Skip to content

Commit b3fb617

Browse files
authored
Merge branch 'main' into DOCS-362
2 parents 8fb2bcd + 3fce183 commit b3fb617

File tree

8 files changed

+97
-121
lines changed

8 files changed

+97
-121
lines changed

blog-service/2024-12-11-new-ui.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: New UI Improvements
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- UI
6+
hide_table_of_contents: true
7+
---
8+
9+
import useBaseUrl from '@docusaurus/useBaseUrl';
10+
11+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
12+
13+
We're excited to share some updates to the new UI based on feedback we've received from our customers. These updates were implemented to enhance your navigation experience and improve your workflow.
14+
15+
- **Tree position memory**. The Library navigation now remembers where you left off within the tree structure, making it easier to return to your exact spot when re-opening the subnavigation.
16+
- **Remembered menu state**. The expand/collapse state of the navigation menu is now persistent when opening new tabs, giving you a consistent experience across multiple browser tabs.
17+
- **Pin subnavigation**. You can now “pin” a subnavigation menu to keep it open while working within a specific feature area, giving you quicker access to what you need.
18+
- **Resizable submenu**. Widen the submenu to better view content items with longer names.
19+
20+
You can try the new UI by clicking the **Switch to New UI** link from the Classic UI menu navigation. [Learn more](/docs/get-started/sumo-logic-ui).
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Universal Connector (Collection)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- collection
6+
- universal-collector
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We are excited to announce the release of our new Universal Connector. With this cloud source, you can collect log data from vendor APIs using a modular configuration. This source allows Sumo Logic to expand its configuration modules over time, providing greater compatibility with various vendor APIs. However, it's important to note that complex APIs will still require a specific cloud source and may not be compatible with this universal source. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source/).
15+

docs/alerts/monitors/create-monitor.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -139,10 +139,10 @@ Triggers are evaluated by balancing the requirement of timely alert notification
139139
* For [static logs monitors](#static-detection-method), triggers are similar to "Alert when the result is greater than _ within Y Minutes". The triggers are evaluated periodically as below.
140140
| When detection window (Y) is | Evaluate trigger every |
141141
|:-----------------------------|:-----------------------|
142-
| 30m or less | 1m |
143-
| 30m to 3h | 2m |
144-
| 3hr to 12h | 10m |
145-
| Greater than 12h | 20m |
142+
| 15m or less | 1m |
143+
| 15m to 1h | 2m |
144+
| 1h to 6h | 10m |
145+
| Greater than 6h | 20m |
146146
* For [anomaly logs monitors](#anomaly-detection-method), triggers are evaluated every `timeslice` as specified in the monitor query. For example, the below query is evaluated every 2 minutes.
147147
```
148148
_sourceCategory=Labs/Apache/Access

docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection.md

Lines changed: 3 additions & 95 deletions
Original file line numberDiff line numberDiff line change
@@ -182,101 +182,9 @@ _sourceCategory=*Crowdstrike* UserActivityAuditEvent
182182
```
183183

184184

185-
## Collecting logs for the CrowdStrike app
185+
## Set up collection
186186

187-
This section shows you how to configure log collection from CrowdStrike Falcon Endpoint Protection and have them sent to Sumo Logic. CrowdStrike Falcon Endpoint Protection provides endpoint detection and response, next-gen antivirus, and threat intelligence services through the cloud. Multiple security functions are consolidated into a single lightweight agent, for visibility across using central security analytics with Sumo Logic.
188-
189-
:::warning
190-
The sections below are deprecated for non-FedRAMP Sumo Logic deployments.
191-
192-
If you're using the Sumo Logic FedRAMP deployment, use the sections below to configure the collection for this app.
193-
194-
If you are not using the Sumo Logic FedRAMP deployment, use the [Cloud-to-Cloud Integration for Crowdstrike](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source) to collect logs from CrowdStrike Falcon Endpoint Protection. This allows you to create the source and use the same source category while installing the app.
195-
:::
196-
197-
198-
### Collection process overview
199-
200-
SIEMs (Security Information and Event Management) are used to gather data from a variety of security products to detect, investigate, correlate, and remediate security threats. The [Falcon SIEM Connector](https://www.crowdstrike.com/resources/data-sheets/falcon-connector/) provides a fast and efficient way to optimize collection across an extensive number of endpoints.
201-
202-
:::note
203-
Sumo Logic recommends installing the SIEM Connector and Sumo Logic Collector on the same machine for best performance.
204-
:::
205-
206-
To set up log collection for CrowdStrike Falcon, you'll download, install, and configure the CrowdStrike SIEM Connector to send data to Sumo Logic, through performing the following tasks.
207-
208-
209-
#### Data collection flow
210-
211-
The following graphic illustrates the Sumo Logic collection of CrowdStrike streaming API events using a SIEM Connector.
212-
213-
214-
### Prerequisites
215-
216-
It is important that you complete the following tasks before you start to configure log collection for CrowdStrike Falcon:
217-
218-
* Download the SIEM Connector guide, familiarize yourself with [SIEM Connector](https://falcon.crowdstrike.com/support/documentation/14/siem-connector) and its config settings.
219-
* [Contact CrowdStrike support](https://supportportal.crowdstrike.com/) to enable the streaming APIs in your environment. You must do this before using the SIEM connector.
220-
221-
222-
### Step 1. Download and install CrowdStrike SIEM Connector on a host machine
223-
224-
You perform this procedure from the Falcon console. You must have permission to be able to download and install from Falcon to complete this task.
225-
226-
To install a CrowdStrike SIEM Connector on a host machine, do the following:
227-
1. Login to your Falcon console and go to [Support > Tool Downloads](https://falcon.crowdstrike.com/support/tool-downloads).
228-
2. Download the **SIEM Connector** installer for your operating system.
229-
3. Open a terminal window.
230-
4. Run the following installation command appropriate for your OS, replacing the `<installer package>` variable with the SIEM installer you downloaded:
231-
* **CentOS**: `sudo rpm -Uvh <installer package>`
232-
* **Ubuntu**: `sudo dpkg -i <installer package>`
233-
234-
235-
### Step 2. Configure CrowdStrike SIEM Connector
236-
237-
This SIEM connector will stream events data from CrowdStrike Falcon Cloud in JSON format into a local file (output). The default location of the **output** file is `/var/log/crowdstrike/falconhoseclient/output`.
238-
239-
To configure CrowdStrike SIEM Connector, do the following:
240-
241-
1. In the Falcon console go to [Support > API Clients & Keys](https://falcon.crowdstrike.com/support/api-clients-and-keys).
242-
2. [Create an API client](https://falcon.crowdstrike.com/support/documentation/1/crowdstrike-api-introduction#auth_apiclient) to use with the SIEM connector, and record its API client ID and API client secret. In the the **Edit API client** dialog, ONLY select the **Event streams** option, and then click **Save**.
243-
1. Open the **/opt/crowdstrike/etc/cs.falconhoseclient.cfg** file in a text editor.
244-
2. Edit the following lines in the **cs.falconhoseclient.cfg** file:
245-
* Change **app_id** to **SIEM-Connector.**
246-
* **client_id** - Add your recorded API Client ID
247-
* **client_secret** - Add your recorded API Client Secret
248-
* Make sure **output_format** is set to **json**
249-
* For **EventTypeCollection** section - Enable all events:
250-
* DetectionSummaryEvent = true
251-
* AuthActivityAuditEvent = true
252-
* UserActivityAuditEvent = true
253-
* HashSpreadingEvent = true
254-
* RemoteResponseSessionStartEvent = true
255-
* RemoteResponseSessionEndEvent = true
256-
3. Save your changes.
257-
4. Restart the SIEM Connector, as appropriate for your OS:
258-
* **CentOS:** `sudo service cs.falconhoseclientd start`
259-
* **Ubuntu 14.x:** `sudo start cs.falconhoseclientd`
260-
* **Ubuntu 16.4:** `sudo systemctl start cs.falconhoseclientd.service`
261-
262-
263-
### Step 3. Set up a Sumo Logic installed collector and local file source
264-
265-
You setup a Sumo Logic installed collector on the same host as the SIEM Connector. Then, set up a local file source on the installed collector to read the output file from [Step 2](#step-2-configure-crowdstrike-siem-connector) and send CrowdStrike Falcon Events to Sumo Logic.
266-
267-
To set up an installed collector and local file source, do the following:
268-
269-
1. Install a Sumo Logic collector on the same host as the SIEM Connector. Follow the instructions for your operating system as described in [Installed Collectors](/docs/send-data/installed-collectors).
270-
2. Add a local file source to the collector for Streaming API Events. Follow the steps on [Local File Source](/docs/send-data/installed-collectors/sources/local-file-source), with these additional changes:
271-
* Set the **Filepath** to: `/var/log/crowdstrike/falconhoseclient/output`
272-
* Set the **Source Category** to: `crowdstrike/falcon`
273-
* Under **Enable Multiline Processing**, check **Boundary Regex** and enter the following regex: `^\{.*`.
274-
3. Click **Save**.
275-
276-
277-
:::info
278-
For more information about the CrowdStrike Falcon SIEM Connector, see the CrowdStrike documentation, or contact CrowdStrike Customer Support at [[email protected]](mailto:[email protected]).
279-
:::
187+
To set up the [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source) for the CrowdStrike Falcon Endpoint Protection app, follow the instructions provided. These instructions will guide you through the process of creating a source using the CrowdStrike Falcon Endpoint Protection source category, which you will need to use when installing the app. By following these steps, you can ensure that your CrowdStrike Falcon Endpoint Protection app is properly integrated and configured to collect and analyze your CrowdStrike Falcon Endpoint Protection data.
280188

281189
## Installing the CrowdStrike Falcon Endpoint Protection app
282190

@@ -365,4 +273,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
365273

366274
import AppUninstall from '../../reuse/apps/app-uninstall.md';
367275

368-
<AppUninstall/>
276+
<AppUninstall/>

docs/manage/deletion-requests.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -53,26 +53,27 @@ Data cannot be recovered once it gets deleted. Ensure that you have appropriatel
5353

5454
### From a Log Search
5555

56-
#### Delete audit events
57-
58-
The Audit Event Index has detailed JSON logs. To search for audit events for data deletion logs, use metadata field `_sourceCategory=deletionRule`. For example, to search for data deletion logs you would use the query:
59-
60-
```
61-
(_index=sumologic_audit_events) AND _sourceCategory=deletionRule
62-
```
63-
64-
#### Delete system events
56+
1. In the **Log Search**, search for the required logs that needs to be deleted.
57+
1. Click the cog icon, then in the dropdown, select **Create Deletion Request**.<br/><img src={useBaseUrl('img/search/get-started-search/deletion-request.png')} alt="deletion request" style={{border: '1px solid gray'}} width="400"/>
58+
1. In the popup window, enter a **Name** and **Reason** for your data deletion request, then click **Create Request**.
59+
60+
#### Delete events
6561

66-
The System Event Index has detailed JSON logs. To search for system events for data deletion logs, use metadata field `_sourceCategory=deletionRule`. For example, to search for data deletion logs you would use the query:
62+
The Audit Event Index and System Event Index has detailed JSON logs. To search for audit events or system events for data deletion logs, use metadata field `_sourceCategory=deletionRule`.
6763

68-
```
69-
(_index=sumologic_system_events) AND _sourceCategory=deletionRule
64+
```sql
65+
(_index=sumologic_*_events) AND _sourceCategory=deletionRule
66+
| json field=_raw "resourceIdentity.name" as name nodrop
67+
| json field=_raw "resourceIdentity.id" as id nodrop
68+
| json field=_raw "eventName"
69+
| json field=_raw "operator.interface" as operator nodrop
70+
| json field=_raw "operator.email" as email nodrop
7071

72+
| count by _messagetime,eventname,name,id,operator,email,_view
73+
| sort _messagetime asc
7174
```
7275

73-
1. In the **Log Search**, search for the required logs that needs to be deleted.
74-
1. Click the cog icon, then in the dropdown, select **Create Deletion Request**.<br/><img src={useBaseUrl('img/search/get-started-search/deletion-request.png')} alt="deletion request" style={{border: '1px solid gray'}} width="400"/>
75-
1. In the popup window, enter a **Name** and **Reason** for your data deletion request, then click **Create Request**.
76+
The events `DeletionRuleCreated` and `DeletionRuleStateUpdated` are contained in the `sumologic_audit_events` index and `DeletionRuleProcessingConcluded` is in the `sumologic_system_events` index.
7677

7778
## Cancel a deletion request
7879

@@ -100,4 +101,4 @@ Each deletion request is limited to 100,000 messages. This means that any deleti
100101

101102
### Supported operators
102103

103-
Currently, we only support [`as`](/docs/search/search-query-language/search-operators/as), [`concat`](/docs/search/search-query-language/search-operators/concat), [`contains`](/docs/search/search-query-language/search-operators/contains), [`decToHex`](/docs/search/search-query-language/search-operators/dectohex), [`floor`](/docs/search/search-query-language/math-expressions/floor), [`if`](/docs/search/search-query-language/search-operators/if), [`in`](/docs/search/search-query-language/search-operators/in), [`lookup`](/docs/search/search-query-language/search-operators/lookup), [`toLower`](/docs/search/search-query-language/search-operators/tolowercase-touppercase), [`matches`](/docs/search/search-query-language/search-operators/matches), [`parse`](/docs/search/search-query-language/parse-operators), [`toUpper`](/docs/search/search-query-language/search-operators/tolowercase-touppercase), and [`where`](/docs/search/search-query-language/search-operators/where) search query operators.
104+
Currently, we only support [`as`](/docs/search/search-query-language/search-operators/as), [`concat`](/docs/search/search-query-language/search-operators/concat), [`contains`](/docs/search/search-query-language/search-operators/contains), [`decToHex`](/docs/search/search-query-language/search-operators/dectohex), [`floor`](/docs/search/search-query-language/math-expressions/floor), [`if`](/docs/search/search-query-language/search-operators/if), [`in`](/docs/search/search-query-language/search-operators/in), [`lookup`](/docs/search/search-query-language/search-operators/lookup), [`toLower`](/docs/search/search-query-language/search-operators/tolowercase-touppercase), [`matches`](/docs/search/search-query-language/search-operators/matches), [`parse`](/docs/search/search-query-language/parse-operators), [`toUpper`](/docs/search/search-query-language/search-operators/tolowercase-touppercase), and [`where`](/docs/search/search-query-language/search-operators/where) search query operators.

docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
77

88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/sumo-logic.png')} alt="sumo-logic-log-analytics" width="100"/>
99

10-
***Version: 1.23
11-
Updated: Apr 5, 2024***
10+
***Version: 1.24
11+
Updated: Dec 12, 2024***
1212

1313
Integration with Sumo Logic platform for logs, metrics, and monitors.
1414

@@ -100,3 +100,8 @@ Integration with Sumo Logic platform for logs, metrics, and monitors.
100100
+ Search Sumo Logic Action updated:
101101
- If the Aggregates field is selected, the action will fetch only aggregates. If the Aggregates field is not selected, it will fetch only messages.
102102
- Added a new field *Escape Backslashes* if selected it will Escape all Backslashes in Query
103+
* December 12, 2024 (v1.24)
104+
+ Updated Actions: (Fixed Authentication Issue)
105+
+ **Search Sumo Logic** Action
106+
+ **Search Sumo Logic Daemon** Action
107+
+ **Aggregates Sumo Logic Daemon** Action

0 commit comments

Comments
 (0)