Skip to content

Commit e702a86

Browse files
authored
Merge branch 'main' into docs-235-historical-baselines
2 parents 4117023 + e745718 commit e702a86

File tree

131 files changed

+3639
-3162
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+3639
-3162
lines changed

blog-cse/2025-05-23-content.md

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
---
2+
title: May 23, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- Rule update
15+
- New support for CommScope Ruckus SmartZone
16+
- Additional mappers for CrowdStrike FDR, Google G Suite (Workspace), and Windows PowerShell
17+
- Updates for existing mappers for CrowdStrike FDR, Google G Suite (Workspace), and Windows PowerShell
18+
- Added normalizedAction and action fields to Windows PowerShell mappers
19+
- Changes to Windows PowerShell JSON parsing to support additional log formats
20+
21+
Changes are enumerated below.
22+
23+
24+
### Rules
25+
- [Updated] MATCH-S00068 O365 - Users Password Changed
26+
- Updated to use targetUser_username
27+
28+
### Log mappers
29+
- [New] CommScope Ruckus SmartZone Default
30+
- [New] CrowdStrike FDR - DNSRequest
31+
- [New] Google G Suite - login - risky_sensitive_action_allowed
32+
- [New] Google G Suite - login challange
33+
- [New] Windows - Windows PowerShell
34+
- [Updated] CrowdStrike Falcon Host API DetectionSummaryEvent (CNC)
35+
- Added alternate field for threat_name
36+
- [Updated] CrowdStrike Falcon Host API IdpDetectionSummaryEvent (CNC)
37+
- Added alternate field for threat_name
38+
- [Updated] Google G Suite - login - password_change/recovery_info_change
39+
- Added additional mapped fields
40+
- [Updated] Google G Suite - login.login
41+
- Added additional mapped fields
42+
- [Updated] Google G Suite - logout
43+
- Added additional mapped fields
44+
- [Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4103
45+
- [Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4104
46+
- [Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4105
47+
- [Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4106
48+
49+
### Parsers
50+
- [New] /Parsers/System/CommScope/CommScope Ruckus SmartZone
51+
- [Updated] /Parsers/System/Microsoft/Windows PowerShell-JSON

blog-service/2025-05-21-apps.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: Kaltura (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- kaltura
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to introduce the new Kaltura app for Sumo Logic. This app enables you to gain valuable insights into the critical aspects of your platform operations, such as total entries, user activity trends, and event distributions, helping you monitor, secure, and optimize your content management strategies effectively. [Learn more](/docs/integrations/saas-cloud/kaltura).

blog-service/2025-05-29-manage.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Access Key Rotation (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- manage
6+
- organizations
7+
- mssps
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
We're happy to introduce a new way to rotate access keys, as well as a new access keys expiration policy. Together these help to make your account more secure by encouraging regular API key updates.
14+
15+
[Learn more](/docs/manage/security/access-keys/#access-keys-expiration-policy).

cid-redirects.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -440,7 +440,6 @@
440440
"/05Search/Get-Started-with-Search/Visualizations/Group-By-Operator": "/docs/search/search-query-language/search-operators",
441441
"/05Search/Live-Tail": "/docs/search/live-tail",
442442
"/05Search/Live-Tail/About-Live-Tail": "/docs/search/live-tail/about-live-tail",
443-
"/Search": "/docs/search",
444443
"/Search/Anomaly_Detection": "/docs/alerts/monitors/create-monitor",
445444
"/Search/Live-Tail": "/docs/search/live-tail/about-live-tail",
446445
"/Search/Live-Tail/About-Live-Tail": "/docs/search/live-tail/about-live-tail",
@@ -1640,6 +1639,7 @@
16401639
"/cid/6026": "/docs/integrations/saas-cloud/sumo-collection",
16411640
"/cid/6027": "/docs/integrations/saas-cloud/sysdig-secure",
16421641
"/cid/6028": "/docs/integrations/saas-cloud/bitwarden",
1642+
"/cid/6029": "/docs/integrations/saas-cloud/kaltura",
16431643
"/cid/6030": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source",
16441644
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
16451645
"/cid/10113": "/docs/observability/root-cause-explorer",
@@ -3115,6 +3115,8 @@
31153115
"/Manage/Collection/Processing-Rules/Metrics_Include_and_Exclude_Rules": "/docs/send-data/collection/processing-rules/metrics-include-and-exclude-rules",
31163116
"/Manage/Collection/Restart_Collectors": "/docs/send-data/collection/restart-collectors",
31173117
"/Manage/Collectors_and_Sources/Processing_Rules": "/docs/send-data/collection/processing-rules",
3118+
"/Manage/Collectors_and_Sources/Manage_Collectors/Edit_a_Collector": "/docs/send-data/collection/edit-collector",
3119+
"/Manage/Collectors_and_Sources/Manage_Sources": "/docs/send-data/collection",
31183120
"/Manage/Connections-and-Integrations": "/docs/alerts/webhook-connections",
31193121
"/docs/manage/connections-integrations/webhook-connections": "/docs/alerts/webhook-connections",
31203122
"/docs/manage/connections-integrations/webhook-connections/set-up-webhook-connections": "/docs/alerts/webhook-connections/set-up-webhook-connections",
@@ -3308,6 +3310,7 @@
33083310
"/Manage/Security/Access_Keys": "/docs/manage/security/access-keys",
33093311
"/Manage/Security/Access_Keys/Create_Access_Keys": "/docs/manage/security/access-keys",
33103312
"/Manage/Security/Audit_Event_Index": "/docs/manage/security/audit-indexes/audit-event-index",
3313+
"/docs/audit/audit-events": "/docs/manage/security/audit-indexes",
33113314
"/Manage/Security/Audit-Index": "/docs/manage/security/audit-indexes/audit-index",
33123315
"/Manage/Security/Create-an-Allowlist-for-IP-or-CIDR-Addresses": "/docs/manage/security/create-allowlist-ip-cidr-addresses",
33133316
"/Manage/Security/Create-a-Whitelist-for-IP-or-CIDR-Addresses": "/docs/manage/security/create-allowlist-ip-cidr-addresses",
@@ -3581,6 +3584,7 @@
35813584
"/Send_Data/Sources/Script_Source/Cron_Examples_and_Reference": "/docs/send-data/installed-collectors/sources/script-source/cron-examples-reference",
35823585
"/Send_Data/Sources/Source_timestamp_and_time_zone_options/Timestamp_conventions": "/docs/send-data/reference-information/time-reference",
35833586
"/Send_Data/Sources/AWS_S3_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
3587+
"/Send_Data/Sources/Amazon_S3_Audit_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
35843588
"/Send_Data/01_Design_Your_Deployment/Best_Practices:_Good_Source_Category,_Bad_Source_Category": "/docs/send-data/best-practices",
35853589
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon_Web_Services": "/docs/send-data/hosted-collectors/amazon-aws",
35863590
"/03Send-Data/Sources/02Sources-for-Hosted-Collectors/Amazon_Web_Services/AWS_S3_Source": "/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source",
@@ -3873,6 +3877,7 @@
38733877
"/Beta/Installation_Tokens": "/docs/manage/security/installation-tokens",
38743878
"/Beta/Metadata_Ingest_Budgets": "/docs/manage/ingestion-volume/ingest-budgets/daily-volume",
38753879
"/Beta/Metrics-Rules": "/docs/metrics/metric-rules-editor",
3880+
"/Beta/Monitors": "/docs/alerts/monitors",
38763881
"/Beta/Saved_beta_content/Beta---Library/Apps_in_Sumo_Logic/01_Sumo_Logic_Apps": "/docs/integrations",
38773882
"/Beta/SLO_Reliability_Management": "/docs/observability/reliability-management-slo",
38783883
"/Beta/SLO_Reliability_Management/Access_and_Create_SLOs": "/docs/observability/reliability-management-slo",
@@ -3887,6 +3892,7 @@
38873892
"/Dashboards_and_Alerts/Alerts/Create_a_Real_Time_Alert": "/docs/alerts/scheduled-searches/create-real-time-alert",
38883893
"/Dashboards_and_Alerts/Alerts/Save_to_Index": "/docs/alerts/scheduled-searches/save-to-index",
38893894
"/Dashboards-and-Alerts/Alerts": "/docs/alerts",
3895+
"/Dashboards-and-Alerts/Alerts/01-Scheduled-Searches": "/docs/alerts/scheduled-searches",
38903896
"/Dashboards-and-Alerts/Alerts/02-Schedule-a-Search": "/docs/alerts/scheduled-searches/schedule-search",
38913897
"/Dashboards-and-Alerts/Alerts/Create-an-Email-Alert": "/docs/alerts/scheduled-searches/create-email-alert",
38923898
"/Dashboards-and-Alerts/Alerts/04-Create-an-Email-Alert": "/docs/alerts/scheduled-searches/create-email-alert",

docs/api/getting-started.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Sumo Logic has several deployments that are assigned depending on the geographic
8787

8888
Sumo Logic redirects your browser to the correct login URL and also redirects Collectors to the correct endpoint. However, if you're using an API you'll need to manually direct your API client to the correct Sumo Logic API URL.
8989

90-
<table><small>
90+
<table>
9191
<tr>
9292
<td>Deployment</td>
9393
<td>Service Endpoint (login URL)</td>
@@ -183,7 +183,6 @@ https://endpoint9.collection.us2.sumologic.com/</td>
183183
<td>syslog.collection.us2.sumologic.com</td>
184184
<td>https://open-collectors.us2.sumologic.com</td>
185185
</tr>
186-
</small>
187186
</table>
188187

189188
### Which endpoint should I should use?

docs/apm/traces/search-query-language-support-for-traces.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ A Keyword Search Expression defines the scope of data for the query. You need to
3939

4040
In scenarios where users are not familiar with the schema and would like to search across all the fields, `_any` modifier provides a means to search for a specified value from all of the Ingest Time Fields in your data. For example, to search for data with any field that has a value of success you would put `_any=success` in the scope of your query.
4141

42-
Syntax: `_any<value>`
42+
Syntax: `_any=<value>`
4343

4444
The `_any` option is not supported outside of the scope of a query. This is supported for the Security and Tracing tiers.
4545

docs/cse/get-started-with-cloud-siem/intro-for-administrators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ As a Cloud SIEM admin, you'll use both the Sumo Logic UI and the Cloud SIEM UI.
5959

6060
| Sumo Logic UI | Cloud SIEM UI |
6161
| :-- | :-- |
62-
| <ul><li>Add collectors and data sources.</li><li>Write field extraction rues.</li><li>Configure partitions and data tiers</li><li>Forward data to Cloud SIEM.</li><li>Configure RBAC controls.</li></ul> | <ul><li>Configure log and ingest mappings.</li><li>Create custom content, such as rules, match lists, and insights.</li><li>Customize actions, context actions, and other workflows.</li></ul>|
62+
| <ul><li>Add collectors and data sources.</li><li>Write field extraction rules.</li><li>Configure partitions and data tiers</li><li>Forward data to Cloud SIEM.</li><li>Configure RBAC controls.</li></ul> | <ul><li>Configure log and ingest mappings.</li><li>Create custom content, such as rules, match lists, and insights.</li><li>Customize actions, context actions, and other workflows.</li></ul>|
6363

6464
In the Sumo Logic UI, you'll add the collectors and data sources that will be used in Cloud SIEM. You can write field extraction rules, which help parse your logs so they can be better used as records in Cloud SIEM. You can also configure partitions and data tiers in Sumo Logic, and decide which data gets forwarded to Cloud SIEM. Finally, you configure users and roles for both Sumo Logic and Cloud SIEM using the Sumo Logic interface.
6565

docs/integrations/amazon-aws/aws-privatelink.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ With the NLB-created and ALB-registered as a target, requests over AWS PrivateL
3737

3838
Sumo Logic exposes AWS PrivateLink endpoints to different [regions that depend on your Sumo Logic deployment](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security). If you're using the VPC in a different region where the Sumo Logic PrivateLink endpoint service is set up, you need to set up VPC peering. Either way, you need to create an endpoint.
3939

40-
<table><small>
40+
<table>
4141
<tr>
4242
<td><strong>Deployment</strong></td>
4343
<td><strong>Collection Endpoint</strong></td>
@@ -107,7 +107,7 @@ https://endpoint9.collection.us2.sumologic.com</td>
107107
<td>https://open-collectors.us2.sumologic.com</td>
108108
<td>us-west-2</td>
109109
</tr>
110-
</small></table>
110+
</table>
111111

112112

113113
### Create an endpoint to connect with the Sumo Logic endpoint service

docs/integrations/amazon-aws/global-intelligence-cloudtrail-secops.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ This application relies on 45 Scheduled Searches that Save to two different Inde
5151
<details>
5252
<summary>View the list of Scheduled Searches (<strong>click to expand</strong>)</summary>
5353

54-
<table><small>
54+
<table>
5555
<tr>
5656
<td><strong>Folder</strong></td>
5757
<td><strong>Scheduled Search Name (prefixed with gis_benchmarks)</strong></td>
@@ -282,7 +282,7 @@ This application relies on 45 Scheduled Searches that Save to two different Inde
282282
<td>S3_ListBuckets</td>
283283
<td>Counts S3 events related to listing buckets.</td>
284284
</tr>
285-
</small></table>
285+
</table>
286286

287287
* To reduce false positives, the benchmarks and application filter out AWS CloudTrail events from legitimate cloud services including AWS itself and CloudHealth by VMware.
288288
* Security posture requirements may vary between AWS accounts for a given customer. For example, development accounts might have less strict controls than production accounts. The app supports filtering findings by AWS account ID to facilitate AWS account level posture assessment.

docs/integrations/app-development/jfrog-artifactory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ In this step, you configure four local file sources, one for each log source lis
114114
115115
The following suffixes are required. For example, you could use `_sourceCategory=<Foo>/artifactory/console`, but the suffix **artifactory/console** must be used.
116116
117-
<table><small>
117+
<table>
118118
<tr>
119119
<td><strong>Log source</strong></td>
120120
<td><strong>File Path</strong></td>
@@ -139,7 +139,7 @@ The following suffixes are required. For example, you could use `_sourceCategory
139139
<td>Traffic</td>
140140
<td>$JFROG_HOME/&#60;product&#62;/var/log/artifactory-traffic.*.log</td>
141141
<td>artifactory/traffic</td>
142-
</tr></small>
142+
</tr>
143143
</table>
144144
145145
:::note

0 commit comments

Comments
 (0)