You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/cse/ingestion/cse-ingestion-best-practices.md
+13-10Lines changed: 13 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,10 +7,10 @@ description: Learn how to send log messages collected by a Sumo Logic Source or
7
7
8
8
import useBaseUrl from '@docusaurus/useBaseUrl';
9
9
10
-
This topic has information about sending log messages collected by a Sumo Logic Source or Cloud-to-Cloud Connector on to Cloud SIEM to be transformed into records.
10
+
This article has information about sending log messages collected by a Sumo Logic Source or Cloud-to-Cloud Connector on to Cloud SIEM to be transformed into records.
11
11
12
12
:::note
13
-
Cloud SIEM must be enabled in your Sumo Logic account in order to send data from Sumo Logic to Cloud SIEM. If it isn’t, contact your Sumo Logic Technical Account Engineer or Sales Engineer.
13
+
[Cloud SIEM must be enabled in your Sumo Logic account](/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse/) in order to send data from Sumo Logic to Cloud SIEM. If it isn’t, contact your Sumo Logic Technical Account Engineer or Sales Engineer.
14
14
:::
15
15
16
16
The process consists of configuring a source or collector to forward messages to Cloud SIEM, and ensuring that the forwarded messages are correctly tagged with the information Cloud SIEM needs in order to map messages fields to record attributes. These are referred to as *mapping hints*, and include: Format, Vendor, Product, and an Event ID template.
@@ -23,19 +23,19 @@ You can only send log data that resides in the [Continuous data tier](/docs/mana
### Recommended methods to ingest data into Cloud SIEM
27
27
28
-
We recommend the following ingestion processes, starting with the most preferred:
28
+
We recommend the following ingestion methods, starting with the most preferred:
29
29
30
-
1.**Follow an ingestion guide**. The [Ingestion Guides](/docs/cse/ingestion) section of this help site provides specific collection and ingestion recommendations for many common products and services. An ingestion guide describes the easiest way to get data from a particular product into Cloud SIEM. When you’re ready to start using Cloud SIEM to monitor a new product, if there’s a Cloud SIEM ingestion guide for it, we recommend using it.
31
-
1.**Use a Cloud-to-Cloud (C2C) connector**. If you don’t see an Ingestion Guide for your data source, check to see if there is a C2C connector. It’s an easy method, because if you configure your C2C source to send logs to Cloud SIEM, it automatically tags messages it sends to Cloud SIEM with fields that contain the mapping hints that Cloud SIEM requires. <br/><br/>Most C2C connectors have a **Forward to SIEM** option in the configuration UI. If a C2C connector lacks that option, you can achieve the same effect by assigning a field named `_siemforward`, set to *true*, to the connector. <br/><br/>For information about what C2C sources are available, see Cloud-to-Cloud Integration Framework.
30
+
1.**Use a Cloud-to-Cloud (C2C) connector**. It’s an easy method, because if you configure your C2C source to send logs to Cloud SIEM, it automatically tags messages it sends to Cloud SIEM with fields that contain the mapping hints that Cloud SIEM requires. <br/><br/>Most C2C connectors have a [**Forward to SIEM** option](/docs/c2c/info/#metadata-fields) in the configuration UI. If a C2C connector lacks that option, you can achieve the same effect by assigning a field named `_siemforward`, set to *true*, to the connector. <br/><br/>For information about what C2C sources are available, see [Cloud-to-Cloud Integration Framework Sources](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/).
32
31
1.**Use a Sumo Logic Source and parser**. If there isn’t a C2C connector for your data source, your next best option is to use a Sumo Logic Source (running on an Installed Collector or a Hosted Collector, depending on the data source)—and a Sumo Logic parser, if we have one for the data source.
33
32
34
-
Check if there’s a parser for your data source. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Parsers**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Parsers**. You can also click the **Go To...** menu at the top of the screen and select **Parsers**. If there is a parser for your data source, but you find it doesn’t completely meet your needs–for instance if the parser doesn’t support the particular log format you use–consider customizing the parser with a [local configuration](/docs/cse/schema/parser-editor#create-a-local-configuration-for-a-system-parser). If that’s not practical, you can submit a request for a new parser by filing a ticket at [https://support.sumologic.com](https://support.sumologic.com/).
33
+
Check if there’s a parser for your data source. <br/>[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Parsers**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Parsers**. You can also click the **Go To...** menu at the top of the screen and select **Parsers**.
34
+
35
+
If there is a parser for your data source, but you find it doesn’t completely meet your needs–for instance if the parser doesn’t support the particular log format you use–consider customizing the parser with a [local configuration](/docs/cse/schema/parser-editor#create-a-local-configuration-for-a-system-parser). If that’s not practical, you can submit a request for a new parser by filing a ticket at [https://support.sumologic.com](https://support.sumologic.com/).
35
36
36
-
When you forward logs to Cloud SIEM for parser processing, there are two bits of important configuration:
37
-
38
-
1. Configure the source to forward logs. To configure an HTTP source to send log messages to Cloud SIEM, click the **SIEM Processing** checkbox. You can configure other source types to send data to Cloud SIEM by assigning a field named `_siemforward`, set to *true*, to the source. For example:
37
+
When you forward logs to Cloud SIEM for parser processing, there are two bits of important configuration:
38
+
1. Configure the source to forward logs. To configure an HTTP source to send log messages to Cloud SIEM, click the [**SIEM Processing** checkbox](/docs/send-data/hosted-collectors/http-source/logs-metrics/#configure-an-httplogs-and-metrics-source). You can configure other source types to send data to Cloud SIEM by assigning a field named `_siemforward`, set to *true*, to the source. For example:
39
39
40
40
```
41
41
_siemforward=true
@@ -53,3 +53,6 @@ We recommend the following ingestion processes, starting with the most preferred
53
53
You can get the path to a parser on the **Parsers** page in Sumo Logic. Click the three-dot kebab menu in the row for a parser, and select **Copy Path**.
54
54
55
55
1. **Use a Sumo Logic Source and Cloud SIEM Ingest mapping**. This is the least recommended method, as you have to manually configure the mapping hints in an ingestion mapping. For more information, see [Configure a Sumo Logic Ingest Mapping](/docs/cse/ingestion/sumo-logic-ingest-mapping/).
56
+
57
+
:::tip
58
+
See the [Example Ingestion Sources for Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/) for specific collection and ingestion recommendations for many common products and services.
description: See examples of sources that Cloud SIEM supports for log ingestion.
6
+
---
7
+
8
+
import useBaseUrl from '@docusaurus/useBaseUrl';
9
+
10
+
This article lists examples of sources you can use to ingest data into Cloud SIEM. There are many sources you can use to ingest data into Cloud SIEM. The ones described in this article are just a few.
11
+
12
+
The most common method to ingest data into Cloud SIEM is to install a [Cloud-to-Cloud Integration Framework source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/) and select the [**Forward to SIEM** option](/docs/c2c/info/#metadata-fields) in the configuration UI. For all available methods to ingest data into Cloud SIEM, see [Recommended methods to ingest data into Cloud SIEM](/docs/cse/ingestion/cse-ingestion-best-practices/#recommended-methods-to-ingest-data-into-cloud-siem).
13
+
14
+
## Auth0
15
+
16
+
To ingest data into Cloud SIEM, select the [**Forward to SIEM** option](/docs/c2c/info/#metadata-fields) in the source configuration UI, and click the **+Add Field** link to add a field whose name is `_parser` with value */Parsers/System/Auth0/Auth0*. For complete directions, see [Collecting logs for Auth0](/docs/integrations/saml/auth0/#collecting-logs-for-auth0).
17
+
18
+
To verify that your logs are successfully making it into Cloud SIEM:
19
+
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
20
+
1. On the **Log Mappings** tab search for Auth0 and check the **Records** columns.<br/><img src={useBaseUrl('img/cse/auth0-reocrd-volume.png')} alt="Record volume" style={{border: '1px solid gray'}} style={{border: '1px solid gray'}} width="800" />
21
+
1. For a more granular look at the incoming records, you can also use the Sumo Logic platform to search for Auth0 security records.<br/><img src={useBaseUrl('img/cse/auth0-search.png')} alt="Auth0 search" style={{border: '1px solid gray'}} style={{border: '1px solid gray'}} width="500" />
description: Learn the sources available for ingesting data to Cloud SIEM.
5
5
---
6
6
7
7
import useBaseUrl from '@docusaurus/useBaseUrl';
8
8
9
-
This guide lists the sources available for ingesting data into Cloud SIEM. You can configure a variety of sources on [Installed Collectors](/docs/send-data/installed-collectors).
9
+
This guide lists examples of sources you can use to ingest data into Cloud SIEM. For all available methods to ingest data into Cloud SIEM, see [Cloud SIEM ingestion best practices](/docs/cse/ingestion/cse-ingestion-best-practices).
10
10
11
11
In this section, we'll introduce the following concepts:
Copy file name to clipboardExpand all lines: docs/integrations/saml/auth0.md
+20-22Lines changed: 20 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
11
11
12
12
Auth0 is a cloud-based, extensible identity provider for applications. The Sumo Logic App for Auth0 makes it easy to analyze and visualize your Auth0 event logs, and provides insight into security and operational issues.
13
13
14
-
For more information, see [Export Logs to Sumo Logic](https://auth0.com/docs/extensions/sumologic).
15
-
14
+
For more information, see [Use Auth0 App for Sumo Logic](https://auth0.com/docs/customize/log-streams/sumo-logic-dashboard) in Auth0 documentation.
16
15
17
16
## Collecting logs for Auth0
18
17
This procedure explains how to collect error logs from Auth0.
@@ -30,35 +29,34 @@ Sumo Logic collects the following log types:
30
29
* Rate limiting events
31
30
* Other operational events and errors
32
31
33
-
For more information about Auth0 logs, see [https://auth0.com/docs/api/managemen.../Logs/get_logs](https://auth0.com/docs/api/management/v2#!/Logs/get_logs)
32
+
For more information about Auth0 logs, see [Search Log Events](https://auth0.com/docs/api/management/v2#!/Logs/get_logs) in Auth0 documentation.
34
33
35
34
36
35
### Prerequisites
37
36
38
-
Use the Auth0 Management Portal to configure the extension. For more information, see [https://auth0.com/docs/extensions/sumologic](https://auth0.com/docs/extensions/sumologic).
39
-
40
-
41
-
### Configure a Collector
37
+
Use the Auth0 Management Portal to configure the extension. For more information, see [Sumo Logic](https://marketplace.auth0.com/integrations/sumo-logic-log-streaming) in Auth0 documentation.
42
38
43
-
Use the in-product [setup wizard](/docs/send-data/setup-wizard) in the Sumo Logic UI to configure a **Custom App**.
39
+
### Configure a collector
44
40
41
+
Configure a hosted collector. Follow the directions in [Configure a Hosted Collector and Source](/docs/send-data/hosted-collectors/configure-hosted-collector/).
45
42
46
43
### Configure a Source
47
44
48
-
Source type is [HTTP](/docs/send-data/hosted-collectors/http-source/logs-metrics).
49
-
50
-
***Name**: Required
51
-
***Category**:
52
-
***Timestamp Parsing Settings**:
53
-
***Enable Timestamp Parsing**: True
54
-
***Timezone**: Logs are sent in UTC by default and can be automatically detected
55
-
***Timestamp Format**: Select **Specify a format** and use the following, \
Configure a source on the collector. Follow the directions in [Configure an HTTP Logs and Metrics Source](/docs/send-data/hosted-collectors/http-source/logs-metrics/#configure-an-httplogs-and-metrics-source).
46
+
47
+
Fill out the following:
48
+
***Name**
49
+
***Source Category**
50
+
* Select **Forward to SIEM** if you have [Cloud SIEM](/docs/cse) installed and you want to forward log data to Cloud SIEM. If you select **Forward to SIEM**, also click the **+Add Field** link and add a field whose name is `_parser` with value */Parsers/System/Auth0/Auth0*.
51
+
***Timestamp Parsing**
52
+
* Select **Extract timestamp information from log file entries**.
53
+
***Default Timezone**. Select the default time zone to use. Logs are sent in UTC by default and can be automatically detected.
54
+
***Timestamp Format**. Select **Specify a format**. Click **Add Timestamp Format** and enter the following:
55
+
***Format**: `yyyy-MM-dd'T'HH:mm:ss.SSS'Z'`
56
+
***Timestamp locator**: `"date":"(.*?)\","`
57
+
***Message Processing**
58
+
* Select **Multiline Processing**.
59
+
* For **Infer Message Boundaries** select **Detect Automatically**.
0 commit comments