Skip to content

Commit bc17461

Browse files
authored
Merge branch 'main' into add-traces-info
2 parents 21a0c3b + b3c888c commit bc17461

File tree

65 files changed

+368
-318
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+368
-318
lines changed

blog-cse/2025-08-15-content.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: August 15, 2025 - Content Release
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- log mappers
6+
- parsers
7+
hide_table_of_contents: true
8+
---
9+
10+
This content release includes:
11+
- New product support for Vectra AI.
12+
- Updated parsers and log mappers for Azure Event Hub, Barracuda CloudGen Firewall, Microsoft IIS, and Surepass.
13+
- Updated Surepass to the correct vendor name.
14+
15+
Changes are enumerated below.
16+
17+
### Log Mappers
18+
- [New] Vectra AI Catch All
19+
- [New] Vectra AI User Login
20+
- [Updated] Azure Event Hub - Windows Defender Logs
21+
- Updated field mappings to include new fields.
22+
- [Updated] Barracuda CloudGen Firewall Activity
23+
- Updated `event_id` criteria to handle abridged event types in some logs.
24+
- [Updated] Microsoft IIS Parser - Catch All
25+
- Updated to support `http_url` and downstream enrichment.
26+
- [Updated] Surepass Authentication
27+
- [Updated] Surepass Catch All
28+
- [Updated] Surepass Network Event
29+
30+
### Parsers
31+
- [New] /Parsers/System/Vectra/Vectra AI
32+
- [Updated] /Parsers/System/Barracuda/Barracuda CloudGen
33+
- Updated `event_id` criteria to handle abridged event types in some logs and to support additional log formats.
34+
- [Updated] /Parsers/System/Cylance/Cylance Syslog
35+
- Updated timestamp parsing.
36+
- [Updated] /Parsers/System/DocuSign/DocuSign Monitor
37+
- Updated timestamp parsing.
38+
- [Updated] /Parsers/System/Microsoft/Microsoft Azure JSON
39+
- Updated parser to parse additional nested fields.
40+
- [Updated] /Parsers/System/Microsoft/Microsoft IIS
41+
- Updated to form `http_url` for downstream enrichment.

cid-redirects.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2832,7 +2832,7 @@
28322832
"/cid/15633": "/docs/c2c/info/",
28332833
"/cid/14323": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/docusign-source",
28342834
"/cid/14324": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zendesk-source",
2835-
"/cid/14326": "/docs/integrations/global-intelligence/kubernetes-devops",
2835+
"/cid/14326": "/docs/integrations/global-intelligence",
28362836
"/cid/30001": "/docs/integrations/microsoft-azure/azure-batch",
28372837
"/cid/30002": "/docs/integrations/microsoft-azure/azure-application-gateway",
28382838
"/cid/30003": "/docs/integrations/microsoft-azure/azure-data-explorer",
@@ -3558,7 +3558,7 @@
35583558
"/Observability_Solution/Kubernetes_Solution/04View_Sumo_Logic_Kubernetes_App_Dashboards": "/docs/observability/kubernetes/monitoring",
35593559
"/Observability_Solution/Kubernetes_Solution/05Kubernetes_Apps": "/docs/observability/kubernetes/apps",
35603560
"/Observability_Solution/Kubernetes_Solution/06Troubleshoot_with_Explore": "/docs/observability/kubernetes/troubleshoot-with-explore",
3561-
"/Observability_Solution/Kubernetes_Solution/07Global_Intelligence_for_Kubernetes_DevOps_App": "/docs/integrations/global-intelligence/kubernetes-devops",
3561+
"/Observability_Solution/Kubernetes_Solution/07Global_Intelligence_for_Kubernetes_DevOps_App": "/docs/integrations/global-intelligence",
35623562
"/Observability_Solution/Kubernetes_Solution/06Kubernetes_Alerts": "/docs/observability/kubernetes/alerts",
35633563
"/Observability_Solution/Kubernetes_Solution/08Next_Steps": "/docs/observability/kubernetes",
35643564
"/Observability_Solution/Kubernetes_Solution/09Create_a_New_Dashboard_(New)": "/docs/observability/kubernetes",
@@ -3978,7 +3978,8 @@
39783978
"/Observability_Solution/AWS_Observability_Solution/01_Deploy_and_Use_AWS_Observability/Root_Cause_Explorer": "/docs/observability/root-cause-explorer-deprecation",
39793979
"/docs/observability/root-cause-explorer": "/docs/observability/root-cause-explorer-deprecation",
39803980
"/Observability_Solution/Kubernetes_Solution/01Set_up_collection_for_Kubernetes": "/docs/observability/kubernetes/collection-setup",
3981-
"/Observability_Solution/Kubernetes_Solution/Global_Intelligence_for_Kubernetes_DevOps_App": "/docs/integrations/global-intelligence/kubernetes-devops",
3981+
"/Observability_Solution/Kubernetes_Solution/Global_Intelligence_for_Kubernetes_DevOps_App": "/docs/integrations/global-intelligence",
3982+
"/docs/integrations/global-intelligence/kubernetes-devops": "/docs/integrations/global-intelligence",
39823983
"/Observability_Solution/Kubernetes_Solution/Navigate_your_Kubernetes_environment": "/docs/observability/kubernetes",
39833984
"/Search/Get-Started-with-Search/How-to-Build-a-Search/Best-Practices:-7-Search-Rules-to-Live-By": "/docs/search/get-started-with-search/build-search/best-practices-search",
39843985
"/Search/Get-Started-with-Search/How-to-Build-a-Search/Search_Templates": "/docs/search/get-started-with-search/build-search/search-templates",

docs/api/about-apis/getting-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ Sumo Logic APIs follow Representational State Transfer (REST) patterns and are o
1515

1616
## Documentation
1717

18-
To view our main docs, click the link below corresponding to your deployment. If you're not sure, see [How to determine your endpoint](#which-endpoint-should-i-should-use).
18+
To access our API documentation, navigate to the appropriate link based on your Sumo Logic deployment. If you're not sure, see [Which endpoint should I use?](#which-endpoint-should-i-should-use)
1919

20-
| Deployment | API Docs URL |
20+
| Deployment | API documentation URL |
2121
|:-----------|:----------------------------------|
2222
| AU | https://api.au.sumologic.com/docs/ |
2323
| CA | https://api.ca.sumologic.com/docs/ |

docs/api/about-apis/intro-to-apis.md

Lines changed: 25 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,15 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
99

1010
<img src={useBaseUrl('img/icons/operations/advanced-certificates.png')} alt="Thumbnail icon" width="50"/>
1111

12-
Sumo Logic has a host of useful APIs across all products that can add valuable functionality to any organization by providing access to data and activities without going through the website. API calls can be used for data gathering, automation of processes, and custom reports.
12+
Sumo Logic has a host of useful APIs across all products that let you access data and perform actions without using the Sumo Logic UI. API calls can be used for to gather data, automate processes, and create custom reports.
1313

14-
This article presumes that you have a solid understanding of Sumo Logic functionality: collectors, queries, security offerings, etc. While APIs are typically for "power users" looking for additional customization and access to web service resources, you also don't need a computer science degree to understand and make use of API calls. This article helps walk you through the basics and get you going with important data queries through the API.
14+
This article is for users who are familiar with Sumo Logic features (collectors, queries, and security tools, for example), but new to working with APIs. You dont need a development background to follow along. We’ll cover the basics so you can start making API calls to run queries and perform tasks.
1515

16-
In this article, you'll learn about:
17-
* How to create a Sumo Logic access ID/key.
18-
* How to access Sumo Logic APIs.
19-
* How to use APIs with Sumo Logic's Cloud SIEM.
16+
In this article, you'll learn how to:
17+
18+
* Create a Sumo Logic access ID/key.
19+
* Access Sumo Logic APIs.
20+
* Use APIs with Sumo Logic's Cloud SIEM.
2021

2122
## Create an access key
2223

@@ -66,11 +67,9 @@ However, most API users do not use a traditional web browser for API calls, othe
6667
An open source application such as [Postman](https://www.postman.com/) can be a convenient tool for testing and developing with API calls. To use Postman, download and install the app. Then:
6768
1. Enter the URL for the API call.
6869
1. Click the **Authorization** tab.
69-
1. Fill in the username and password fields with your Sumo Logic access ID and access key respectively.
70+
1. Fill in the username and password fields with your Sumo Logic access ID and access key, respectively.
7071
1. Click **Send** when finished.
71-
1. You see the JSON output (or error messages if there is a problem) in the bottom panel.
72-
73-
<img src={useBaseUrl('img/api/postman-ui.png')} alt="Postman UI" style={{border: '1px solid gray'}} width="800" />
72+
1. You see the JSON output (or error messages if there is a problem) in the bottom panel.<br/><img src={useBaseUrl('img/api/postman-ui.png')} alt="Postman UI" style={{border: '1px solid gray'}} width="800" />
7473

7574
Most programming and scripting languages provide modules and libraries for making web service and API calls in code. For instance, the following Python code can make the same "get collectors" call programmatically using the `requests` library:
7675

@@ -98,6 +97,18 @@ if __name__ == '__main__':
9897

9998
As you are learning how APIs work, we recommend setting up an API test program, then follow along with the API examples shown in the following sections. To execute API commands, you can use Postman as shown above, another API test application, or set up a quick code snippet in Python or the programming language of your choice.
10099

100+
### Download the OpenAPI Specification
101+
102+
Optionally, you can download the OpenAPI Specification for the Sumo Logic API and import it to your API test application. This lets you view the full specification for all Sumo Logic APIs and run them directly from your testing tool.
103+
104+
1. Select the API documentation URL for your deployment from the [Documentation](/docs/api/about-apis/getting-started/#documentation) section of the *API Authentication, Endpoints, and Security* article. For instance, US users would access either https://api.sumologic.com/docs/ or https://api.us2.sumologic.com/docs/.
105+
1. Click the **Download** button at the top of the page. <br/><img src={useBaseUrl('img/api/openapi-spec-download-button.png')} alt="Button to download Sumo Logic OpenAPI Specification" style={{border: '1px solid gray'}} width="600" />
106+
1. Import the downloaded file to your API test application. For example, to [import the file to Postman](https://learning.postman.com/docs/getting-started/importing-and-exporting/importing-data/), select **File > Import**.
107+
1. The imported specification appears. Select any API to run it.<br/><img src={useBaseUrl('img/api/imported-api.png')} alt="Imported API specification" style={{border: '1px solid gray'}} width="500" />
108+
1. You can also download the API specification for Cloud SIEM or Cloud SOAR from the following locations. Simply select the API documentation URL for your deployment and click the **Download** button at the top of the page:
109+
* [Cloud SIEM API documentation](/docs/api/cloud-siem-enterprise/#documentation)
110+
* [Cloud SOAR API documentation](/docs/api/cloud-soar/#documentation)
111+
101112
## Basic API GET commands
102113

103114
Retrieving system data and configuration is one of the most common use cases for utilizing platform APIs. These data retrieval operations are generally known as GET commands in reference to the "GET" verb used by the HTTP protocol. Data retrieved through API calls can be processed by outside applications and scripts for report generation and advanced analytics, extending functionality beyond that offered by the Sumo Logic website.
@@ -116,7 +127,9 @@ Note the first ID from your list or the sample ID shown above from the Sumo Logi
116127

117128
<img src={useBaseUrl('img/api/collector-id.png')} alt="Collector ID" style={{border: '1px solid gray'}} width="800" />
118129

119-
Note that the collector data itself also contains a helpful follow-up link to analyze the sources currently configured for our chosen collector. Follow up by clicking on (or copying into the URL field) the given URL for sources: `https://api.sumologic.com/api/v1/collectors/<collectorID>/sources`
130+
Note that the collector data itself also contains a helpful follow-up link to analyze the sources currently configured for our chosen collector. Follow up by clicking on (or copying into the URL field) the given URL for sources:
131+
132+
`https://api.sumologic.com/api/v1/collectors/<collectorID>/sources`
120133

121134
<img src={useBaseUrl('img/api/collector-sources.png')} alt="Collector sources" style={{border: '1px solid gray'}} width="800" />
122135

@@ -353,4 +366,4 @@ Or add a new comment to an existing insight by creating comment text in the requ
353366

354367
<img src={useBaseUrl('img/api/insight-comment.png')} alt="Insight comment" style={{border: '1px solid gray'}} width="800" />
355368

356-
All elements of Cloud SIEM functionality are available through the API, including rules, match lists, automations, tags, and custom actions. Users can even use the API to generate their own insights based on a custom selection of signals.
369+
All elements of Cloud SIEM functionality are available through the API, including rules, match lists, automations, tags, and custom actions. Users can even use the API to generate their own insights based on a custom selection of signals.

docs/cloud-soar/incidents-triage.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -503,3 +503,7 @@ With the **Report** option, you can create incident reports to share with others
503503
1. Click **Save**.<br/><img src={useBaseUrl('img/cloud-soar/delivery-2-save-report.png')} alt="Save a report" style={{border: '1px solid gray'}} width="300"/>
504504
1. Click **Export** to export the report to PDF.
505505
1. Click **Open** to open available reports.
506+
507+
## Additional resources
508+
509+
Blog: [Want to improve collaboration and reduce incident response time? Try Cloud SOAR War Room](https://www.sumologic.com/blog/want-to-improve-collaboration-and-reduce-incident-response-time-try-cloud-soar-war-room)

docs/cloud-soar/introduction.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -663,3 +663,15 @@ Let's create a custom automation rule. This rule will pull information from Clou
663663
1. Leave the other fields as their defaults, then click **Save**.
664664
1. As a best practice, you can enable and test the new rule, but then disable it, since it can disrupt your environment. Continue testing your rule until their behavior is expected before deciding to enable it.
665665

666+
## Additional resources
667+
668+
* Blogs:
669+
* [Why you need both SIEM and SOAR to improve SOC efficiencies and increase effectiveness](https://www.sumologic.com/blog/why-you-need-siem-and-soar-to-improve-soc-efficiencies)
670+
* [Cloud-native SOAR and SIEM solutions pave the road to the modern SOC](https://www.sumologic.com/blog/cloud-native-soar-and-siem-solutions-pave-the-road-to-the-modern-soc)
671+
* [SIEM vs SOAR: Evaluating security tools for the modern SOC](https://www.sumologic.com/blog/soar-vs-siem)
672+
* [Overwhelmed: Why SOAR solutions are a game changer](https://www.sumologic.com/blog/overwhelmed-why-soar-solutions-are-a-game-changer)
673+
* [How to improve MTTD and MTTR with SOAR](https://www.sumologic.com/blog/how-to-improve-mttd-and-mttr-with-soar)
674+
* [How to implement cybersecurity automation in SecOps with SOAR (7 simple steps)](https://www.sumologic.com/blog/how-to-implement-cyber-security-automation-in-secops-with-soar-7-simple-steps)
675+
* Briefs
676+
* [Sumo Logic Cloud SOAR Solutions Brief](https://www.sumologic.com/briefs/sumo-logic-cloud-soar-solutions-brief)
677+
* [How to calculate the ROI of Cloud SOAR](https://www.sumologic.com/briefs/how-to-calculate-roi-of-cloud-soar)

docs/cse/administration/cse-data-retention.md

Lines changed: 9 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,30 +6,17 @@ description: See retention periods for different types of Cloud SIEM data.
66
---
77

88

9-
This topic lists the Cloud SIEM data that is retained on the Sumo Logic platform and in Cloud SIEM, and the retention period for each type of data.
9+
This topic describes how long different kinds of Cloud SIEM data are retained.
1010

11-
## Sumo Logic platform
11+
| Data | Partition location | Retention in the partition | Viewable in Cloud SIEM|
12+
| :-- | :-- | :-- | :-- |
13+
| Insights | The [`sumologic_system_events` partition](/docs/cse/administration/cse-audit-logging/) contains insights and insight-related events that result from system actions. <br/><br/> The [`sumologic_audit_events` partition](/docs/cse/administration/cse-audit-logging/) contains insights and insight-related events that result from user actions. <br/><br/>There is a charge for storage of insight-related data in the audit indexes. Note however the volume of data is typically very low compared to log ingestion levels. | 30 days<br/><br/>This period is [customer-configurable](/docs/manage/partitions/manage-indexes-variable-retention). | Indefinitely <br/><br/>Playbook and action executions on insights are viewable in Cloud SIEM for 2 years. For customers who need to ensure HIPAA compliance, we remove that data after 7 years. |
14+
| Signals | Stored in the [`sec_signal` partition](/docs/cse/records-signals-entities-insights/search-cse-records-in-sumo/#partition-for-cloud-siem-signals).<br/>There is no additional charge for storage of signals. | 2 years | Signals that are attached to insights are viewable in Cloud SIEM indefinitely. <br/><br/>Signals that are not attached to insights are viewable in Cloud SIEM for 30 days if suppressed, and for 1 year if unsuppressed. |
15+
| Records | Records (normalized logs) are stored in the partitions whose names begin with the string [`sec_records`](/docs/cse/records-signals-entities-insights/search-cse-records-in-sumo). There is one partition for each record type. <br/>There is no additional charge for storage of records.| 90 days | Records attached to signals are viewable in Cloud SIEM as long as the signals are viewable (see above). Records not attached to signals are viewable for only 90 days. |
16+
| Raw logs | Raw logs reside in your [default partition](/docs/manage/partitions/run-search-against-partition/#search-the-default-partition) in Sumo Logic. | The retention period defined for your default partition. This period is [customer-configurable](/docs/manage/partitions/manage-indexes-variable-retention). | Raw logs are not viewable in Cloud SIEM. (Data from raw logs is normalized before appearing as records in Cloud SIEM.) |
1217

13-
This table lists where, and for how long, different types of Cloud SIEM data are retained on the Sumo Logic platform.
18+
## Custom retention periods
1419

15-
| Data | Location | Retention |
16-
| :-- | :-- | :-- |
17-
| Raw logs | Raw logs reside in your Default Partition in Sumo Logic | The retention period defined for your Default Partition. This period is [customer-configurable](/docs/manage/partitions/manage-indexes-variable-retention). |
18-
| Records | Records (normalized logs) are stored in the partitions whose names begin with the string `sec_records`. There is one partition for each record type. <br/>There is no additional charge for storage of records.| 90 days |
19-
| Signals | Stored in the `sec_signal` partition.<br/>There is no additional charge for storage of signals. | 2 years |
20-
| Insights | The `sumologic_system_events` partition contains insights and insight-related events that result from system actions. <br/> The `sumologic_audit_events` partition contains insights and insight-related events that result from user actions. <br/>There is a charge for storage of insight-related data in the audit indexes. Note however the volume of data is typically very low compared to log ingestion levels. | By default, these partitions have a retention period of 30 days. This period is [customer-configurable](/docs/manage/partitions/manage-indexes-variable-retention). |
21-
22-
23-
### Cloud SIEM
24-
25-
* Insights and signals that are attached to insights are retained in Cloud SIEM indefinitely.
26-
* Signals that are not attached to insights are retained in Cloud SIEM:
27-
* For 30 days if suppressed.
28-
* For 365 days if unsuppressed.
29-
* Playbook and action executions are retained in Cloud SIEM for 2 years. For those that need to ensure HIPAA compliance, we delete the data after 7 years.
30-
31-
### Custom retention periods
32-
33-
You can request retention periods different from those declared in the tables above, as long as the retention period requested is greater than 1 day and less than 5000 days.
20+
You can request retention periods different from those declared in the table above, as long as the retention period requested is greater than 1 day and less than 5000 days.
3421

3522
In order to do that, open a [Support ticket](/docs/get-started/help#support) with your request.

0 commit comments

Comments
 (0)