Skip to content

Commit f7d52e4

Browse files
authored
Merge branch 'main' into in_removed
2 parents e9cddd8 + 3ff59e3 commit f7d52e4

File tree

7 files changed

+80
-9
lines changed

7 files changed

+80
-9
lines changed

blog-service/2025-03-31-apps.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,15 +19,15 @@ We’re excited to announce the release of the new Azure Key Vault and AWS Auto
1919
### Enhancements
2020

2121
- **Added metrics collection capability for OpenTelemetry collectors**. [RabbitMQ](/docs/send-data/opentelemetry-collector/remote-management/source-templates/rabbitmq/#for-metrics-collection) and [Redis](/docs/send-data/opentelemetry-collector/remote-management/source-templates/redis/#for-metrics-collection).
22-
- **Added use cases to monitor EBS volume and snapshots in AWS EC2 apps**. [Amazon EC2 Auto Scaling](/docs/integrations/amazon-aws/amazon-ec2-auto-scaling/).
22+
- **Added use cases to monitor EBS volume and snapshots in AWS EC2 apps**. [AWS EC2](/docs/integrations/amazon-aws/ec2-cloudwatch-metrics/#events).
2323
- **Updated the metric collection and dashboard for Google apps**. [Google BigQuery](/docs/integrations/google/bigquery/) and [Google Cloud Load Balancing](/docs/integrations/google/cloud-load-balancing/).
2424
- Added new dashboards to the [Sumo Logic Kickstart Data(Beta)](/docs/integrations/sumo-apps/kickstart-data/) app.
25-
- **Updated the queries to accommodate the new threat intel feed**. [Apache - OpenTelemetry Collector](/docs/integrations/web-servers/opentelemetry/apache-opentelemetry/), [Apache Tomcat - OpenTelemetry Collector](/docs/integrations/web-servers/opentelemetry/apache-tomcat-opentelemetry/), [HAProxy - OpenTelemetry Collector](/docs/integrations/web-servers/opentelemetry/haproxy-opentelemetry/), [IIS 10 - OpenTelemetry Collector](/docs/integrations/web-servers/opentelemetry/iis-10-opentelemetry/), [Ngin - OpenTelemetry Collector](/docs/integrations/web-servers/opentelemetry/nginx-opentelemetry/), [PostgreSQL - OpenTelemetry Collector](/docs/integrations/databases/opentelemetry/postgresql-opentelemetry/), [Varnish - OpenTelemetry Collector](/docs/integrations/web-servers/opentelemetry/varnish-opentelemetry/), [Acquia](/docs/integrations/saas-cloud/acquia/), [Azure Web Apps](/docs/integrations/microsoft-azure/web-apps/), [JFrog Xray](/docs/integrations/app-development/jfrog-xray/), and [MongoDB Atlas 6](/docs/integrations/databases/mongodb-atlas/).
25+
- **Updated the queries to accommodate the new threat intel feed**. [Apache - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/apache-opentelemetry/), [Apache Tomcat - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/apache-tomcat-opentelemetry/), [HAProxy - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/haproxy-opentelemetry/), [IIS 10 - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/iis-10-opentelemetry/), [Ngin - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/nginx-opentelemetry/), [PostgreSQL - OpenTelemetry](/docs/integrations/databases/opentelemetry/postgresql-opentelemetry/), [Varnish - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/varnish-opentelemetry/), [Acquia](/docs/integrations/saas-cloud/acquia/), [Azure Web Apps](/docs/integrations/microsoft-azure/web-apps/), [JFrog Xray](/docs/integrations/app-development/jfrog-xray/), and [MongoDB Atlas 6](/docs/integrations/databases/mongodb-atlas/).
2626
- Updated Azure integration from` Node.js v18` to `Node.js v20`. [Learn more](https://github.com/SumoLogic/sumologic-azure-function/releases/tag/v4.1.6).
2727

2828
### Bug Fixes
2929

3030
Bugs for the following apps have been fixed:
31-
- Filtering the security groups dashoard in [AWS VPC Flow Logs](/docs/integrations/amazon-aws/vpc-flow-logs/#filtering-the-security-groups-dashboard).
31+
- Filtering the security groups dashboard in [AWS VPC Flow Logs](/docs/integrations/amazon-aws/vpc-flow-logs/#security-groups).
3232
- [AWS ECS](/docs/integrations/amazon-aws/elastic-container-service/).
33-
- [JFrog Artifactory 7 app](/docs/integrations/app-development/jfrog-artifactory/).
33+
- [JFrog Artifactory 7 app](/docs/integrations/app-development/jfrog-artifactory/).

docs/platform-services/automation-service/app-central/integrations/aws-waf.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
66

77
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/aws.png')} alt="aws" width="50"/>
88

9-
***Version: 1.0
10-
Updated: April 19, 2024***
9+
***Version: 1.1
10+
Updated: March 26, 2025***
1111

1212
AWS WAF is a web application firewall that helps protect web applications from attacks by allowing you to configure rules that allow, block, or monitor (count) web requests based on conditions that you define.
1313

@@ -30,6 +30,7 @@ AWS WAF is a web application firewall that helps protect web applications from a
3030
* **List Resources for Web ACLs** (*Enrichment*) - Retrieves a list of the Amazon Resource Names (ARNs) for the regional resources that are associated with the specified web ACL.
3131
* **List Rule Groups** (*Enrichment*) - Retrieves a list of RuleGroupSummary objects for the rule groups that you manage.
3232
* **List Web ACLs** (*Enrichment*) - Retrieves a list of WebACLSummary objects for the web ACLs that you manage.
33+
* **Update IP Set** (*Containment*) - Updates the specified IPSet.
3334

3435

3536
## External Libraries
@@ -39,4 +40,5 @@ AWS WAF is a web application firewall that helps protect web applications from a
3940

4041
## Change Log
4142

42-
* April 19, 2024 - First upload
43+
* April 19, 2024 (v1.0)- First upload
44+
* March 26, 2025 (v1.1) - Added **Update IP Set** action: This new action allows users to add or remove IPs from an existing IP Set.

docs/security/additional-security-features/introduction-to-additional-security-features.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,15 @@ description: Learn basic concepts about using logs for security use cases.
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
"Logs for Security" is Sumo Logic's full set of features that leverage logs for security use cases. These features includes apps, customizable dashboards, and tools to analyze your security data. This allows you to use Sumo Logic's core functionality, including data collection, ingestion, and storage, to produce findings that help protect your attack surfaces from threats.
10+
Sumo Logic’s Logs for Security provides a comprehensive foundation for security operations, with a unified platform to ingest, store, and analyze security logs in real time. AI-powered search enables teams to quickly find relevant logs, while anomaly detection highlights unusual patterns for further review.
11+
12+
Unlike fragmented log solutions, Sumo Logic seamlessly integrates across cloud, hybrid, and on-prem environments, reducing complexity and ensuring complete visibility into your infrastructure.
13+
14+
Security teams can quickly access log data for security log management, cloud security monitoring, and compliance reporting. By prioritizing a logs-first approach, Sumo Logic empowers you to move beyond manual log analysis and manage your security posture with greater efficiency.
15+
16+
## What's included?
17+
18+
"Logs for Security" is Sumo Logic's full set of features that leverage logs for security use cases. These features include apps, customizable dashboards, and tools to analyze your security data. This allows you to use Sumo Logic's core functionality, including data collection, ingestion, and storage, to produce findings that help protect your attack surfaces from threats.
1119

1220
You can use Sumo Logic logs for:
1321
* [Threat detection and investigation](/docs/security/additional-security-features/threat-detection-and-investigation). Identify and explore threats or security-related events within your assets, applications, or networks as quickly and effectively as possible.
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
slug: /security/threat-intelligence/threat-intelligence-vendor-switch
3+
title: Threat Intelligence Vendor Switch
4+
description: Learn about the switch of our threat intelligence vendor from CrowdStrike to Intel 471.
5+
---
6+
7+
<head>
8+
<meta name="robots" content="noindex" />
9+
</head>
10+
11+
<p><a href="/docs/beta"><span className="beta">Beta</span></a></p>
12+
13+
import useBaseUrl from '@docusaurus/useBaseUrl';
14+
15+
This article provides guidance on our switching from the legacy **_sumo_global_feed_cs** source supplied by [CrowdStrike](https://www.crowdstrike.com/en-us/) to the **SumoLogic_ThreatIntel** source supplied by [Intel 471](https://intel471.com/).
16+
17+
:::warning
18+
*The **_sumo_global_feed_cs** source will be discontinued on April 30, 2025*. For more information, see [Sumo Logic Threat Intelligence Sources](/docs/security/threat-intelligence/about-threat-intelligence).
19+
:::
20+
21+
Switching to the Intel 471 global threat feed from CrowdStrike will introduce differences in the threat indicator content. Namely, the `raw` field from the `lookup` operator, and the `raw_threat` field from the `threatip` operator will contain different JSON-formatted fields. Sophisticated, security-centric Sumo Logic platform queries sometimes use these fields for searches and dashboards.
22+
23+
Importantly, the intel vendors themselves control what appears in these "raw" fields, and each vendor prioritizes different aspects of the intel they provide. For example, CrowdStrike often includes CVEs where applicable, whereas Intel 471 bundles geo-IP data with some of its entries. CrowdStrike reports the publication timestamp of its indicators, whereas Intel 471 reports the recommended expiration timestamp. As such, Sumo Logic strongly encourages customers to review their searches and dashboards for "raw" field handling, and to modify them appropriately.
24+
25+
Beginning April 1, 2025, customers can experiment with the Intel 471 feed by referencing the `sumo://threat/i471` lookup table as a parameter to the [`lookup` search operator](/docs/search/search-query-language/search-operators/lookup). (It isn't possible to do the same for `threatip`, though its `raw_threat` field is the same as the `lookup` operator's `raw` field.) On April 30, 2025, the global CrowdStrike feed will be fully replaced by Intel 471 in the Sumo Logic platform, and references to the old feed will automatically be updated to point to the new feed.
26+
27+
Sumo Logic's native security applications will be updated to support this vendor change. To take advantage of the new Intel 471 feed, customers only need to update queries in their custom apps by April 30, 2025. For examples of queries using the `lookup` operator, see the dashboards in the [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#threat-intel-optimization) app.
28+
29+
## How do I know if I need to update a search or dashboard?
30+
31+
If your queries reference `json field=raw` or `parse field=raw` (or `raw_threat`, in the case of the `threatip` operator), you are extracting vendor-specific data that might need to be updated.
32+
33+
Additionally, the Intel 471 source currently does not include domain or email indicators, instead prioritizing IP addresses, URLs, and file hashes.
34+
35+
## How can I translate CrowdStrike-specific fields to Intel 471-specific fields?
36+
37+
In many cases, it may not be possible to translate CrowdStrike-specific fields to Intel 471-specific fields, as the two vendors emphasize different aspects of indicators of compromise. However, the table below provides approximate mappings to help you start adapting your queries.
38+
39+
### Approximate field mappings
40+
41+
As a starting point to analyze field mapping, examine the following translations:
42+
43+
| CrowdStrike | Intel 471 | Translation notes |
44+
| :-- | :-- | :-- |
45+
| `indicator` | `data.indicator_data.*` <br/><br/>For example:<br/>`data.indicator_data.address`<br/>`data.indicator_data.file.md5`<br/>`data.indicator_data.file.sha1`<br/>`data.indicator_data.file.sha256`<br/>`data.indicator_data.url` | Depends on the type. Every Intel 471 file hash record includes all hash types. <br/><br/>Intel 471 also includes geoip data for IP addresses under `data.indicator_data.geo_ip`.<br/><br/>Intel 471 has no domain or email indicators, instead prioritizing IP addresses, URLs, and file hashes. |
46+
| `kill_chains` | `data.mitre_tactics` |
47+
| `labels[*].name` | `data.threat.type`<br/>`data.threat.data.family`<br/>`data.context.description`<br/>`data.mitre_tactics` | CrowdStrike's labels are redundant with other sections in the CrowdStrike record. |
48+
| `last_updated` | `last_updated` | CrowdStrike's timestamps are in epoch seconds whereas Intel 471's are in milliseconds. |
49+
| `malicious_confidence` | `data.confidence` | |
50+
| `malware_families` | `data.threat.data.family` | |
51+
| `threat_types` | `data.threat.type` | |
52+
| `type` | `data.indicator_type` | |
53+
| (none) | `data.expiration` | Intel 471 only. In milliseconds. |
54+
55+
### JSON side-by-side approximate field mappings
56+
57+
<img src={useBaseUrl('img/security/threat-intel-field-mappings.png')} alt="Threat Intelligence field mappings" style={{border: '1px solid gray'}} width="800" />

docs/send-data/opentelemetry-collector/remote-management/index.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,11 @@ The [Sumo Logic Distribution for OpenTelemetry Collector](/docs/send-data/opente
2323
allowfullscreen
2424
/>
2525
:::
26-
26+
27+
:::note
28+
If you want to manage the collector using local configuration files, make sure to check the **Locally Manage Collector** box. If left unchecked, the collector will be managed exclusively by remote configuration by default.<br/><img src={useBaseUrl('img/send-data/remote-mgmt-local.png')} alt="Locally Manage Collector checkbox" />
29+
:::
30+
2731
**Key features**
2832

2933
* **Tagging collectors**. Tag your OpenTelemetry collectors to categorize and group them. These tags enrich your data, allowing you to use them effectively in dashboards and searches.
848 KB
Loading
24.6 KB
Loading

0 commit comments

Comments
 (0)