Skip to content

Commit efd15a5

Browse files
authored
Merge branch 'main' into C3M-Library-content-GA
2 parents 155fcd6 + 3e1ec7a commit efd15a5

File tree

31 files changed

+473
-147
lines changed

31 files changed

+473
-147
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Before submitting an issue or pull request, we recommend reviewing the sections
3838

3939
To contribute to Sumo Docs, ensure you have the following tools installed:
4040

41-
- [Node.js](https://nodejs.org/en/download/) version 18 or higher
41+
- [Node.js](https://nodejs.org/en/download/) version 20 or higher
4242
- [Yarn](https://yarnpkg.com/en/), installable via [Homebrew](https://brew.sh/) (`brew install yarn`)
4343

4444
## Installation

blog-collector/2025-10-13-installed.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
88

99
Sumo Logic has been using Java 8 for its Installed Collectors until now. However, with Java 8 reaching its end of public updates in January 2019, and with newer Java versions offering significant improvements in both performance and security, we are upgrading our Installed Collectors to Java 17. This upgrade will provide enhanced functionality, better security patches, and overall improved system efficiency.
1010

11-
If you're running a collector with your own custom JRE, ensure the JRE version is 17 or higher. If not, upgrade to Java 17 or a more recent version. [Learn more](/docs/send-data/collection/upgrade-collectors/#upgradecollectors-to-the-latest-build).
11+
Starting January 31, 2026, Sumo Logic will no longer support the collectors using Java Runtime Environment (JRE) versions older than 17. To ensure continued compatibility and support, upgrade your collectors to JRE 17 or later before this date. [Learn more](/docs/send-data/collection/upgrade-collectors/#upgradecollectors-to-the-latest-build).

blog-service/2025-10-14-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Security - Microsoft Defender for Cloud Apps (Apps)
3-
image: https://help.sumologic.com/img/reuse/rss-image.jpg
3+
image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082
44
keywords:
55
- apps
66
- azure
@@ -11,4 +11,4 @@ hide_table_of_contents: true
1111

1212
import useBaseUrl from '@docusaurus/useBaseUrl';
1313

14-
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Cloud Apps. This app enhances Azure security with centralized monitoring, proactive threat detection, and rapid incident response. It also offers interactive dashboards for tracking user activity and access, enabling faster threat management and stronger protection of cloud assets. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps/).
14+
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Cloud Apps. This app enhances Azure security with centralized monitoring, proactive threat detection, and rapid incident response. It also offers interactive dashboards for tracking user activity and access, enabling faster threat management and stronger protection of cloud assets. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps/).
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Cloud Syslog Source Certificate Fully Transitioned to ACM (Collection)
3+
image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082
4+
keywords:
5+
- certificates
6+
- Cloud Syslog Source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce that Sumo Logic has fully transitioned to AWS Certificate Manager (ACM) certificates for Transport Layer Security (TLS) communication between your cloud syslog sources and Sumo Logic.
13+
14+
In [a previous release note](/release-notes-service/2025/08/01/collection/), we announced that we are transitioning from DigiCert to ACM certificates.
15+
16+
This change provides the following benefits:
17+
* **Automated certificate renewal and deployment**. ACM eliminates the need for future manual renewals, reducing administrative overhead.
18+
* **Simplified infrastructure management for AWS customers**. ACM is deeply integrated into the AWS ecosystem, streamlining your overall infrastructure management. Because Sumo Logic is also on AWS, using ACM provides a seamless experience.
19+
20+
If you use cloud syslog sources to send data to Sumo Logic, download and configure the ACM certificate on your system. For more information and setup instructions, see:
21+
* [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source/)
22+
* [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog)
23+
* [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/)
24+
* [Collect Logs for SentinelOne](/docs/send-data/collect-from-other-data-sources/collect-logs-sentinelone/)
25+
* [Acquia](/docs/integrations/saas-cloud/acquia/#step-2-configure-a-source)

blog-service/2025-10-17-apps.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Azure Security - Microsoft Entra ID Protection (Apps)
3+
image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082
4+
keywords:
5+
- apps
6+
- azure
7+
- microsoft
8+
- azure-security-microsoft-entra-id-protection
9+
hide_table_of_contents: true
10+
---
11+
12+
import useBaseUrl from '@docusaurus/useBaseUrl';
13+
14+
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Entra ID Protection. This app enhances identity security across Azure environments by proactively detecting, investigating, and mitigating identity-related risks. This integration helps you safeguard user accounts and credentials, ensuring secure access to critical cloud resources. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-entra-id-protection/).

cid-redirects.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1525,6 +1525,7 @@
15251525
"/Traces/01Getting_Started_with_Transaction_Tracing/01Instrument_your_application_with_OpenTelemetry": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation",
15261526
"/Traces/01Getting_Started_with_Transaction_Tracing/01Instrument_your_application_with_OpenTelemetry/.NET_OpenTelemetry_auto-instrumentation": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/dotnet",
15271527
"/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/aws-lambda/dotnet",
1528+
"/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/traceid-spanid-injection-into-logs": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/dotnet/traceid-spanid-injection-into-logs",
15281529
"/Traces/01Getting_Started_with_Transaction_Tracing/01Instrument_your_application_with_OpenTelemetry/.NET_OpenTelemetry_auto-instrumentation/01NET_Core_TraceID_and_SpanID_Injection_into_Logs": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/dotnet/traceid-spanid-injection-into-logs",
15291530
"/Traces/01Getting_Started_with_Transaction_Tracing/01Instrument_your_application_with_OpenTelemetry/AWS_Lambda_-_Java_function_instrumentation_with_Sumo_Logic_tracing": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/aws-lambda/java",
15301531
"/Traces/01Getting_Started_with_Transaction_Tracing/01Instrument_your_application_with_OpenTelemetry/AWS_Lambda_-_NodeJS_function_instrumentation_with_Sumo_Logic_tracing": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/aws-lambda/nodejs",
@@ -2950,6 +2951,8 @@
29502951
"/cid/1111": "/docs/integrations/microsoft-azure/azure-open-ai",
29512952
"/cid/1115": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps",
29522953
"/docs/integrations/microsoft-azure/microsoft-defender-for-cloud-apps/": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps",
2954+
"/cid/1116": "/docs/integrations/microsoft-azure/azure-security-microsoft-entra-id-protection",
2955+
"/docs/integrations/microsoft-azure/microsoft-entra-id-protection/": "/docs/integrations/microsoft-azure/azure-security-microsoft-entra-id-protection",
29532956
"/cid/1113": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/databricks-audit-source/",
29542957
"/Cloud_SIEM_Enterprise": "/docs/cse",
29552958
"/Cloud_SIEM_Enterprise/Administration": "/docs/cse/administration",
@@ -3138,6 +3141,7 @@
31383141
"/Manage/01Manage_Subscription/05Manage_Organization": "/docs/manage/manage-subscription/create-and-manage-orgs/manage-org-settings",
31393142
"/Manage/01Manage_Subscription/05Manage_Organizational_Settings": "/docs/manage/manage-subscription/create-and-manage-orgs/manage-org-settings",
31403143
"/docs/manage/manage-subscription/upgrade-cloud-flex-account": "/docs/manage/manage-subscription/upgrade-account/upgrade-cloud-flex-legacy-account",
3144+
"/docs/manage/manage-subscription/usage-management": "/docs/manage/ingestion-volume",
31413145
"/Manage/01Manage_Subscription/06Manage_Billing_Information": "/docs/manage/manage-subscription/manage-billing-information",
31423146
"/Manage/01Manage_Subscription/08Create_and_Manage_Orgs": "/docs/manage/manage-subscription/create-and-manage-orgs/create-manage-orgs",
31433147
"/Manage/01Manage_Subscription/10Create_and_Manage_Orgs_(Service_Providers)": "/docs/manage/manage-subscription/create-and-manage-orgs/create-manage-orgs-service-providers",
@@ -3384,6 +3388,7 @@
33843388
"/Manage/Security/Access_Keys/Create_Access_Keys": "/docs/manage/security/access-keys",
33853389
"/Manage/Security/Audit_Event_Index": "/docs/manage/security/audit-indexes/audit-event-index",
33863390
"/docs/audit/audit-events": "/docs/manage/security/audit-indexes",
3391+
"/docs/manage/security/audit": "/docs/manage/security/audit-indexes",
33873392
"/Manage/Security/Audit-Index": "/docs/manage/security/audit-indexes/audit-index",
33883393
"/Manage/Security/Cloud_Security_Events": "/docs/cse",
33893394
"/Manage/Security/Create-an-Allowlist-for-IP-or-CIDR-Addresses": "/docs/manage/security/create-allowlist-ip-cidr-addresses",
@@ -4169,6 +4174,7 @@
41694174
"/Send-Data/Applications-and-Other-Data-Sources/AWS_WAF/Collect_Logs_for_AWS_WAF": "/docs/integrations/amazon-aws/waf",
41704175
"/Send-Data/Applications-and-Other-Data-Sources/AWS-Lambda": "/docs/integrations/amazon-aws/lambda",
41714176
"/Send-Data/Applications-and-Other-Data-Sources/AWS-CloudTrail/04-Set-Up-Admin-Access-for-CloudTrail": "/docs/integrations/amazon-aws/cloudtrail",
4177+
"/Send-Data/Applications-and-Other-Data-Sources/AWS-Config": "/docs/send-data/collect-from-other-data-sources",
41724178
"/Send-Data/Applications-and-Other-Data-Sources/AWS-Elastic-Load-Balancing-ULM-Application/Collect-Logs-and-Metrics-for-AWS-Elastic-Load-Balancing-ULM-Application": "/docs/integrations/amazon-aws/classic-load-balancer",
41734179
"/Send-Data/Applications-and-Other-Data-Sources/AWS-Elastic-Load-Balancing-ULM-CLB/Collect-Logs-and-Metrics-for-AWS-Elastic-Load-Balancing-ULM-CLB": "/docs/integrations/amazon-aws/classic-load-balancer",
41744180
"/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory": "/docs/integrations/microsoft-azure/active-directory-azure",
@@ -4436,6 +4442,7 @@
44364442
"/docs/cloud-infrastructure-security/audit-and-compliance": "/docs/security/additional-security-features/audit-and-compliance",
44374443
"/docs/cloud-infrastructure-security/threat-detection-and-investigation": "/docs/security/additional-security-features/threat-detection-and-investigation",
44384444
"/docs/cloud-infrastructure-security/application-security": "/docs/security/additional-security-features/application-security",
4445+
"/docs/security/automation/playbooks": "/docs/platform-services/automation-service",
44394446
"/docs/cse/automation-service/": "/docs/cse/automation",
44404447
"/docs/cse/automation-service/about-automation-service": "/docs/cse/automation/about-automation-service-and-cloud-siem",
44414448
"/docs/cse/automation-service/automation-service-automations": "/docs/cse/automation/automations-in-cloud-siem",
@@ -4450,6 +4457,7 @@
44504457
"/docs/cse/automation-service/automation-service-integration-framework": "/docs/platform-services/automation-service/integration-framework",
44514458
"/docs/cloud-soar/cloud-soar-integration-framework": "/docs/platform-services/automation-service/integration-framework",
44524459
"/docs/platform-services/automation-service/automation-service-integration-framework": "/docs/platform-services/automation-service/integration-framework",
4460+
"/docs/send-data/collect-data-from-kubernetes/gke-autopilot-collection": "/docs/send-data/kubernetes",
44534461
"/docs/send-data/collect-from-other-data-sources/kubernetes": "/docs/send-data/kubernetes",
44544462
"/docs/send-data/kubernetes/v4": "/docs/send-data/kubernetes",
44554463
"/docs/send-data/collect-from-other-data-sources/azure-blob-storage/collect-logs-azure-blob-storage": "/docs/send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/collect-logs",

docs/cse/rules/cse-rules-syntax.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -195,6 +195,10 @@ The equal to (=) function returns “true” if the expressions are equal, or 
195195

196196
`null = null`
197197

198+
:::note
199+
The `=` and `==` functions do not match against a regular expression or pattern. Instead, use the [`like`](#like) function.
200+
:::
201+
198202
### ==
199203

200204
The double equal sign (==) function returns “true” if the two expressions are equal. The two expressions must be the same type, and must be a type that can be used in an equality comparison. For complex types such as array and struct, the data types of fields must be orderable.

docs/integrations/amazon-aws/application-load-balancer.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -140,14 +140,16 @@ Scope (Specific Data): account=* eventSource eventName "elasticloadbalancing.ama
140140
```
141141

142142
```sql title="Parse Expression"
143-
json "eventSource", "awsRegion", "recipientAccountId", "requestParameters.name", "requestParameters.type", "requestParameters.loadBalancerArn", "apiVersion" as event_source, region, accountid, loadbalancer, loadbalancertype, loadbalancerarn, api_version nodrop
144-
|"" as namespace
143+
json "eventSource", "awsRegion", "recipientAccountId", "requestParameters.name", "requestParameters.type", "requestParameters.loadBalancerArn", "requestParameters.listenerArn", "apiVersion" as event_source, region, accountid, loadbalancer, loadbalancertype, loadbalancerarn, listenerarn, api_version nodrop
145144
| where event_source = "elasticloadbalancing.amazonaws.com" and api_version matches "2015-12-01"
146-
| parse field=loadbalancerarn ":loadbalancer/*/*/*" as balancertype, loadbalancer, f1 nodrop
147-
| if(loadbalancertype matches "network", "aws/networkelb", if(balancertype matches "net", "aws/networkelb", namespace)) as namespace
148-
| if(loadbalancertype matches "application", "aws/applicationelb", if(balancertype matches "app", "aws/applicationelb", namespace)) as namespace
149-
| where namespace="aws/applicationelb" or isEmpty(namespace)
150-
| toLowerCase(loadbalancer) as loadbalancer
145+
| "" as namespace
146+
| parse field=loadbalancerarn ":loadbalancer/*/*/*" as balancertype1, loadbalancer1, f1 nodrop
147+
| parse field=listenerarn ":listener/*/*/*/*" as balancertype2, loadbalancer2, f1, f2 nodrop
148+
| if(loadbalancertype matches "network", "aws/networkelb", if(balancertype1 matches "net", "aws/networkelb", if(balancertype2 matches "net", "aws/networkelb", namespace))) as namespace
149+
| if(loadbalancertype matches "application", "aws/applicationelb", if(balancertype1 matches "app", "aws/applicationelb", if(balancertype2 matches "app", "aws/applicationelb", namespace))) as namespace
150+
| where namespace="aws/applicationelb" or isEmpty(namespace)
151+
| if (!isEmpty(loadbalancer), loadbalancer, if (!isEmpty(loadbalancer1), loadbalancer1, loadbalancer2)) as loadbalancer
152+
| toLowerCase(loadbalancer) as loadbalancer
151153
| fields region, namespace, loadbalancer, accountid
152154
```
153155

docs/integrations/amazon-aws/network-load-balancer.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -68,14 +68,16 @@ Scope (Specific Data): account=* eventSource eventName "elasticloadbalancing.ama
6868
```
6969

7070
```sql title="Parse Expression"
71-
json "eventSource", "awsRegion", "recipientAccountId", "requestParameters.name", "requestParameters.type", "requestParameters.loadBalancerArn", "apiVersion" as event_source, region, accountid, networkloadbalancer, loadbalancertype, loadbalancerarn, api_version nodrop
72-
|"" as namespace
71+
json "eventSource", "awsRegion", "recipientAccountId", "requestParameters.name", "requestParameters.type", "requestParameters.loadBalancerArn", "requestParameters.listenerArn", "apiVersion" as event_source, region, accountid, networkloadbalancer, loadbalancertype, loadbalancerarn, listenerarn, api_version nodrop
7372
| where event_source = "elasticloadbalancing.amazonaws.com" and api_version matches "2015-12-01"
74-
| parse field=loadbalancerarn ":loadbalancer/*/*/*" as balancertype, networkloadbalancer, f1 nodrop
75-
| if(loadbalancertype matches "network", "aws/networkelb", if(balancertype matches "net", "aws/networkelb", namespace)) as namespace
76-
| if(loadbalancertype matches "application", "aws/applicationelb", if(balancertype matches "app", "aws/applicationelb", namespace)) as namespace
77-
| where namespace="aws/networkelb" or isEmpty(namespace)
78-
| toLowerCase(networkloadbalancer) as networkloadbalancer
73+
| "" as namespace
74+
| parse field=loadbalancerarn ":loadbalancer/*/*/*" as balancertype1, networkloadbalancer1, f1 nodrop
75+
| parse field=listenerarn ":listener/*/*/*/*" as balancertype2, networkloadbalancer2, f1, f2 nodrop
76+
| if(loadbalancertype matches "network", "aws/networkelb", if(balancertype1 matches "net", "aws/networkelb", if(balancertype2 matches "net", "aws/networkelb", namespace))) as namespace
77+
| if(loadbalancertype matches "application", "aws/applicationelb", if(balancertype1 matches "app", "aws/applicationelb", if(balancertype2 matches "app", "aws/applicationelb", namespace))) as namespace
78+
| where namespace="aws/networkelb" or isEmpty(namespace)
79+
| if (!isEmpty(networkloadbalancer), networkloadbalancer, if (!isEmpty(networkloadbalancer1), networkloadbalancer1, networkloadbalancer2)) as networkloadbalancer
80+
| toLowerCase(networkloadbalancer) as networkloadbalancer
7981
| fields region, namespace, networkloadbalancer, accountid
8082
```
8183

0 commit comments

Comments
 (0)