Skip to content

Commit c5511b7

Browse files
authored
Merge branch 'main' into view-variables-in-dashboard-panel
2 parents e83e3f9 + faf54b9 commit c5511b7

File tree

713 files changed

+3424
-2758
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

713 files changed

+3424
-2758
lines changed

.clabot

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,9 @@
182182
"Deklin",
183183
"justrelax19",
184184
"dlindelof-sumologic",
185-
"snyk-bot"
185+
"snyk-bot",
186+
"stephenthedev",
187+
"Apoorvkudesia-sumologic"
186188
],
187189
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
188190
"label": "cla-signed",

blog-cse/2025-05-09-content.md

Lines changed: 148 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,148 @@
1+
---
2+
title: May 9, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This release includes:
14+
- New rules for monitoring AWS services (see below for tuning guidance).
15+
- Updated rules for Microsoft O365 and Powershell.
16+
- Updates to Cisco ASA mappers to add normalizedAction and normalizedSeverity.
17+
- Updates to Cisco Umbrella mappers to add user_username.
18+
- Updates to SentinelOne mappers to drop null values.
19+
- New parsers for Azure Virtual Network and SentinelOne MGMT API.
20+
- Updates to existing parsers for Abnormal Security, Cisco ASA, Cisco ISE, Cisco Umbrella CSV, Cylance Syslog, and KnowBe4 KMSAT C2C.
21+
22+
Changes are enumerated below.
23+
24+
25+
### Rules
26+
- [New] OUTLIER-S00033 AWS DynamoDB Outlier in PutItem Events from User
27+
- [Disabled by Default] This rule detects an unusual amount of PutItem events to a DynamoDB resource within an hour time period (DynamoDB data events are required). Verify the user is authorized to modify the DynamoDB tables and instances. This rule is disabled by default due to potential volume of signals, before enabling consider excluding authorized users via match lists, and adjust floor value and model sensitivity as needed.
28+
- [New] FIRST-S00100 First Seen User Enumerating Custom AWS Bedrock Models
29+
- [Disabled by Default] Detection of a user account's first enumeration of custom AWS Bedrock models via ListCustomModels API. Verify the user is authorized for AWS Bedrock access. The http_userAgent field indicates whether a browser or CLI tool was used. This rule is disabled by default due to potential high volume of alerts, particularly from service accounts. Before enabling, consider excluding authorized users and service accounts (such as CNAPP monitoring accounts with timestamp-based usernames) through rule tuning expressions.
30+
- [New] OUTLIER-S00032 Outlier in Data Transferred from an S3 Bucket by User
31+
- [Disabled by Default] This rule detects an unusual amount of data transferred outbound from an S3 bucket (requires AWS Data events are required). Verify if the user, role and IP address associated with this activity are authorized. This rule is disabled by default due to potential signal volume. Before enabling, consider excluding authorized users with regular large transfers via match lists, and adjust floor value and model sensitivity as needed.
32+
- [New] OUTLIER-S00031 Outlier in Data Transferred into an S3 Bucket by User
33+
- [Disabled by Default] Detects unusual amounts of inbound data transfers to S3 buckets (requires AWS Data events). Verify if the user, role, and IP address associated with this activity are authorized. This rule is disabled by default due to potential alert volume. Before enabling, consider excluding authorized users with regular large transfers via match lists, and adjust floor value and model sensitivity as needed.
34+
- [Updated] MATCH-S00069 O365 - Users Password Reset
35+
- Changed Entity and Summary, replacing user_username with targetUser_username.
36+
- [Updated] MATCH-S00449 Powershell Execution Policy Bypass
37+
- Fixed camel case in commandLine field.
38+
39+
### Log Mappers
40+
- [New] Azure Virtual Network Flow logs
41+
- [Updated] Abnormal Security Threats
42+
- [Updated] Cisco ASA 103001 JSON
43+
- [Updated] Cisco ASA 103004 JSON
44+
- [Updated] Cisco ASA 106001 JSON
45+
- [Updated] Cisco ASA 106002 JSON
46+
- [Updated] Cisco ASA 106006 JSON
47+
- [Updated] Cisco ASA 106007 JSON
48+
- [Updated] Cisco ASA 106010 JSON
49+
- [Updated] Cisco ASA 106012 JSON
50+
- [Updated] Cisco ASA 106014 JSON
51+
- [Updated] Cisco ASA 106015 JSON
52+
- [Updated] Cisco ASA 106021 JSON
53+
- [Updated] Cisco ASA 106023 JSON
54+
- [Updated] Cisco ASA 106027 JSON
55+
- [Updated] Cisco ASA 106100 JSON
56+
- [Updated] Cisco ASA 106102-3 JSON
57+
- [Updated] Cisco ASA 109005-8 JSON
58+
- [Updated] Cisco ASA 110002 JSON
59+
- [Updated] Cisco ASA 111008-9 JSON
60+
- [Updated] Cisco ASA 111010 JSON
61+
- [Updated] Cisco ASA 113003 JSON
62+
- [Updated] Cisco ASA 113004 JSON
63+
- [Updated] Cisco ASA 113005 JSON
64+
- [Updated] Cisco ASA 113006 JSON
65+
- [Updated] Cisco ASA 113007 JSON
66+
- [Updated] Cisco ASA 113008 JSON
67+
- [Updated] Cisco ASA 113009 JSON
68+
- [Updated] Cisco ASA 113012-17 JSON
69+
- [Updated] Cisco ASA 113019 JSON
70+
- [Updated] Cisco ASA 113021 JSON
71+
- [Updated] Cisco ASA 113039 JSON
72+
- [Updated] Cisco ASA 209004 JSON
73+
- [Updated] Cisco ASA 302010 JSON
74+
- [Updated] Cisco ASA 302020-1 JSON
75+
- [Updated] Cisco ASA 303002 JSON
76+
- [Updated] Cisco ASA 304001 JSON
77+
- [Updated] Cisco ASA 304002 JSON
78+
- [Updated] Cisco ASA 305011-12 JSON
79+
- [Updated] Cisco ASA 313001 JSON
80+
- [Updated] Cisco ASA 313004 JSON
81+
- [Updated] Cisco ASA 313005 JSON
82+
- [Updated] Cisco ASA 314003 JSON
83+
- [Updated] Cisco ASA 315011 JSON
84+
- [Updated] Cisco ASA 322001 JSON
85+
- [Updated] Cisco ASA 322003 JSON
86+
- [Updated] Cisco ASA 338001-8+338201-4 JSON
87+
- [Updated] Cisco ASA 4000nn JSON
88+
- [Updated] Cisco ASA 402117 JSON
89+
- [Updated] Cisco ASA 402119 JSON
90+
- [Updated] Cisco ASA 405001 JSON
91+
- [Updated] Cisco ASA 405002 JSON
92+
- [Updated] Cisco ASA 406001 JSON
93+
- [Updated] Cisco ASA 406002 JSON
94+
- [Updated] Cisco ASA 419001 JSON
95+
- [Updated] Cisco ASA 419002 JSON
96+
- [Updated] Cisco ASA 500004 JSON
97+
- [Updated] Cisco ASA 502101-2 JSON
98+
- [Updated] Cisco ASA 502103 JSON
99+
- [Updated] Cisco ASA 602303-4 JSON
100+
- [Updated] Cisco ASA 605004-5 JSON
101+
- [Updated] Cisco ASA 609002 JSON
102+
- [Updated] Cisco ASA 611101-2 JSON
103+
- [Updated] Cisco ASA 611103 JSON
104+
- [Updated] Cisco ASA 710002-3 JSON
105+
- [Updated] Cisco ASA 710005 JSON
106+
- [Updated] Cisco ASA 713052 JSON
107+
- [Updated] Cisco ASA 713172 JSON
108+
- [Updated] Cisco ASA 713228 JSON
109+
- [Updated] Cisco ASA 716014-7-8 JSON
110+
- [Updated] Cisco ASA 716038 JSON
111+
- [Updated] Cisco ASA 716039 JSON
112+
- [Updated] Cisco ASA 716059 JSON
113+
- [Updated] Cisco ASA 719022-3 JSON
114+
- [Updated] Cisco ASA 721016-8 JSON
115+
- [Updated] Cisco ASA 722034 JSON
116+
- [Updated] Cisco ASA 722051 JSON
117+
- [Updated] Cisco ASA 722055 JSON
118+
- [Updated] Cisco ASA 733100 JSON
119+
- [Updated] Cisco ASA 751011 JSON
120+
- [Updated] Cisco ASA 751023 JSON
121+
- [Updated] Cisco ASA 751025 JSON
122+
- [Updated] Cisco ASA tcp_udp_sctp_builds JSON
123+
- [Updated] Cisco ASA tcp_udp_sctp_teardowns JSON
124+
- [Updated] Cisco Umbrella DNS Logs
125+
- [Updated] Cisco Umbrella IP Logs
126+
- [Updated] Cisco Umbrella Proxy Logs
127+
- [Updated] SentinelOne Logs - C2C activities
128+
- [Updated] SentinelOne Logs - C2C agents
129+
- [Updated] SentinelOne Logs - C2C alerts
130+
- [Updated] SentinelOne Logs - C2C threats
131+
- [Updated] SentinelOne Logs - C2C users
132+
- [Updated] SentinelOne Logs - Syslog Custom Parser
133+
134+
### Parsers
135+
- [New] /Parsers/System/Microsoft/Azure Virtual Network
136+
- [New] /Parsers/System/SentinelOne/SentinelOne MGMT API
137+
- [Updated] /Parsers/System/Abnormal Security/Abnormal Security
138+
- Updated the parser to support new events.
139+
- [Updated] /Parsers/System/Cisco/Cisco ASA
140+
- Updated regex to fix ASA-6-721016 events.
141+
- [Updated] /Parsers/System/Cisco/Cisco ISE
142+
- Updated parser to drop certain non-actionable logs.
143+
- [Updated] /Parsers/System/Cisco/Cisco Umbrella CSV
144+
- Updated parser to support additional event format variations.
145+
- [Updated] /Parsers/System/Cylance/Cylance Syslog
146+
- Updated parser to support new events.
147+
- [Updated] /Parsers/System/KnowBe4/KnowBe4 KMSAT C2C
148+
- Updated parser to drop phishing test events.

blog-service/2021/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -618,13 +618,13 @@ Update - [Scheduled View](/docs/manage/scheduled-views "Scheduled Views") quer
618618
---
619619
## March 16, 2021 (Alerts)
620620

621-
Update - We have resolved a discrepancy in the notification payload of [Real Time Scheduled Searches](/docs/alerts/scheduled-searches/create-real-time-alert).
621+
Update - We have resolved a discrepancy in the notification payload of Real-Time Scheduled Searches.
622622

623623
Previously, the payload for subsequent real time alerts in a given time range would incrementally report the results and omit the records that were already present in the previous alert.
624624

625625
For example, if the Scheduled Search initially returned 10 records, the first alert notification would contain 10 records in the payload. If the next run contained the same 10 records plus 1 additional, the notification payload would only contain the single new record.
626626

627-
Going forward, we will ensure that the records sent in the notification payload will always contain all the records returned in the Scheduled Search. Following the above example, the next run of the Real Time Scheduled Search would return 11 records. This change ensures that the payload will always match the results of the search in Sumo Logic.
627+
Going forward, we will ensure that the records sent in the notification payload will always contain all the records returned in the Scheduled Search. Following the above example, the next run of the Real-Time Scheduled Search would return 11 records. This change ensures that the payload will always match the results of the search in Sumo Logic.
628628

629629
---
630630
## March 12, 2021-12 (Collection)

blog-service/2024/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -827,7 +827,7 @@ For information, see [Metrics Explorer](/docs/metrics/metrics-queries/metrics-ex
827827

828828
As part of our ongoing evaluation of the Sumo Logic service, we have decided to deprecate [Real-Time Scheduled Searches](/docs/alerts/scheduled-searches/create-real-time-alert). In particular, we will remove the option to create new Real-Time Scheduled Searches on May 15, 2024. Existing Real-Time Scheduled Searches will continue to function until May 15, 2025. We believe many use cases for Real-Time Scheduled Searches can be met by [Monitors](/docs/alerts/monitors/overview). Any remaining use cases can be met by executing these searches at 15m intervals.
829829

830-
In 2020, Sumo Logic released Monitors, which provided a new framework to trigger alerts on both metrics and log data in real time and send notifications. Real-Time Scheduled Searches provided a much more limited version of this functionality. Monitors will continue to be the focus area for our Product and Engineering Teams for features and enhancements regarding alerting. Learn more [here](/docs/alerts/scheduled-searches/deprecation).
830+
In 2020, Sumo Logic released Monitors, which provided a new framework to trigger alerts on both metrics and log data in real time and send notifications. Real-Time Scheduled Searches provided a much more limited version of this functionality. Monitors will continue to be the focus area for our Product and Engineering Teams for features and enhancements regarding alerting.
831831

832832
### April 26, 2024 (Apps)
833833

@@ -1119,4 +1119,4 @@ For more information, see our documentation on how to [monitor credits allocatio
11191119

11201120
#### Index Field
11211121

1122-
We're excited to include the **Index** field as metadata at the bottom of every message row, along with other metadata. This allows you to modify the search query by clicking the index name or view surrounding messages by clicking on the dropdown. [Learn more](/docs/search/get-started-with-search/search-basics/built-in-metadata). <br/><img src={useBaseUrl('img/search/get-started-search/search-page/index-filter.png')} alt="index-filter" width="800" style={{border: '1px solid gray'}}/>
1122+
We're excited to include the **Index** field as metadata at the bottom of every message row, along with other metadata. This allows you to modify the search query by clicking the index name or view surrounding messages by clicking on the dropdown. [Learn more](/docs/search/get-started-with-search/search-basics/built-in-metadata). <br/><img src={useBaseUrl('img/search/get-started-search/search-page/index-filter.png')} alt="index-filter" width="800" style={{border: '1px solid gray'}}/>

blog-service/2025-05-05-alerts.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: Real-Time Scheduled Searches Deprecation (Alerts)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- alerts
6+
- scheduled searches
7+
- monitors
8+
hide_table_of_contents: true
9+
---
10+
11+
The [previously announced](/release-notes-service/2024/12/31/#deprecation-notice---real-time-scheduled-searches) automatic conversion of Real-Time Scheduled Searches to 15-minute scheduled searches will not take place.
12+
13+
- Existing Real-Time Scheduled Searches will continue to operate as-is.
14+
- Creating new Real-Time Scheduled Searches remains disabled (since May 29, 2024).
15+
- For new real-time alerting use cases, we recommend using [Monitors](https://help.sumologic.com/docs/alerts/monitors/overview).
16+
17+
[Learn more](/docs/alerts/scheduled-searches/create-real-time-alert).

blog-service/2025-05-08-manage.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: SCIM Provisioning (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- manage
6+
- saml
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce provisioning for Sumo Logic using SCIM (System for Cross-domain Identity Management). Now you can automatically provision and deprovision users in Sumo Logic with an identity provider like Microsoft Entra ID, Okta, or OneLogin.
13+
14+
[Learn more](/docs/manage/security/scim/).

blog-service/2025-05-12-apps.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: Sysdig Secure (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- sysdig-secure
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to introduce the new Sysdig Secure app for Sumo Logic. With this app, you can gain real-time insights into vulnerabilities, compliance, and threats, making it easier to understand risks, respond quickly, and maintain continuous security and compliance to protect your containerized environments. [Learn more](/docs/integrations/saas-cloud/sysdig-secure).

cid-redirects.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1427,6 +1427,7 @@
14271427
"/APIs/About-the-Search-Job-API": "/docs/api/search-job",
14281428
"/APIs/Search-Job-API/Search-Job-API-Overview": "/docs/api/search-job",
14291429
"/APIs/Search-Job-API/About-the-Search-Job-API": "/docs/api/search-job",
1430+
"/docs/api/search/search-job-api": "/docs/api/search-job",
14301431
"/APIs/Service_Allowlist_Management_API": "/docs/api/service-allowlist",
14311432
"/APIs/Tokens_Management_API": "/docs/api/token-management",
14321433
"/APIs/Tracing_APIs": "/docs/api/tracing",
@@ -1441,6 +1442,7 @@
14411442
"/APIs/Troubleshooting-APIs/Receiving-500-errors-when-using-the-Search-Job-API": "/docs/api/troubleshooting",
14421443
"/APIs/Troubleshooting-APIs/Search-Job-API-Results-into-formatted-JSON-file": "/docs/api/troubleshooting",
14431444
"/APIs/User-Management-API": "/docs/api/user-management",
1445+
"/Archive": "/docs/release-notes",
14441446
"/Archive/Collector_Release_Notes_Archive": "/release-notes-collector",
14451447
"/docs/api/collectors": "/docs/api/collector-management",
14461448
"/docs/api/fields": "/docs/api/field-management",
@@ -1630,6 +1632,7 @@
16301632
"/cid/6024": "/docs/integrations/saas-cloud/vmware-workspace-one",
16311633
"/cid/6025": "/docs/integrations/saas-cloud/cisco-vulnerability-management",
16321634
"/cid/6026": "/docs/integrations/saas-cloud/sumo-collection",
1635+
"/cid/6027": "/docs/integrations/saas-cloud/sysdig-secure",
16331636
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
16341637
"/cid/10113": "/docs/observability/root-cause-explorer",
16351638
"/cid/10116": "/docs/manage/fields",
@@ -1748,6 +1751,8 @@
17481751
"/cid/1047": "/docs/alerts/webhook-connections/datadog",
17491752
"/cid/1048": "/docs/search/behavior-insights/logcompare",
17501753
"/cid/1049": "/docs/get-started",
1754+
"/cid/1234": "/docs/search/search-query-language/search-operators/base64decode",
1755+
"/cid/1235": "/docs/security/threat-intelligence/find-threats",
17511756
"/cid/1050": "/docs/integrations/amazon-aws/s3-audit",
17521757
"/cid/1051": "/docs/integrations/amazon-aws/vpc-flow-logs",
17531758
"/cid/1052": "/docs/integrations/web-servers/apache-tomcat",
@@ -3536,6 +3541,7 @@
35363541
"/Other_Solutions/Work_from_Home_Solution": "/docs/observability/work-from-home-vpn",
35373542
"/Other_Solutions/Work_from_Home_Solution/VPN_Monitoring_Resources_and_Tips": "/docs/observability/work-from-home-vpn",
35383543
"/Other_Solutions/Software_Development_Optimization_Solution": "/docs/observability/sdo",
3544+
"/Release_Archive": "/docs/release-notes",
35393545
"/Release_Archive/Collector_Release_Notes_Archive": "/release-notes-collector",
35403546
"/Release_Archive/Quick-Start-Tutorial(deprecated)": "/docs/get-started",
35413547
"/Release_Archive/Quick-Start-Tutorial(deprecated)/01_Sumo_Logic_Quick_Start_Tutorial": "/",
@@ -3872,6 +3878,7 @@
38723878
"/Dashboards-and-Alerts/Alerts/04-Create-an-Email-Alert": "/docs/alerts/scheduled-searches/create-email-alert",
38733879
"/Dashboards-and-Alerts/Alerts/08-Save-to-Index": "/docs/alerts/scheduled-searches/save-to-index",
38743880
"/Dashboards-and-Alerts/Alerts/03-Create-a-Real-Time-Alert": "/docs/alerts/scheduled-searches/create-real-time-alert",
3881+
"/docs/alerts/scheduled-searches/deprecation": "/docs/alerts/scheduled-searches/create-real-time-alert",
38753882
"/Data_Enrichment": "/docs/send-data/data-enrichment",
38763883
"/Manage/Connections_and_Integrations/Webhook_Connections": "/docs/alerts/webhook-connections",
38773884
"/Manage/Connections_and_Integrations/Webhook_Connections/About_Webhook_Connections": "/docs/alerts/webhook-connections/set-up-webhook-connections",
@@ -4307,6 +4314,7 @@
43074314
"/docs/manage/partitions-data-tiers/manage-indexes-variable-retention": "/docs/manage/partitions/manage-indexes-variable-retention",
43084315
"/docs/manage/partitions-data-tiers/decommission-partition": "/docs/manage/partitions/decommission-partition",
43094316
"/docs/manage/partitions-data-tiers/data-tiers": "/docs/manage/partitions/data-tiers",
4317+
"/docs/manage/partitions/data-tier": "/docs/manage/partitions/data-tiers",
43104318
"/docs/manage/partitions/data-tier/view-partition-details": "/docs/manage/partitions/data-tiers/view-partition-details",
43114319
"/docs/manage/partitions/data-tier/data-tiers-faqs": "/docs/manage/partitions/data-tiers/faq",
43124320
"/docs/manage/partitions-data-tiers/data-tiers-faqs": "/docs/manage/partitions/data-tiers/faq",

docs/alerts/difference-from-scheduled-searches.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Scheduled Searches address two primary use cases:
1616

1717
## Monitors
1818

19-
Monitors are specifically designed for the first use case: alerting. They offer additional capabilities such as auto-resolution and support for multiple notification channels. Any Scheduled Searches created for alerting purposes can be moved to Monitors, including [real-time Scheduled Searches](/docs/alerts/scheduled-searches/create-real-time-alert).
19+
Monitors are specifically designed for the first use case: alerting. They offer additional capabilities such as auto-resolution and support for multiple notification channels. Any Scheduled Searches created for alerting purposes can be moved to Monitors.
2020

2121
## Feature differences
2222

@@ -31,7 +31,7 @@ Beyond the differences in use cases, there are distinct feature differences betw
3131
| Alert disablement | No | Yes*<br/>(Disable is a manual operation. We do not support scheduled disabling of alerts.) |
3232
| API support | Partial*<br/>(Supported via content sync API) | Yes |
3333
| Terraform support | Yes<br/>(see [content API resource](https://registry.terraform.io/providers/SumoLogic/sumologic/latest/docs/resources/content)) | Yes |
34-
| Log Search operator support | Yes*<br/>(Some operators are not supported for real-time alerts) | Yes |
34+
| Log Search operator support | Yes | Yes |
3535
| Outlier-based alerts | Yes | Yes |
3636
| Access control | Object-Level Access Control | Object-Level Access Control (Per request - limited availability) |
3737
| Audit logs for CRUD and system events (e.g., notifications sent, failures) | Yes | Yes |

0 commit comments

Comments
 (0)