Skip to content

Commit d7b6a69

Browse files
Merge branch 'main' into oracle-otel-update
2 parents b915a80 + b348bea commit d7b6a69

File tree

42 files changed

+572
-100
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+572
-100
lines changed

blog-cse/2025-07-09-content.md

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
title: July 09, 2025 - Content Release
3+
image: https://help.sumologic.com/img/reuse/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
hide_table_of_contents: true
8+
---
9+
10+
This release includes:
11+
- Rule bug fix.
12+
- New device support for Aruba WAP, Oracle Cloud Infrastructure, and Mindpoint SurePass.
13+
- Updated mapper alternate values for Cloudflare Logpush.
14+
15+
### Rules
16+
- [Updated] LEGACY-S00005 Possible Black Energy Command and Control
17+
- Corrected rule expression for rootDomain to use correct schema field name.
18+
19+
### Log Mappers
20+
- [New] Aruba WAP
21+
- [New] Oracle Cloud Infrastructure Audit Catch All
22+
- [New] Surepass Authentication
23+
- [New] Surepass Cath All
24+
- [New] Surepass Network Event
25+
- [Updated] Cloudflare - Logpush
26+
27+
### Parsers
28+
- [New] /Parsers/System/HP/Aruba WAP
29+
- [New] /Parsers/System/Mindpoint Group/Mindpoint SurePass
30+
- [New] /Parsers/System/Oracle/Oracle Cloud Infrastructure

blog-service/2024/12-31.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -280,9 +280,9 @@ Explore our technical documentation [here](/docs/integrations/saas-cloud/kandji/
280280

281281
### November 05, 2024 (Alerts)
282282

283-
#### AI-Driven Alerts for Metrics Anomalies
283+
#### Alerts for Metrics Anomalies
284284

285-
We're excited to announce the general availability of AI-driven alerts for metrics anomalies, extending our AI-driven alerting capabilities to include metrics-based monitors. This new feature aims to reduce alert fatigue and accelerate incident resolution through the use of automated playbooks. [Learn more](/docs/alerts/monitors/create-monitor).
285+
We're excited to announce the general availability of alerts for metrics anomalies, extending our alerting capabilities to include metrics-based monitors. This new feature aims to reduce alert fatigue and accelerate incident resolution through the use of automated playbooks. [Learn more](/docs/alerts/monitors/create-monitor).
286286

287287
##### Key features
288288

@@ -373,9 +373,9 @@ We’ve added the **Convert to Anomaly** option, allowing you to convert outlier
373373

374374
### October 22, 2024 (Alerts)
375375

376-
#### AI-Driven Alerts for Metrics Anomalies
376+
#### Alerts for Metrics Anomalies
377377

378-
We're excited to announce the preview of AI-driven alerts for metrics anomalies, extending our AI-driven alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
378+
We're excited to announce the preview of alerts for metrics anomalies, extending our alerting to metrics-based monitors. This preview release helps reduce alert fatigue and enables faster incident resolution with automated playbooks.
379379

380380
##### Key Features
381381

@@ -957,7 +957,7 @@ Learn more [here](/docs/integrations/amazon-aws/api-gateway/).
957957

958958
### March 12, 2024 (Alerts)
959959

960-
#### Monitor Enhancements - AI-Driven Alerting
960+
#### Monitor Enhancements - Anomaly Alerting
961961

962962
We're happy to announce two new monitoring features that allow you to generate alerts that notify you of suspicious behavior and automatically run playbooks to address it.
963963

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: Vectra Source (Collection)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- c2c
6+
- vectra-source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce the release of our new cloud-to-cloud source for Vectra. This source aims to collect the threat detections from the Vectra platform and send them to Sumo Logic for streamlined analysis. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source).
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: Zimperium MTD Source (Collection)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- c2c
6+
- zimperium-mtd-source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce the release of our new cloud-to-cloud source for Zimperium MTD. This source aims to collect the device logs from the Zimperium API and send it to Sumo Logic for streamlined analysis. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zimperium-mtd-source).

cid-redirects.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1679,6 +1679,7 @@
16791679
"/cid/10128": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vmware-workspace-one-source",
16801680
"/cid/10129": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/dragos-source",
16811681
"/cid/10731": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/akamai-cpc-source",
1682+
"/cid/10732": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zimperium-mtd-source",
16821683
"/cid/10135": "/docs/manage/manage-subscription/create-and-manage-orgs/manage-org-settings",
16831684
"/cid/10136": "/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-logs-source",
16841685
"/cid/10234": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trellix-mvisio-epo-source",
@@ -2899,6 +2900,7 @@
28992900
"/cid/21035": "/docs/integrations/google/cloud-traffic-director",
29002901
"/cid/21036": "/docs/integrations/google/cloud-vertex-ai",
29012902
"/cid/21037": "/docs/integrations/google/cloud-vpn",
2903+
"/cid/21039": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source",
29022904
"/cid/21097": "/docs/integrations/saas-cloud/confluent-cloud",
29032905
"/cid/21040": "/docs/manage/manage-subscription/create-and-manage-orgs/create-manage-orgs-service-providers",
29042906
"/cid/21038": "/docs/integrations/containers-orchestration/vmware-tanzu-application-service",
@@ -3909,6 +3911,7 @@
39093911
"/Beta/SLO_Reliability_Management/Access_and_Create_SLOs": "/docs/observability/reliability-management-slo",
39103912
"/Beta/Workday/Collect_Logs_for_the_Workday_App": "/docs/integrations/saas-cloud/workday",
39113913
"/docs/beta/search-log-level": "/docs/search/get-started-with-search/search-page/log-level",
3914+
"/docs/search/get-started-with-search/search-page/event-analytics/": "/docs/search/get-started-with-search/search-page",
39123915
"/Cloud_SIEM_Enterprise/Entities_and_Insights": "/docs/cse/records-signals-entities-insights",
39133916
"/Cloud_SIEM_Enterprise/Entities_and_Insights/Insight_Generation_Process": "/docs/cse/records-signals-entities-insights",
39143917
"/Cloud_SIEM_Enterprise/Entities_and_Insights/Global_Intelligence_for_Security_Insights": "/docs/cse/records-signals-entities-insights/global-intelligence-security-insights",

docs/alerts/monitors/create-monitor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import Iframe from 'react-iframe';
99

1010
This guide will walk you through the steps of creating a monitor in Sumo Logic, from setting up trigger conditions to configuring advanced settings, notifications, and playbooks.
1111

12-
Our AI-driven alerts use machine learning to analyze historical data, establish baselines, detect significant deviations, and filter out irrelevant alerts to reduce alert fatigue and help teams focus on critical issues. These capabilities apply to both logs and metrics, providing a comprehensive monitoring solution. With seasonality detection and customizable anomaly clustering, false positives are minimized, enabling faster issue resolution.
12+
Our alerts use machine learning to analyze historical data, establish baselines, detect significant deviations, and filter out irrelevant alerts to reduce alert fatigue and help teams focus on critical issues. These capabilities apply to both logs and metrics, providing a comprehensive monitoring solution. With seasonality detection and customizable anomaly clustering, false positives are minimized, enabling faster issue resolution.
1313

1414
Integrated playbooks automate incident response by gathering diagnostics, notifying teams, triggering recovery actions, and streamlining workflows to improve response times. You can link playbooks to monitors to automate tasks such as restarting services or scaling infrastructure, ensuring swift and efficient anomaly resolution.
1515

@@ -88,7 +88,7 @@ Set specific threshold conditions for well-defined KPIs with constant thresholds
8888

8989
#### Anomaly
9090

91-
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This *AI-driven alerting* system uses historical data to minimize false positives and alerts you to deviations.
91+
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This alerting system uses historical data to minimize false positives and alerts you to deviations.
9292

9393
* **Model-driven detection**. Machine learning models create accurate baselines, eliminating guesswork and noise.
9494
* **AutoML**. The system self-tunes with seasonality detection, minimizing user intervention and adjusting for recurring patterns to reduce false positives.
@@ -98,7 +98,7 @@ Leverage machine learning to identify unusual behavior and suspicious patterns b
9898
* **Customizable detection**. Use advanced rules like "Cluster anomalies" to detect multiple data points exceeding thresholds within a set timeframe.
9999

100100
:::sumo Micro Lesson
101-
Learn about AI-driven alerting.
101+
Watch this micro lesson to learn about anomaly monitors.
102102

103103
<Iframe url="https://fast.wistia.net/embed/iframe/8z9b2zqtc3?web_component=true&seo=true&videoFoam=false"
104104
width="854px"

docs/alerts/scheduled-searches/create-real-time-alert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Monitors offer significant improvements over Real-Time Scheduled Searches, inclu
2929
* [Multiple trigger conditions](/docs/alerts/monitors/create-monitor/#step-1-set-trigger-conditions) (Critical, Warning, Missing Data)
3030
* [Alert grouping](/docs/alerts/monitors/alert-grouping/)
3131
* [Playbook support](/docs/alerts/monitors/alert-response/#alert-details)
32-
* [AI-driven alerting](/release-notes-service/2024/12/31/#march-12-2024-alerts)
32+
* [Anomaly alerting](/release-notes-service/2024/12/31/#march-12-2024-alerts)
3333
* [Integration with the Alert Response page](/docs/alerts/monitors/alert-response/)
3434

3535
Monitors are the strategic focus for our future alerting development and enhancements.

docs/cse/rules/cse-rules-syntax.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -644,7 +644,7 @@ When an entity is processed by a rule using the `hasThreatMatch` function and is
644644

645645
Parameters:
646646
* **`<fields>`**. A list of comma-separated [field names](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/schema/full_schema.md). At least one field name is required.
647-
* **`<filters>`**. A logical expression using [indicator attributes](/docs/security/threat-intelligence/upload-formats/#normalized-json-format). Allowed in the filtering are parentheses `()`; `OR` and `AND` boolean operators; and comparison operators `=`, `<`, `>`, `=<`, `=>`, `!=`. <br/>You can filter on the following indicator attributes:
647+
* **`<filters>`**. A logical expression using [indicator attributes](/docs/security/threat-intelligence/upload-formats/#normalized-json-format). Allowed in the filtering are parentheses `()`; `OR` and `AND` boolean operators; and comparison operators `=`, `<`, `>`, `=<`, `>=`, `!=`. <br/>You can filter on the following indicator attributes:
648648
* `actors`. An identified threat actor such as an individual, organization, or group.
649649
* `confidence` Confidence that the data represents a valid threat, where 100 is highest. Malicious confidence scores from different sources are normalized and mapped to a 0-100 numerical value.
650650
* `id`. ID of the indicator.

docs/get-started/ai-machine-learning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ LogReduce&reg; utilizes AI-driven algorithms to cluster log messages based on st
5555

5656
LogCompare simplifies log analysis by enabling easy comparison of log data from different time periods to detect changes or anomalies, facilitating troubleshooting and root cause discovery. By automatically running delta analysis, LogCompare streamlines the process, allowing users to identify significant alterations in log patterns efficiently. Utilizing baseline and target queries, LogCompare clusters logs into patterns and compares them based on the significance of change, providing insights into deviations over time. With intuitive actions like promoting, demoting, and splitting signatures, users can refine their analysis and focus on relevant patterns, ultimately enhancing decision-making and threat detection capabilities. Additionally, LogCompare supports alerts and scheduled searches to notify users of new signatures or significant changes, ensuring proactive monitoring and response to evolving log data. [Learn more](/docs/search/behavior-insights/logcompare).
5757

58-
### AI-driven Alerts
58+
### AI in alerting
5959

6060
#### Anomaly Detection
6161

docs/integrations/microsoft-azure/azure-virtual-network.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,12 @@ import AppUninstall from '../../reuse/apps/app-uninstall.md';
291291

292292
## Troubleshooting
293293

294+
### App installation failed - Content Error - Invalid Field Extraction Rule
295+
296+
This error is encountered if the app which is being installed is trying to create an FER by a name which already exists as an FER in the org. This FER could have been created manually or through some other app.
297+
298+
To resolve the problem, rename or delete the existing FER and try reinstalling the app.
299+
294300
### HTTP Logs and Metrics Source used by Azure Functions
295301

296302
To troubleshoot metrics collection, follow the instructions in [Collect Metrics from Azure Monitor > Troubleshooting metrics collection](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#troubleshooting-metrics-collection).

0 commit comments

Comments
 (0)