Skip to content

Commit e745718

Browse files
authored
Docusaurus 3.8.0 upgrade (#5418)
* Docusaurus 3.8.0 upgrade * Update docs/manage/field-extractions/create-field-extraction-rule.md * Update docs/manage/field-extractions/create-field-extraction-rule.md * fixes * fix example links * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/airtable-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/1password-source.md * fixes * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cybereason-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cybereason-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cybereason-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/qualys-vmdr-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-sql-api.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-sql-api.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-sql-api.md * fixes * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cisco-meraki-source.md * cybereason fix * streamline CI build steps * undo streamline CI build steps
1 parent 0b02ef5 commit e745718

File tree

103 files changed

+3029
-2924
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

103 files changed

+3029
-2924
lines changed

cid-redirects.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -440,7 +440,6 @@
440440
"/05Search/Get-Started-with-Search/Visualizations/Group-By-Operator": "/docs/search/search-query-language/search-operators",
441441
"/05Search/Live-Tail": "/docs/search/live-tail",
442442
"/05Search/Live-Tail/About-Live-Tail": "/docs/search/live-tail/about-live-tail",
443-
"/Search": "/docs/search",
444443
"/Search/Anomaly_Detection": "/docs/alerts/monitors/create-monitor",
445444
"/Search/Live-Tail": "/docs/search/live-tail/about-live-tail",
446445
"/Search/Live-Tail/About-Live-Tail": "/docs/search/live-tail/about-live-tail",

docs/api/getting-started.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Sumo Logic has several deployments that are assigned depending on the geographic
8787

8888
Sumo Logic redirects your browser to the correct login URL and also redirects Collectors to the correct endpoint. However, if you're using an API you'll need to manually direct your API client to the correct Sumo Logic API URL.
8989

90-
<table><small>
90+
<table>
9191
<tr>
9292
<td>Deployment</td>
9393
<td>Service Endpoint (login URL)</td>
@@ -183,7 +183,6 @@ https://endpoint9.collection.us2.sumologic.com/</td>
183183
<td>syslog.collection.us2.sumologic.com</td>
184184
<td>https://open-collectors.us2.sumologic.com</td>
185185
</tr>
186-
</small>
187186
</table>
188187

189188
### Which endpoint should I should use?

docs/integrations/amazon-aws/aws-privatelink.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ With the NLB-created and ALB-registered as a target, requests over AWS PrivateL
3737

3838
Sumo Logic exposes AWS PrivateLink endpoints to different [regions that depend on your Sumo Logic deployment](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security). If you're using the VPC in a different region where the Sumo Logic PrivateLink endpoint service is set up, you need to set up VPC peering. Either way, you need to create an endpoint.
3939

40-
<table><small>
40+
<table>
4141
<tr>
4242
<td><strong>Deployment</strong></td>
4343
<td><strong>Collection Endpoint</strong></td>
@@ -107,7 +107,7 @@ https://endpoint9.collection.us2.sumologic.com</td>
107107
<td>https://open-collectors.us2.sumologic.com</td>
108108
<td>us-west-2</td>
109109
</tr>
110-
</small></table>
110+
</table>
111111

112112

113113
### Create an endpoint to connect with the Sumo Logic endpoint service

docs/integrations/amazon-aws/global-intelligence-cloudtrail-secops.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ This application relies on 45 Scheduled Searches that Save to two different Inde
5151
<details>
5252
<summary>View the list of Scheduled Searches (<strong>click to expand</strong>)</summary>
5353

54-
<table><small>
54+
<table>
5555
<tr>
5656
<td><strong>Folder</strong></td>
5757
<td><strong>Scheduled Search Name (prefixed with gis_benchmarks)</strong></td>
@@ -282,7 +282,7 @@ This application relies on 45 Scheduled Searches that Save to two different Inde
282282
<td>S3_ListBuckets</td>
283283
<td>Counts S3 events related to listing buckets.</td>
284284
</tr>
285-
</small></table>
285+
</table>
286286

287287
* To reduce false positives, the benchmarks and application filter out AWS CloudTrail events from legitimate cloud services including AWS itself and CloudHealth by VMware.
288288
* Security posture requirements may vary between AWS accounts for a given customer. For example, development accounts might have less strict controls than production accounts. The app supports filtering findings by AWS account ID to facilitate AWS account level posture assessment.

docs/integrations/app-development/jfrog-artifactory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ In this step, you configure four local file sources, one for each log source lis
114114
115115
The following suffixes are required. For example, you could use `_sourceCategory=<Foo>/artifactory/console`, but the suffix **artifactory/console** must be used.
116116
117-
<table><small>
117+
<table>
118118
<tr>
119119
<td><strong>Log source</strong></td>
120120
<td><strong>File Path</strong></td>
@@ -139,7 +139,7 @@ The following suffixes are required. For example, you could use `_sourceCategory
139139
<td>Traffic</td>
140140
<td>$JFROG_HOME/&#60;product&#62;/var/log/artifactory-traffic.*.log</td>
141141
<td>artifactory/traffic</td>
142-
</tr></small>
142+
</tr>
143143
</table>
144144
145145
:::note

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ _sourceCategory=cylance "IP Address"
4646

4747
<!-- Per DOCS-643, replace section content with this after `sumo://threat/cs` is replaced by `threatlookup`:
4848
49-
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
49+
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
5050
5151
You can further optimize and enhance these queries for the log and events types being scanned for threats. Use the following guidelines to customize your threat intel queries:
5252
@@ -58,14 +58,14 @@ You can further optimize and enhance these queries for the log and events types
5858
For example, here is the query used for the **Threat Count** panel in the [Threat Intel Quick Analysis - IP](#ip) dashboard:
5959
6060
```
61-
_sourceCategory=<source-category-name>
62-
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
61+
_sourceCategory=<source-category-name>
62+
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
6363
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
6464
| count as ip_count by ip_address
6565
6666
| threatlookup singleIndicator ip_address
6767
68-
// normalize confidence level to a string
68+
// normalize confidence level to a string
6969
| if (_threatlookup.confidence >= 85, "high", if (_threatlookup.confidence >= 50, "medium", if (_threatlookup.confidence >= 15, "low", if (_threatlookup.confidence >= 0, "unverified", "unknown")))) as threat_confidence
7070
7171
// filter for threat confidence
@@ -106,7 +106,7 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
106106
| if (isEmpty(actor), "Unassigned", actor) as Actor
107107
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
108108
| sort by threat_count
109-
```
109+
```
110110
<!-- Per DOCS-643, replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
111111
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
112112
```
@@ -140,7 +140,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
140140
_view=cylance_threat
141141
| count by src_ip
142142
```
143-
143+
144144
## Threat Intel FAQ
145145
146146
#### What is the CrowdStrike Integration for Sumo Logic?
@@ -399,7 +399,7 @@ Once an indicator has been marked with a malicious confidence level, it continue
399399
</tr>
400400
<tr>
401401
<td class="mt-column-width-20" data-th="IOC Type"><br/><strong>Vulnerability</strong></td>
402-
<td class="mt-column-width-80" data-th="Values"><br/>The CVE-XXXX-XXX vulnerability the indicator is associated with (e.g. <a href="https://intelapi.crowdstrike.com/indicator/v1/search/labels?equal=vulnerability/CVE-2012-0158" rel="freelink" title="https://intelapi.crowdstrike.com/indicator/v1/search/labels?equal=vulnerability/CVE-2012-0158">https://intelapi.crowdstrike.com/ind.../CVE-2012-0158</a> )</td>
402+
<td class="mt-column-width-80" data-th="Values"><br/>The CVE-XXXX-XXX vulnerability the indicator is associated with (e.g., https://intelapi.crowdstrike.com/indicator/v1/search/labels?equal=vulnerability/CVE-2012-0158).</td>
403403
</tr>
404404
</tbody>
405405
</table>
@@ -506,4 +506,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
506506
507507
import AppUninstall from '../../reuse/apps/app-uninstall.md';
508508
509-
<AppUninstall/>
509+
<AppUninstall/>

docs/manage/field-extractions/create-field-extraction-rule.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ description: Field Extraction Rules (FER) tell Sumo Logic which fields to parse
55
---
66

77
import Iframe from 'react-iframe';
8+
import FerLimit from '../../reuse/fer-limitations.md';
89

910
You can create a field extraction rule of your own from scratch by following the instructions below. We also provide [data-source-specific templates](/docs/manage/field-extractions/fer-templates/index.md) for AWS, Apache, and more.
1011

@@ -71,9 +72,9 @@ To create a Field Extraction Rule:
7172
:::
7273

7374
:::sumo Best Practices
74-
If you are not using Partitions we recommend using [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) fields like `_sourceCategory`, `_sourceHost` or `_collector` to define the scope.
75+
If you are not using Partitions we recommend using [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) fields like `_sourceCategory`, `_sourceHost` or `_collector` to define the scope.
7576

76-
We recommend creating a separate Partition for your JSON dataset and use that Partition as the scope for run time field extraction. For example, let's say you have AWS CloudTrail logs, and they are stored in `_view=cloudtrail` Partition in Sumo. You can create a Run Time FER with the scope `_view=cloudtrail`. Creating a separate Partition and using it as scope for a run time field extraction ensures that auto parsing logic only applies to necessary Partitions.
77+
We recommend creating a separate Partition for your JSON dataset and use that Partition as the scope for run time field extraction. For example, let's say you have AWS CloudTrail logs, and they are stored in `_view=cloudtrail` Partition in Sumo. You can create a Run Time FER with the scope `_view=cloudtrail`. Creating a separate Partition and using it as scope for a run time field extraction ensures that auto parsing logic only applies to necessary Partitions.
7778
:::
7879

7980
* **Parsed template** (Optional for Ingest Time rules).
@@ -153,6 +154,4 @@ The **multi** and **auto** options are not supported in FERs.
153154

154155
The `parse multi` operator is not supported in FERs.
155156

156-
import FerLimit from '../../reuse/fer-limitations.md';
157-
158-
<FerLimit/> 
157+
<FerLimit/>

docs/release-notes/index.md

Lines changed: 53 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,34 +9,77 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
99
Stay up to date with the latest Sumo Logic enhancements, features, and fixes. Explore the individual release notes pages to see what's new, and consider subscribing to the RSS feeds for automatic updates.
1010

1111
<div className="box-wrapper">
12+
1213
<div className="box smallbox card">
1314
<div className="container">
14-
<a href="/release-notes-service"><img src={useBaseUrl('img/icons/manage.png')} alt="icon" width="40"/><h4>Service<br/><a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45"/></a></h4></a>
15-
<p>Latest features and bug fixes for our apps, alerts, security, search, observability, data collectors, and more.</p>
15+
<a href="/release-notes-service">
16+
<img src={useBaseUrl('img/icons/manage.png')} alt="icon" width="40" />
17+
<h4>Service</h4>
18+
</a>
19+
<a href="https://help.sumologic.com/release-notes-service/rss.xml">
20+
<img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45" />
21+
</a>
22+
<p>Latest features and bug fixes for our apps, alerts, security, search, observability, data collectors, and more.</p>
1623
</div>
1724
</div>
25+
1826
<div className="box smallbox card">
1927
<div className="container">
20-
<a href="/release-notes-cse"><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="icon" width="40"/><h4>Cloud SIEM <br/><a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45"/></a></h4></a>
21-
<p>Information about new and enhanced features, updated content (like rules, log mappers and parsers), bug fixes, and other important announcements for Cloud SIEM.</p>
28+
<a href="/release-notes-cse">
29+
<img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="icon" width="40" />
30+
<h4>Cloud SIEM</h4>
31+
</a>
32+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml">
33+
<img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45" />
34+
</a>
35+
<p>Information about new and enhanced features, updated content (like rules, log mappers and parsers), bug fixes, and other important announcements for Cloud SIEM.</p>
2236
</div>
2337
</div>
38+
2439
<div className="box smallbox card">
2540
<div className="container">
26-
<a href="/release-notes-csoar"><img src={useBaseUrl('img/icons/security/soar-2-color-icon.png')} alt="icon" width="40"/><h4>Cloud SOAR<br/><a href="https://help.sumologic.com/release-notes-csoar/rss.xml"><img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45"/></a></h4></a>
27-
<p>The latest news about CSOAR, like new features, bug fixes, changes to the application, and other important announcements for Cloud SOAR.</p>
41+
<a href="/release-notes-csoar">
42+
<img src={useBaseUrl('img/icons/security/soar-2-color-icon.png')} alt="icon" width="40" />
43+
<h4>Cloud SOAR</h4>
44+
</a>
45+
<a href="https://help.sumologic.com/release-notes-csoar/rss.xml">
46+
<img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45" />
47+
</a>
48+
<p>The latest news about CSOAR, like new features, bug fixes, changes to the application, and other important announcements for Cloud SOAR.</p>
2849
</div>
2950
</div>
51+
3052
<div className="box smallbox card">
3153
<div className="container">
32-
<a href="/release-notes-collector"><img src={useBaseUrl('img/icons/data-collection.png')} alt="icon" width="40"/><h4>Collector <br/><a href="https://help.sumologic.com/release-notes-collector/rss.xml"><img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45"/></a></h4></a>
33-
<p>Latest features and bug fixes for Installed Collectors. To access new features, upgrade using <a href="/docs/send-data/installed-collectors/collector-installation-reference/download-collector-from-static-url">Static URLs</a>, <a href="/docs/send-data/collection/upgrade-collectors">Sumo Logic</a>, <a href="/docs/send-data/collection/upgrade-collectors">Command Line</a>, or <a href="/docs/api/collector-management/upgrade-downgrade-collectors">Collector Management API</a>.</p>
54+
<a href="/release-notes-collector">
55+
<img src={useBaseUrl('img/icons/data-collection.png')} alt="icon" width="40" />
56+
<h4>Collector</h4>
57+
</a>
58+
<a href="https://help.sumologic.com/release-notes-collector/rss.xml">
59+
<img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45" />
60+
</a>
61+
<p>Latest features and bug fixes for Installed Collectors.</p>
62+
<p>To access new features, upgrade using:</p>
63+
<ul>
64+
<li><a href="/docs/send-data/installed-collectors/collector-installation-reference/download-collector-from-static-url">Static URLs</a></li>
65+
<li><a href="/docs/send-data/collection/upgrade-collectors">Sumo Logic</a></li>
66+
<li><a href="/docs/send-data/collection/upgrade-collectors">Command Line</a></li>
67+
<li><a href="/docs/api/collector-management/upgrade-downgrade-collectors">Collector Management API</a></li>
68+
</ul>
3469
</div>
3570
</div>
71+
3672
<div className="box smallbox card">
3773
<div className="container">
38-
<a href="/release-notes-developer"><img src={useBaseUrl('img/icons/cloud/api2.png')} alt="icon" width="40"/><h4>Developer<br/><a href="https://help.sumologic.com/release-notes-developer/rss.xml"><img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45"/></a></h4></a>
39-
<p>New features and changes to our APIs, Collector management, and Live Tail CLI.</p>
74+
<a href="/release-notes-developer">
75+
<img src={useBaseUrl('img/icons/cloud/api2.png')} alt="icon" width="40" />
76+
<h4>Developer</h4>
77+
</a>
78+
<a href="https://help.sumologic.com/release-notes-developer/rss.xml">
79+
<img src={useBaseUrl('img/release-notes/rss.png')} alt="RSS Feed" width="45" />
80+
</a>
81+
<p>New features and changes to our APIs, Collector management, and Live Tail CLI.</p>
4082
</div>
4183
</div>
84+
4285
</div>

0 commit comments

Comments
 (0)