sumo Logic endpoint service

docs/integrations/amazon-aws/global-intelligence-cloudtrail-secops.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ This application relies on 45 Scheduled Searches that Save to two different Inde
5151
<details>
5252
<summary>View the list of Scheduled Searches (<strong>click to expand</strong>)</summary>
5353

54-
<table><small>
54+
<table>
5555
<tr>
5656
<td><strong>Folder</strong></td>
5757
<td><strong>Scheduled Search Name (prefixed with gis_benchmarks)</strong></td>
@@ -282,7 +282,7 @@ This application relies on 45 Scheduled Searches that Save to two different Inde
282282
<td>S3_ListBuckets</td>
283283
<td>Counts S3 events related to listing buckets.</td>
284284
</tr>
285-
</small></table>
285+
</table>
286286

287287
* To reduce false positives, the benchmarks and application filter out AWS CloudTrail events from legitimate cloud services including AWS itself and CloudHealth by VMware.
288288
* Security posture requirements may vary between AWS accounts for a given customer. For example, development accounts might have less strict controls than production accounts. The app supports filtering findings by AWS account ID to facilitate AWS account level posture assessment.

docs/integrations/app-development/jfrog-artifactory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ In this step, you configure four local file sources, one for each log source lis
114114
115115
The following suffixes are required. For example, you could use `_sourceCategory=<Foo>/artifactory/console`, but the suffix **artifactory/console** must be used.
116116
117-
<table><small>
117+
<table>
118118
<tr>
119119
<td><strong>Log source</strong></td>
120120
<td><strong>File Path</strong></td>
@@ -139,7 +139,7 @@ The following suffixes are required. For example, you could use `_sourceCategory
139139
<td>Traffic</td>
140140
<td>$JFROG_HOME/&#60;product&#62;/var/log/artifactory-traffic.*.log</td>
141141
<td>artifactory/traffic</td>
142-
</tr></small>
142+
</tr>
143143
</table>
144144
145145
:::note

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ _sourceCategory=cylance "IP Address"
4646

4747
<!-- Per DOCS-643, replace section content with this after `sumo://threat/cs` is replaced by `threatlookup`:
4848
49-
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
49+
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
5050
5151
You can further optimize and enhance these queries for the log and events types being scanned for threats. Use the following guidelines to customize your threat intel queries:
5252
@@ -58,14 +58,14 @@ You can further optimize and enhance these queries for the log and events types
5858
For example, here is the query used for the **Threat Count** panel in the [Threat Intel Quick Analysis - IP](#ip) dashboard:
5959
6060
```
61-
_sourceCategory=<source-category-name>
62-
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
61+
_sourceCategory=<source-category-name>
62+
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
6363
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
6464
| count as ip_count by ip_address
6565
6666
| threatlookup singleIndicator ip_address
6767
68-
// normalize confidence level to a string
68+
// normalize confidence level to a string
6969
| if (_threatlookup.confidence >= 85, "high", if (_threatlookup.confidence >= 50, "medium", if (_threatlookup.confidence >= 15, "low", if (_threatlookup.confidence >= 0, "unverified", "unknown")))) as threat_confidence
7070
7171
// filter for threat confidence
@@ -106,7 +106,7 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
106106
| if (isEmpty(actor), "Unassigned", actor) as Actor
107107
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
108108
| sort by threat_count
109-
```
109+
```
110110
<!-- Per DOCS-643, replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
111111
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
112112
```
@@ -140,7 +140,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
140140
_view=cylance_threat
141141
| count by src_ip
142142
```
143-
143+
144144
## Threat Intel FAQ
145145
146146
#### What is the CrowdStrike Integration for Sumo Logic?
@@ -399,7 +399,7 @@ Once an indicator has been marked with a malicious confidence level, it continue
399399
</tr>
400400
<tr>
401401
<td class="mt-column-width-20" data-th="IOC Type"><br/><strong>Vulnerability</strong></td>
402-
<td class="mt-column-width-80" data-th="Values"><br/>The CVE-XXXX-XXX vulnerability the indicator is associated with (e.g. <a href="https://intelapi.crowdstrike.com/indicator/v1/search/labels?equal=vulnerability/CVE-2012-0158" rel="freelink" title="https://intelapi.crowdstrike.com/indicator/v1/search/labels?equal=vulnerability/CVE-2012-0158">https://intelapi.crowdstrike.com/ind.../CVE-2012-0158</a> )</td>
402+
<td class="mt-column-width-80" data-th="Values"><br/>The CVE-XXXX-XXX vulnerability the indicator is associated with (e.g., https://intelapi.crowdstrike.com/indicator/v1/search/labels?equal=vulnerability/CVE-2012-0158).</td>
403403
</tr>
404404
</tbody>
405405
</table>
@@ -506,4 +506,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
506506
507507
import AppUninstall from '../../reuse/apps/app-uninstall.md';
508508
509-
<AppUninstall/>
509+
<AppUninstall/>

docs/manage/field-extractions/create-field-extraction-rule.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ description: Field Extraction Rules (FER) tell Sumo Logic which fields to parse
55
---
66

77
import Iframe from 'react-iframe';
8+
import FerLimit from '../../reuse/fer-limitations.md';
89

910
You can create a field extraction rule of your own from scratch by following the instructions below. We also provide [data-source-specific templates](/docs/manage/field-extractions/fer-templates/index.md) for AWS, Apache, and more.
1011

@@ -71,9 +72,9 @@ To create a Field Extraction Rule:
7172
:::
7273

7374
:::sumo Best Practices
74-
If you are not using Partitions we recommend using [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) fields like `_sourceCategory`, `_sourceHost` or `_collector` to define the scope.
75+
If you are not using Partitions we recommend using [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) fields like `_sourceCategory`, `_sourceHost` or `_collector` to define the scope.
7576

76-
We recommend creating a separate Partition for your JSON dataset and use that Partition as the scope for run time field extraction. For example, let's say you have AWS CloudTrail logs, and they are stored in `_view=cloudtrail` Partition in Sumo. You can create a Run Time FER with the scope `_view=cloudtrail`. Creating a separate Partition and using it as scope for a run time field extraction ensures that auto parsing logic only applies to necessary Partitions.
77+
We recommend creating a separate Partition for your JSON dataset and use that Partition as the scope for run time field extraction. For example, let's say you have AWS CloudTrail logs, and they are stored in `_view=cloudtrail` Partition in Sumo. You can create a Run Time FER with the scope `_view=cloudtrail`. Creating a separate Partition and using it as scope for a run time field extraction ensures that auto parsing logic only applies to necessary Partitions.
7778
:::
7879

7980
* **Parsed template** (Optional for Ingest Time rules).
@@ -153,6 +154,4 @@ The **multi** and **auto** options are not supported in FERs.
153154

154155
The `parse multi` operator is not supported in FERs.
155156

156-
import FerLimit from '../../reuse/fer-limitations.md';
157-
158-
<FerLimit/> 
157+
<FerLimit/>

docs/manage/partitions/flex/create-edit-partition-flex.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,11 @@ To create or edit a Partition, you must be an account Administrator or have th
2121

2222
## Create a Partition
2323

24-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Manage Data > Logs > Partitions**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Partitions**. You can also click the **Go To...** menu at the top of the screen and select **Partitions**.
24+
:::important
25+
The search modifier `dataTier` is not supported for Flex queries.
26+
:::
27+
28+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Manage Data > Logs > Partitions**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Partitions**. You can also click the **Go To...** menu at the top of the screen and select **Partitions**.
2529
1. Click **+ Add Partition**.
2630
1. The **Create New Partition** pane appears.<br/><img src={useBaseUrl('img/manage/partitions-data-tiers/create-new-partition-flex.png')} alt="create-new-partition-flex.png" style={{border:'1px solid gray'}} width="300"/>
2731
1. **Name**. Enter a name for the Partition. Partitions must be named alphanumerically, with no special characters, with the exception of underscores (`_`). However, a Partition name cannot start with `sumologic_` or an underscore `_`.
@@ -70,15 +74,15 @@ You can make some changes to an existing partition:  
7074
:::
7175
* You can change the data forwarding configuration.
7276
* You cannot change the name of a partition, the routing expression, or reuse a partition name.
73-
* You cannot edit the audit index partition to include it in the default scope.
77+
* You cannot edit the audit index partition to include it in the default scope.
7478
* Security partitions can’t be edited. Sumo Logic stores Cloud SIEM Records in seven partitions, one for each [Cloud SIEM Record type](/docs/cse/schema/cse-record-types). The names of the Sumo Logic partitions that contain Cloud SIEM Records begin with the string `sec_record_`. If you have a role that grants you the **View Partitions** capability, you can view the security partitions in the Sumo Logic UI. Note, however, that no user can edit or remove a security partition.
7579

7680
### How to edit a partition
7781

78-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Manage Data > Logs > Partitions**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Partitions**. You can also click the **Go To...** menu at the top of the screen and select **Partitions**.
82+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Manage Data > Logs > Partitions**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Partitions**. You can also click the **Go To...** menu at the top of the screen and select **Partitions**.
7983
1. To refine the table results, use the **Add a filter** section located above the table. *AND* logic is applied when filtering between different sections, while *OR* logic is applied when filtering within the same section.
80-
:::note
81-
You can see the suggestions only if there are two or more responses for the same column or section.
84+
:::note
85+
You can see the suggestions only if there are two or more responses for the same column or section.
8286
:::
8387
1. Click the row with the partition you want to edit.
8488
1. The partition details are displayed on the right side of the page.

0 commit comments

Comments
 (0)