Skip to content

Commit e291641

Browse files
committed
Merge branch 'main' into add-otel-timestamp-docs
2 parents 67280cd + 326d485 commit e291641

File tree

11 files changed

+99
-47
lines changed

11 files changed

+99
-47
lines changed

blog-cse/2025-04-25-content.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: April 25, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- Fixes for Threat Intelligence rules to correct match expression syntax for hash and HTTP referrer.
15+
- Parsing and mapping updates for Microsoft Office 365 to improve target user visibility.
16+
17+
## Rules
18+
- [Updated] MATCH-S01009 Threat Intel - HTTP Referrer
19+
- [Updated] MATCH-S01012 Threat Intel - HTTP Referrer Root Domain
20+
- [Updated] MATCH-S00999 Threat Intel - IMPHASH Match
21+
- [Updated] MATCH-S01000 Threat Intel - MD5 Match
22+
- [Updated] MATCH-S01001 Threat Intel - PEHASH Match
23+
- [Updated] MATCH-S01003 Threat Intel - SHA1 Match
24+
- [Updated] MATCH-S01004 Threat Intel - SHA256 Match
25+
- [Updated] MATCH-S01002 Threat Intel - SSDEEP Match
26+
27+
## Log Mappers
28+
- [Updated] Microsoft Office 365 Active Directory Authentication Events
29+
- [Updated] Microsoft Office 365 AzureActiveDirectory Events
30+
31+
## Parsers
32+
- [Updated] /Parsers/System/Microsoft/Office 365

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4307,6 +4307,7 @@
43074307
"/docs/manage/partitions/flex/estimate-and-actual-scan-data": "/docs/manage/partitions/flex/estimate-scan-data",
43084308
"/docs/manage/partitions/flex/flex-pricing-faqs": "/docs/manage/partitions/flex/faq",
43094309
"/docs/manage/partitions/flex/flex-pricing-faq": "/docs/manage/partitions/flex/faq",
4310+
"/docs/platform-services/automation-service/app-central/integrations/exana-open-dns": "/docs/platform-services/automation-service/app-central/integrations",
43104311
"/docs/platform-services/automation-service/app-central/integrations/snowflake": "/docs/platform-services/automation-service/app-central/integrations",
43114312
"/docs/integrations/security-threat-detection/palo-alto-networks-6": "/docs/integrations/security-threat-detection/palo-alto-networks-9",
43124313
"/docs/integrations/security-threat-detection/palo-alto-networks-8":"/docs/integrations/security-threat-detection/palo-alto-networks-9",

docs/integrations/microsoft-azure/azure-container-instances.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Sumo Logic Metrics source is currently in Beta, to participate, contact your Sum
116116
117117
In the Sumo Logic Azure Metrics source configuration,
118118
119-
- Tag the location field in the source with correct Azure resource location value. <br/><img src={useBaseUrl('img/integrations/microsoft-azure/Azure-Storage-Tag-Location.png')} alt="Azure Container Instance Tag Location" style={{border: '1px solid gray'}} width="400" />
119+
- To set up the Azure Metrics source in Sumo Logic, refer to the shared beta documentation.
120120
- Configure namespaces as `Microsoft.ContainerInstance/containerGroups`. <br/><img src={useBaseUrl('img/integrations/microsoft-azure/azure-container-instance-namespaces.png')} alt="Azure Container Instance Namespaces" style={{border: '1px solid gray'}} width="500" />
121121
122122
### Configure logs collection

docs/integrations/microsoft-azure/kubernetes.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -258,9 +258,7 @@ tenant_name={{tenant_name}} subscription_id={{subscription_id}} resource_group={
258258
Sumo Logic Metrics source is currently in Beta, to participate, contact your Sumo Logic account executive.
259259
:::
260260

261-
In the Sumo Logic Azure Metrics source configuration,
262-
263-
- Tag the location field in the source with correct Azure resource location value. <br/><img src={useBaseUrl('img/integrations/microsoft-azure/Azure-Storage-Tag-Location.png')} alt="Azure Container Instance Tag Location" style={{border: '1px solid gray'}} width="400" />
261+
- To set up the Azure Metrics source in Sumo Logic, refer to the shared beta documentation.
264262
- Configure the namespaces as `Microsoft.ContainerService/managedClusters`, `microsoft.kubernetes/connectedClusters`, `microsoft.kubernetesconfiguration/extensions`, and `microsoft.hybridcontainerservice/provisionedClusters`. <br/><img src={useBaseUrl('img/integrations/microsoft-azure/azure-kubernetes-service-namespaces.png')} alt="Azure Container Instance Namespaces" style={{border: '1px solid gray'}} width="500" />
265263

266264
### Collecting logs for the Azure Kubernetes Cluster

docs/integrations/product-list/product-list-a-l.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -217,7 +217,6 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
217217
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/ermes.png')} alt="Thumbnail icon" width="75"/> | [Ermes](https://www.ermes.company/) | Automation integration: [Ermes](/docs/platform-services/automation-service/app-central/integrations/ermes/) |
218218
| <img src={useBaseUrl('img/integrations/misc/eset-logo.png')} alt="Thumbnail icon" width="75"/> | [ESET](https://www.eset.com/us/) | Cloud SIEM integration: [ESET](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/ced86de0-64e4-4e7c-ae25-fb5b3dff3cb8.md) |
219219
| <img src={useBaseUrl('img/integrations/misc/exabeam-logo.svg')} alt="Thumbnail icon" width="75"/> | [Exabeam](https://www.exabeam.com/) | Cloud SIEM integration: [Exabeam](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/9d2d799d-2d6c-4894-a46f-0cce00641bcb.md) |
220-
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/exana-open-dns.png')} alt="Thumbnail icon" width="100"/> | [Exana](https://www.f6s.com/company/exana.io) | Automation integration: [Exana Open DNS](/docs/platform-services/automation-service/app-central/integrations/exana-open-dns/) |
221220
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/exploit-database.png')} alt="Thumbnail icon" width="75"/> | [Exploit Database](https://www.exploit-db.com/) | Automation integration: [Exploit Database](/docs/platform-services/automation-service/app-central/integrations/exploit-database/) |
222221
| <img src={useBaseUrl('img/integrations/misc/extrahop-logo.png')} alt="Thumbnail icon" width="100"/> | [ExtraHop](https://www.extrahop.com/) | Cloud SIEM integration: [Extrahop](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/a8b03e2e-7497-4104-874d-cafd03aeb4c1.md) <br/>Community app: [Sumo Logic for ExtraHop Reveal(x) 360](https://github.com/SumoLogic/sumologic-content/tree/master/ExtraHop%20Reveal(x)%20360) |
223222

docs/platform-services/automation-service/app-central/integrations/exana-open-dns.md

Lines changed: 0 additions & 27 deletions
This file was deleted.

docs/platform-services/automation-service/app-central/integrations/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ All integrations require authentication to communicate between the vendor and Su
1818

1919
## Integrations
2020

21-
Count of available integrations: 337
21+
Count of available integrations: 336
2222

2323
import DocCardList from '@theme/DocCardList';
2424
import {useCurrentSidebarCategory} from '@docusaurus/theme-common';

docs/platform-services/automation-service/app-central/integrations/microsoft-onedrive.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
66

77
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/microsoft-onedrive.png')} alt="microsoft-onedrive" width="100"/>
88

9-
***Version: 1.5
10-
Updated: July 02, 2024***
9+
***Version: 1.6
10+
Updated: April 25, 2025***
1111

1212
Utilize and manipulate files for incident investigation using OneDrive.
1313

@@ -36,4 +36,5 @@ import IntegrationsAuth from '../../../../reuse/integrations-authentication.md';
3636
- Updated ***Upload File*** action with the new Cloud SOAR API; results can now be saved as incident attachments and artifacts.
3737
- Added a new field to the Integration resource named ***Authentication Grant Type***. You can select a value based on the permissions added to your app:
3838
- Password (Delegated Context)
39-
- Client Credentials (Application Context)
39+
- Client Credentials (Application Context)
40+
* April 25, 2025 (v1.6) - Changed required=False for username and password parsers in Integration file.
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
id: copilot-unstructured-logs-beta
3+
title: Sumo Logic Copilot - Unstructured Logs Support (Beta)
4+
description: Streamline your log analysis with Sumo Logic Copilot, our AI-based assistant that simplifies log analysis by letting you ask questions in plain English, even for logs without a well-defined structure.
5+
---
6+
7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
9+
<head>
10+
<meta name="robots" content="noindex" />
11+
</head>
12+
13+
<p><a href="/docs/beta"><span className="beta">Beta</span></a></p>
14+
15+
This feature is in Beta. For more information, contact your Sumo Logic account executive.
16+
17+
Unstructured Logs Support for [Sumo Logic Copilot](/docs/search/copilot), our AI assistant, enables it to understand and provide insights from raw, text-based logs, even if they don't follow a structured format like JSON. This means you can ask questions in plain English and get meaningful results from nearly any log data, without requiring Field Extraction Rules (FERs).
18+
19+
## What's new
20+
21+
Currently, [Copilot works best on structured (JSON) logs](/docs/search/copilot/#compatible-log-formats). With this beta update, Copilot automatically applies parsing logic to unstructured logs, even if no FERs are configured.
22+
23+
At this stage, Copilot prioritizes unstructured logs that are already used in dashboards, allowing it to surface insights from high-value log sources out-of-the-box. This means it won’t interpret all raw logs yet, but we’re actively working to broaden this support beyond dashboards.
24+
25+
* **Broader coverage**. Copilot now parses and generates insights from unstructured log formats, even without FERs, making it useful for environments that include custom or inconsistent log types.
26+
* **Improved usability**. Ask questions in natural language. Copilot interprets your intent and suggests relevant searches, even for raw, non-JSON logs.
27+
* **Performance and reliability**. Response times and suggestion accuracy are consistent with Copilot’s structured log experience.
28+
* **Security and compliance**. The same strict data handling and privacy standards apply. Unstructured Logs Support builds on Copilot’s secure foundation.
29+
30+
<!---No need to call it out until GA
31+
### Powered by Intelliparse mode
32+
Unstructured Logs Support is powered by [Intelliparse mode (Beta)](/docs/search/get-started-with-search/build-search/intelliparse-beta), a new parsing engine that automatically extracts fields from raw logs based on patterns already used in your dashboards. This eliminates the need for manual Field Extraction Rules (FERs) and allows Copilot to surface insights from unstructured logs out-of-the-box. Behind the scenes, Copilot injects a hidden `intelliparse` operator into relevant queries to make unstructured logs easier to work with.
33+
-->
34+
35+
### Common use cases
36+
37+
* **General log exploration**. Ask questions about unstructured logs that are already used in your dashboards, even if they lack predefined fields.
38+
* **Error triage**. Investigate frequently visualized log data to surface patterns and recurring issues in unstructured formats.
39+
* **Security insights**. Detect anomalies or signs of failed logins by querying raw logs already powering security dashboards.
40+
* **Smarter prioritization**. Copilot focuses on unstructured logs that are visualized in dashboards, helping you get meaningful insights from high-value data sources.
41+
42+
## FAQ
43+
44+
**Will Copilot interpret all my logs?**<br/>
45+
Copilot prioritizes unstructured logs that are already used in dashboards. This improves the relevance of insights and helps focus on high-value logs.
46+
47+
**How is this different from structured log support?**<br/>
48+
Structured logs have predefined fields, allowing Copilot to map queries directly. For unstructured logs, Copilot uses AI and parsing techniques to infer structure on the fly.

docs/search/get-started-with-search/build-search/intelliparse.md renamed to docs/search/get-started-with-search/build-search/intelliparse-beta.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
id: intelliparse
2+
id: intelliparse-beta
33
title: Intelliparse Mode (Beta)
44
description: Intelliparse mode extends automatic parsing to unstructured logs, allowing you to search and filter logs even when they don’t follow a consistent format like JSON.
55
---
@@ -14,16 +14,14 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1414

1515
This feature is currently available to select customers. Contact your Sumo Logic account representative to request access.
1616

17-
We've introduced a new parsing mode in the Log Search UI: Intelliparse mode. It extends automatic parsing to unstructured logs, allowing you to search and filter logs even when they don’t follow a consistent format like JSON.
18-
19-
<!-- link to Copilot unstructured logs doc -->
17+
We've introduced a new Log Search parsing mode called Intelliparse. It extends automatic parsing to unstructured logs, allowing you to search and filter logs even when they don’t follow a consistent format like JSON.
2018

2119
## Available parsing modes
2220

2321
You can now choose from three parsing options in the log search UI:
2422

2523
* **Intelliparse (new)**. Combines JSON parsing with automatic parsing of unstructured logs using pre-discovered parsers.
26-
* [**Auto Parse**](/docs/search/get-started-with-search/build-search/dynamic-parsing). JSON blocks within logs are automatically parsed.
24+
* **Auto Parse**. JSON blocks within logs are automatically parsed ([learn more](/docs/search/get-started-with-search/build-search/dynamic-parsing)).
2725
* **Manual**. No automatic parsing applied.
2826

2927
<img src={useBaseUrl('img/search/get-started-search/build-search/log-search-parsing-modes.png')} alt="log-search-parsing-modes.png" style={{border: '1px solid gray'}} width="700"/>
@@ -76,7 +74,6 @@ Copilot uses Intelliparse mode in the background to:
7674

7775
This integration allows Copilot to work with raw, unstructured log data; no setup required on your part.
7876

79-
<!-- When Copilot - Unstructured Logs (Beta) doc has been published, crosslink from there...
80-
Want to learn more about Intelliparse mode? See how it works in Log Search
81-
https://sumologic.atlassian.net/browse/DOCS-752
82-
--->
77+
:::tip
78+
Want to learn more about Intelliparse mode? [See how it works in Log Search](/docs/search/copilot-unstructured-logs-beta).
79+
:::

0 commit comments

Comments
 (0)