Skip to content

Commit d986a09

Browse files
authored
Merge branch 'main' into otel-usecase
2 parents 8cf517a + 7b93df9 commit d986a09

File tree

17 files changed

+261
-126
lines changed

17 files changed

+261
-126
lines changed

blog-service/2023/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ To learn more, see [Updating Your AWS Observability Stack](/docs/observability/a
106106

107107
We're excited to announce that you can use roles to restrict access to specific data in search indexes. When you create a role, you can select **Index based** filters to allow access to data based on indexes, or you can select **Advanced filter** to define a dataset to allow access based on search criteria. This ensures that users only see the data they are supposed to.
108108

109-
[Learn more](/docs/manage/users-roles/roles/rbac-for-indexes).
109+
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/).
110110

111111
:::note
112112
This feature is in Beta. To participate, contact your Sumo Logic account executive or our Support Team.
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Automox C2C Source (Collection)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- collection
6+
- automox
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to announce the release of our new cloud-to-cloud source for Automox. This source helps you to collect all events objects, audit trail events, and device inventory details from the Automox platform, and ingest them into Sumo Logic for streamlined analysis. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/automox-source).

blog-service/2024-10-14-manage.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Role Based Index Access (Manage)
3+
image: https://www.sumologic.com/img/logo.svg
4+
keywords:
5+
- rbac
6+
- index
7+
- roles
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
We're excited to announce that when you create a role, you can select **Index Access** to restrict access to data in specific indexes. In addition, when you now select **Search Filter**, you can create filtering to restrict access to log analytics, audit, and security data. These enhancements ensure that users only see the data they are supposed to.
16+
17+
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
18+
19+
:::note
20+
These changes are rolling out across deployments incrementally and will be available on all deployments by October 25, 2024.
21+
:::
22+
23+
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role).

cid-redirects.json

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2616,6 +2616,7 @@
26162616
"/cid/19878": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/airtable-source",
26172617
"/cid/19879": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/knowbe4-api-source",
26182618
"/cid/16323": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/druva-source",
2619+
"/cid/17343": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/automox-source",
26192620
"/cid/20172": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cisco-vulnerability-management-source",
26202621
"/cid/19880": "/docs/metrics/metrics-operators/predict",
26212622
"/cid/19881": "/docs/metrics/metrics-operators/accum",
@@ -3638,7 +3639,7 @@
36383639
"/Beta/Cloud-to-Cloud_Integration_Framework/Workday_Source": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/workday-source",
36393640
"/Beta/Dashboard-Data-API": "/docs/api/dashboard",
36403641
"/Beta/Dashboard_(New)": "/docs/dashboards",
3641-
"/Beta/Grant_Access_to_Data_in_Audit_Indexes": "/docs/manage/security/audit-indexes/audit-index-access",
3642+
"/Beta/Grant_Access_to_Data_in_Audit_Indexes": "/docs/manage/users-roles/roles/create-manage-roles",
36423643
"/Beta/Health_Events": "/docs/manage/health-events",
36433644
"/Beta/Ingest_Budgets": "/docs/manage/ingestion-volume/ingest-budgets",
36443645
"/docs/manage/ingestion-volume/ingest-budgets/assign-collector-ingest-budget": "/docs/manage/ingestion-volume/ingest-budgets/daily-volume/assign-collector-ingest-budget",
@@ -3993,7 +3994,9 @@
39933994
"/docs/manage/security/audit-index": "/docs/manage/security/audit-indexes/audit-index",
39943995
"/docs/manage/security/audit-event-index": "/docs/manage/security/audit-indexes/audit-event-index",
39953996
"/docs/manage/security/search-audit-index": "/docs/manage/security/audit-indexes/search-audit-index",
3996-
"/docs/manage/security/audit-index-access": "/docs/manage/security/audit-indexes/audit-index-access",
3997+
"/docs/manage/security/audit-index-access": "/docs/manage/users-roles/roles/create-manage-roles",
3998+
"/docs/manage/security/audit-indexes/audit-index-access/": "/docs/manage/users-roles/roles/create-manage-roles",
3999+
"/docs/manage/users-roles/roles/rbac-for-indexes": "/docs/manage/users-roles/roles/create-manage-roles",
39974000
"/cid/-1": "/",
39984001
"/docs/api/beta": "/docs/api",
39994002
"/docs/api/dashboard-data": "/docs/api/dashboard",

docs/integrations/product-list/product-list-a-l.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
7878
| <img src={useBaseUrl('img/send-data/asana-icon.png')} alt="Thumbnail icon" width="50"/> | [Asana](https://asana.com/) | App: [Asana](/docs/integrations/saas-cloud/asana/) <br/>Collector: [Asana Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/asana-source/) |
7979
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/atlassian-confluence.png')} alt="Thumbnail icon" width="75"/> | [Atlassian](https://www.atlassian.com) | Apps: <br/>- [Jira](/docs/integrations/app-development/jira/) <br/>- [Jira Cloud](/docs/integrations/app-development/jira-cloud/) <br/>- [Jira - OpenTelemetry](/docs/integrations/app-development/opentelemetry/jira-opentelemetry/) <br/>Automation integrations: <br/>- [Atlassian Confluence](/docs/platform-services/automation-service/app-central/integrations/atlassian-confluence/) <br/>- [Atlassian Jira](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira/) <br/>- [Atlassian Jira V2](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira-v2/) <br/>Collector: [Atlassian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source/)<br/>Cloud SIEM integration: [Atlassian](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/4d40dc7a-b95e-476c-9fb0-7163ea7fd335.md) <br/>Webhooks: <br/>- [Webhook Connection for Jira Cloud](/docs/alerts/webhook-connections/jira-cloud/) <br/>- [Webhook Connection for Jira Server](/docs/alerts/webhook-connections/jira-server/) <br/>- [Webhook Connection for Jira Service Desk](/docs/alerts/webhook-connections/jira-service-desk/) |
8080
| <img src={useBaseUrl('img/integrations/misc/automation-anywhere-logo.png')} alt="Thumbnail icon" width="50"/> | [Automation Anywhere](https://www.automationanywhere.com/) | Partner integration: [Automation Anywhere](https://docs.automationanywhere.com/bundle/enterprise-v2019/page/enterprise-cloud/topics/control-room/administration/settings/setting-up-sumo-logic.html) |
81-
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/automox.png')} alt="Thumbnail icon" width="100"/> | [Automox](https://www.automox.com/) | Automation integration: [Automox](/docs/platform-services/automation-service/app-central/integrations/automox/) |
81+
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/automox.png')} alt="Thumbnail icon" width="100"/> | [Automox](https://www.automox.com/) | Automation integration: [Automox](/docs/platform-services/automation-service/app-central/integrations/automox/) <br/>Collector: [Automox Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/automox-source) |
8282
| <img src={useBaseUrl('img/integrations/saml/auth0.png')} alt="Thumbnail icon" width="50"/> | [Auth0](https://auth0.com/) | App: [Auth0](/docs/integrations/saml/auth0/) <br/>Cloud SIEM integration: [Auth0](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/f002a19c-876e-4a33-8be0-ed3b922d19bc.md) <br/>Collector: [Auth0 - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0/) <br/>Partner integration: [Auth0](https://auth0.com/docs/customize/log-streams/sumo-logic-dashboard) |
8383
| <img src={useBaseUrl('https://upload.wikimedia.org/wikipedia/commons/9/93/Amazon_Web_Services_Logo.svg')} alt="Thumbnail icon" width="50"/> | [AWS](https://aws.amazon.com/) | Apps: <br/>- [Cloud Infrastructure Security for AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws) <br/>- [Threat Intel for AWS](/docs/integrations/amazon-aws/threat-intel/) <br/>Cloud SIEM integration: [Amazon AWS - Trusted Advisor](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/products/99d21ed4-c3fb-452e-8e4a-a10ff4b94fe0.md) <br/>Community app: [Sumo Logic for AWS Health Events](https://github.com/SumoLogic/sumologic-content/tree/master/Amazon_Web_Services/AWS_Health) <br/>Also see [AWS Observability](/docs/observability/aws/). |
8484
| <img src={useBaseUrl('img/integrations/amazon-aws/aws-amplify-logo.png')} alt="Thumbnail icon" width="50"/> | [AWS Amplify](https://aws.amazon.com/amplify/) | App: [AWS Amplify](/docs/integrations/amazon-aws/aws-amplify/) |

docs/manage/security/audit-indexes/audit-index-access.md

Lines changed: 0 additions & 32 deletions
This file was deleted.

docs/manage/users-roles/roles/construct-search-filter-for-role.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ description: Construct a role search filter to control what log data users with
66

77
import useBaseUrl from '@docusaurus/useBaseUrl';
88

9-
This page describes how to define an advanced search filter for a role. These instructions apply to the **Search filter** option in Step 6 of the [Create a role](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role) procedure.
109

10+
This page describes how to define search filters for a role. These instructions apply to the **Search Filter** option in Step 6 of the [Create a role](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role) procedure.
1111

1212
## Understanding search filters
1313

@@ -43,13 +43,13 @@ The examples above are simple: they involve a single role, and hence a single ro
4343

4444
Typically however, a Sumo user will have multiple roles. If a user has multiple roles, Sumo `OR`s the several role filters and prepends that expression to the user’s queries with an `AND`, as discussed in [Multiple role filters and filter precedence](#multiple-role-filters-and-filter-precedence).
4545

46-
### Search filter basics
46+
## Search filter basics
4747

4848
The sections below list search filter limitations, and describe how you can use keywords, wildcards, metadata, and logical operators in filters. 
4949

5050
The explanations of the behavior of each example filter assume that no other role filters apply. In practice, you will likely assign multiple roles to users. After you understand the basics of how role filters work, see [Multiple role filters and filter precedence](#multiple-role-filters-and-filter-precedence).
5151

52-
#### Search filter limitations
52+
### Search filter limitations
5353

5454
* Role filters should include only keyword expressions or built-in metadata field expressions using these fields: `_sourcecategory`, `_collector`, `_source`, `_sourcename`, `_sourcehost`.
5555
* Using `_index` or `_view` in a role filter scope is not supported.
@@ -61,7 +61,7 @@ The explanations of the behavior of each example filter assume that no other rol
6161

6262
For limitations related to the use of Scheduled Views or Partitions in a search filter, refer to [Partitions](/docs/manage/partitions/#limitations) and [Scheduled Views](/docs/manage/scheduled-views).
6363

64-
#### Using metadata in a search filter
64+
### Using metadata in a search filter
6565

6666
You can use metadata fields in a role search filter. The following search filter grants access to log data from a Collector named “HR_Tools”, and no other data:
6767

@@ -75,7 +75,7 @@ When a user with that role filter runs a query, Sumo prepends the filter to the
7575
_collector=HR_Tools AND <user-query>
7676
```
7777

78-
#### Using AND and OR in a search filter
78+
### Using AND and OR in a search filter
7979

8080
You can use AND and OR in a search filter. For example, this role filter uses OR to grant access to log data from two source categories:
8181

@@ -101,7 +101,7 @@ When a user with that role filter runs a query, Sumo prepends the filter to the
101101
(_collector=HR_Tools AND _sourceCategory=insurance) AND <user-query>
102102
```
103103

104-
#### Using keywords in a search filter 
104+
### Using keywords in a search filter 
105105

106106
You can include a string you want to search for in a role search filter. This role filter grants access to logs from the collector named “HR_Tools” that contain the string “enrollment”: 
107107

@@ -115,7 +115,7 @@ When a user with that role filter runs a query, Sumo runs it like this:
115115
(_collector=HR_Tools AND enrollment) AND <user-query>
116116
```
117117

118-
#### Using wildcards in a search filter 
118+
### Using wildcards in a search filter 
119119

120120
You can use an asterisk (\*) as a wildcard in a role search filter. This role filter grants access to logs from all collectors whose name begins with “HR”:
121121

@@ -141,7 +141,7 @@ When a user with that role filter runs a query, Sumo runs it like this:
141141
(_collector=HR* AND violation) AND <user-query>
142142
```
143143

144-
#### Using ! as a NOT in a search filter
144+
### Using ! as a NOT in a search filter
145145

146146
You can use an exclamation point character (!) in a role search filter to restrict, rather than allow, access. For example, this filter:
147147

@@ -161,13 +161,13 @@ When a user with that role filter runs a query, Sumo runs it like this:
161161
(!_sourceHost=humanresources* AND !_sourceName=*finance* AND !_sourceCategory=*secret*) AND <your-query>
162162
```
163163

164-
### Multiple role filters and filter precedence
164+
## Multiple role filters and filter precedence
165165

166166
When a user is assigned to multiple Sumo roles, Sumo combines the role filters from each of the roles using a logical OR to come up with the combined role filter.
167167

168168
When multiple roles filters are applied to a query, the least restrictive filter takes precedence. That this rule doesn’t apply if any of the role filters applied to a query is simply blank, which effectively grants access to all data, and would be the least restrictive filter. If the combined search filters applied to a query includes filters that are blank, the blank search filter is ignored and the next least restrictive filter takes precedence. So, if you actually want to grant a role access to all data, set the search filter to an asterisk (`*`). A search filter that is configured in that fashion will take precedence when combined with more restrictive search filters.
169169

170-
#### Example 1
170+
### Example 1
171171

172172
Assume the following role filters.
173173

@@ -189,7 +189,7 @@ AND <your-query>
189189

190190
The combined filters enable access to log data whose `_source` tag is “GCP Audit” and `_collector` tag is “GCP”, and to any log data whose `_sourceCategory` tag begins with “Vx”.
191191

192-
#### Example 2
192+
### Example 2
193193

194194
Assume the following role filters.
195195

@@ -210,7 +210,7 @@ When a user with Roles A and B runs a query, Sumo combines the two filters with
210210

211211
**The least restrictive of the role filters takes precedence**. So, although Role A effectively restricts results to log data that matches `_collector=fee*`, Role B allows grants access to all collectors, except for those that match `_collector=fi*`. So, Role B takes precedence and Role A has no effect.
212212

213-
#### Example 3 
213+
### Example 3 
214214

215215
Assume the following role filters.
216216

@@ -232,7 +232,7 @@ When a user with Roles A and B runs a query, Sumo combines the two filters with
232232

233233
**The least restrictive of the role filters takes precedence.** Role A alone grants access to a log data from a single  source category, “analytics-lab”.  Role B grants access to log data to any source category that starts with “analytics”. Since the least restrictive filter takes precedence, data tagged `_sourceCategory=analyticsLong` could be returned in addition to data tagged `_sourceCategory=analytics-lab`.
234234

235-
#### Example 4
235+
### Example 4
236236

237237
Assume the following role filters.
238238

@@ -253,7 +253,7 @@ When a user with Roles A and B runs a query, Sumo combines the two filters with
253253

254254
Role B is the least restrictive. Users with the combined role filter will be able to view any log data whose  `_sourceCategory` does not contain the string “shoguns”, regardless of the value of the `_collector` tag.
255255

256-
#### Example 5
256+
### Example 5
257257

258258
Assume the following role filters.
259259

0 commit comments

Comments
 (0)