Skip to content

Commit d15a1e7

Browse files
authored
Merge branch 'main' into new-pantheon-workflow
2 parents 27c4ad2 + d031d34 commit d15a1e7

File tree

22 files changed

+130
-58
lines changed

22 files changed

+130
-58
lines changed

blog-collector/2025-10-03-otel.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Download a collector using the CDN URL (OpenTelemetry Collector)
3+
image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082
4+
keywords:
5+
- otel-collector
6+
- download-collector
7+
hide_table_of_contents: true
8+
---
9+
10+
We’re pleased to announce a new method for downloading the latest version of our OpenTelemetry collectors for Linux, macOS, and Windows. While the static URL method is still available, you now have the option to use a CDN URL via UI for better performance.
11+
12+
:::info
13+
This change does not affect the UI itself. The download process looks the same, but the underlying URL now uses a CDN to improve reliability and speed.
14+
:::

blog-service/2025-10-01-manage.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Change to SAML Group-to-Role Mapping (Manage)
3+
image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082
4+
keywords:
5+
- saml
6+
- authentication
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
Sumo Logic has introduced a change to the way group-to-role mapping is handled when performing on-demand role provisioning during SAML authentication. Previously, all groups included in a SAML assertion were validated against roles in Sumo Logic. Going forward, only the groups that match existing roles in Sumo Logic will be applied to the authenticating user. Any non-matching groups will be ignored. Only if no roles match with the groups passed in the assertion will an authentication fail.
13+
14+
For more information about SAML configuration for roles provisioning, see [Configure on-demand roles provisioning](/docs/manage/security/saml/set-up-saml/#configure-on-demand-roles-provisioning).

docs/apm/traces/search-query-language-support-for-traces.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ To search your tracing data do the following:
3535

3636
A Keyword Search Expression defines the scope of data for the query. You need to specify `_index=_trace_spans` in the scope to reference your trace data.
3737

38+
Keyword searching is supported for tracing indexes across all fields, unlike other indexes where only the `_raw` field is searched.
39+
3840
#### _any option
3941

4042
In scenarios where users are not familiar with the schema and would like to search across all the fields, `_any` modifier provides a means to search for a specified value from all of the Ingest Time Fields in your data. For example, to search for data with any field that has a value of success you would put `_any=success` in the scope of your query.

docs/cse/records-signals-entities-insights/search-cse-records-in-sumo.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,8 @@ You can search Cloud SIEM fields by keyword, for example:
162162

163163
`_index=sec_record_authentication kerberos`
164164

165+
Keyword searching is supported for security indexes across all fields, unlike other indexes where only the `_raw` field is searched.
166+
165167
### Referencing nested JSON fields
166168

167169
The **Security Record Details** field contains a JSON object with all of the fields from the underlying record or signal. Some of the data is nested in one or more sub-objects, like the `fields` object for record., shown expanded in the screenshot below. The fields object contains the contents of the [fields](/docs/cse/schema/schema-attributes) field in the underlying record, which is all of the unnormalized data from the original log message before it was normalized to the Cloud SIEM schema.

docs/dashboards/dashboard-child-orgs.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,7 @@ If required, toggle off the **Include current variable values in the URL** optio
8181

8282
- Public dashboards are not supported in MSSP environments.
8383
- Scheduled reports are only supported at the parent organization level, not for child orgs.
84+
- Variable values generated by Log Search are populated using the parent organization.
8485
- Metrics and span queries are supported only at the parent organization level, not for child organizations.
8586
- Panels containing metrics or span queries will display no data if you switch from the parent organization to any child organization.
86-
- When exporting a dashboard at the child organization level, panels with metrics or span queries will also show no data.
87+
- When exporting a dashboard at the child organization level, panels with metrics or span queries will also show no data.

docs/get-started/ai-machine-learning.md

Lines changed: 24 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,16 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1616

1717
In this document, you'll learn about Sumo Logic features that leverage artificial intelligence (AI), machine learning (ML), and pattern recognition to support cloud security management, mitigate risks, reduce manual workloads for your team, and streamline incident response and resolution.
1818

19+
## What’s new: Dojo AI for the SOC
20+
21+
Sumo Logic Dojo AI is our agentic AI platform for security teams. It brings specialized agents that reduce manual triage, summarize investigations at the insight level, and help analysts move from reactive to proactive workflows. Dojo AI is built and deployed on AWS and focuses on governed, context-first automation designed for enterprise SOCs.
22+
23+
* **Query Agent**. Translate plain-language questions into efficient Sumo queries to speed exploration and scoping. Works hand in hand with Mobot to improve query quality and outcomes.
24+
* **Summary Agent**. Generate clear, insight-level summaries that help teams understand incidents faster and respond with confidence. Available in Cloud SIEM.
25+
* **Availability**. Dojo AI is available through Sumo Logic and in AWS Marketplace.
26+
27+
For more information, see: [Sumo Logic brings agentic AI into the enterprise security stack with the launch of Dojo AI on Amazon Web Services](https://www.sumologic.com/newsroom/sumo-logic-brings-agentic-ai-into-enterprise-security-stack-with-launch-of-dojo-ai-on-amazon-web-services).
28+
1929
<details>
2030
<summary>What do these terms mean?</summary>
2131

@@ -43,7 +53,7 @@ Through comprehensive discovery, monitoring, diagnosis, recovery, and prevention
4353

4454
### Mobot
4555

46-
Mobot is our AI-based assistant designed that simplifies log analysis by allowing you to ask questions in plain English and provides search suggestions without the need to write log queries. Through plain English queries and automatic log query generation, Mobot simplifies the investigation process, allowing even users without extensive log analysis expertise to pinpoint anomalies and potential threats efficiently.
56+
Mobot is our AI-based assistant designed that simplifies log analysis by allowing you to ask questions in plain language and provides search suggestions without the need to write log queries. Through plain language queries and automatic log query generation, Mobot simplifies the investigation process, allowing even users without extensive log analysis expertise to pinpoint anomalies and potential threats efficiently.
4757

4858
With Mobot, you can effortlessly investigate complex issues without writing intricate log queries manually. Its intuitive interface guides users through each step of the investigation, refining queries based on AI prompts and feedback. This streamlined approach accelerates the identification of security threats, empowering users to make informed decisions rapidly and proactively detect potential risks. [Learn more](/docs/search/mobot).
4959

@@ -81,11 +91,20 @@ Sumo Logic offers seamless integrations with various AI-driven platforms to enab
8191

8292
Our Sumo Logic AI for Security functionality empowers SOC analysts and threat hunters to effectively safeguard their technology stack against evolving threats. By integrating advanced tools for discovery, detection, investigation, response, and protection, we minimize dwell time, reduce false positives, accelerate incident resolution, and proactively prevent future incidents, ensuring robust security and resilience for your cloud, container, and on-prem resources.
8393

94+
### Dojo AI (agentic AI for the SOC)
95+
96+
Dojo AI brings governed, specialized agents into daily SOC workflows so you can cut manual triage, accelerate query-to-answer steps, and get consistent, insight-level investigation summaries. Built and deployed on AWS, Dojo AI focuses on measurable gains in accuracy and response time with a human in the loop.
97+
98+
* **Query Agent**. Ask questions in plain language and get optimized Sumo Logic queries that speed data exploration.
99+
* **Summary Agent**. See AI-generated summaries on insights in Cloud SIEM to understand incidents faster.
100+
* **Get it**. Available from Sumo Logic and in AWS Marketplace.
101+
84102
### Cloud SIEM
85103

86104
#### Insight summary
87105

88-
Sumo Logic's Dojo AI Summary Agent, an agentic AI tool, generates a synopsis for each insight that describes the threat incidents that led to its creation. This helps security teams understand incidents faster and accelerate response time. [Learn more](/docs/cse/get-started-with-cloud-siem/insight-summary/).
106+
Sumo Logic's Dojo AI **Summary** Agent, an agentic AI tool, generates a synopsis for each insight that describes the threat incidents that led to its creation. This helps security teams understand incidents faster and accelerate response time. [Learn more](/docs/cse/get-started-with-cloud-siem/insight-summary/).
107+
89108

90109
#### Rules
91110

@@ -102,15 +121,11 @@ Our Global Intelligence Service apps provide security teams with valuable real-t
102121
## Additional resources
103122

104123
* Guide: [Understanding artificial intelligence for log analytics](https://www.sumologic.com/guides/machine-data-analytics)
105-
* Blogs:
124+
* Blogs:
125+
* [Welcome to Dojo AI: Where AI agents strengthen your SOC](https://www.sumologic.com/blog/welcome-dojo-ai-agents-soc)
106126
* [What are the differences between artificial intelligence, machine learning, deep learning and generative AI?](https://www.sumologic.com/blog/machine-learning-deep-learning)
107127
* [DevSecOps in an AI world requires disruptive log economics](https://www.sumologic.com/blog/devsecops-ai-disruptive-log-economics)
108128
* [Generative AI: The latest example of systems of insight](https://www.sumologic.com/blog/generative-ai-latest-example-systems-of-insight)
109129
* [Harnessing the power of artificial intelligence in log analytics](https://www.sumologic.com/blog/power-ai-log-analytics/)
110130
* [Reduce alert noise, automate incident response and keep coding with AI-driven alerting](https://www.sumologic.com/blog/ai-driven-low-noise-alerts/)
111-
112-
<!--
113-
-Bashyam's blog about how we trained our AI
114-
-Flex Pricing? The more log data ingested, the sharper your analytics and ML/AI insights become. By eliminating ingest limitations and empowering an ML/AI-driven single source of truth for analytics, Flex enables DevOps and DevSecOps teams to troubleshoot faster, accelerate release velocity, and ensure reliable, secure digital experiences.
115-
-Splunk-to-Sumo conversion migration tool?
116-
-->
131+
* News: [Dojo AI launch announcement](https://www.sumologic.com/newsroom/sumo-logic-brings-agentic-ai-into-enterprise-security-stack-with-launch-of-dojo-ai-on-amazon-web-services)

docs/integrations/hosts-operating-systems/opentelemetry/linux-opentelemetry.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ import SetupColl from '../../../reuse/apps/opentelemetry/set-up-collector.md';
7171

7272
<SetupColl/>
7373

74-
<img src='https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Linux-OpenTelemetry/Linux-Collector.png' style={{border:'1px solid gray'}} alt="Collector" />
74+
<img src={useBaseUrl('img/send-data/opentelemetry-collector/linux-install-ui.png')} alt="linux-terminal" style={{border: '1px solid gray'}} width="900"/>
7575

7676
### Step 2: Configure integration
7777

docs/integrations/hosts-operating-systems/opentelemetry/macos-opentelemetry.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ import SetupColl from '../../../reuse/apps/opentelemetry/set-up-collector.md';
4646

4747
<SetupColl/>
4848

49-
<img src='https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Mac-OpenTelemetry/Mac-Collector.png' style={{border:'1px solid gray'}} alt="Collector" />
49+
<img src={useBaseUrl('img/send-data/opentelemetry-collector/macos-install-ui.png')} alt="macos-terminal" style={{border: '1px solid gray'}} width="900"/>
5050

5151
### Step 2: Configure integration
5252

docs/integrations/hosts-operating-systems/opentelemetry/windows-opentelemetry.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ import SetupColl from '../../../reuse/apps/opentelemetry/set-up-collector.md';
5959

6060
<SetupColl/>
6161

62-
<img src='https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Windows-OpenTelemetry/Windows-Collector.png' style={{border:'1px solid gray'}} alt="Collector" />
62+
<img src={useBaseUrl('img/send-data/opentelemetry-collector/windows-install-ui.png')} alt="windows-terminal" style={{border: '1px solid gray'}} width="900"/>
6363

6464
### Step 2: Configure integration
6565

docs/platform-services/automation-service/app-central/integrations/virustotal-v3.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/virustotal.png')} alt="virustotal"
99
width="100"/>
1010

11-
***Version: 1.1
12-
Updated: July 22, 2025***
11+
***Version: 1.3
12+
Updated: October 3, 2025***
1313

1414
Perform threat intelligence evidence gathering with [VirusTotal V3 API](https://docs.virustotal.com/reference/overview).
1515

@@ -70,3 +70,5 @@ For information about VirusTotal v3, see [VirusTotal v3 documentation](https://d
7070
+ It is an updated version of VirusTotal which works with V3 API.
7171
* July 22, 2025
7272
+ Fixed url parsing issue in **URL Reputation** action.
73+
* October 3, 2025
74+
+ Implemented polling mechanism (poll_analysis) in *Scan URL* action to wait until VirusTotal scan status becomes completed.

0 commit comments

Comments
 (0)