Skip to content

Commit fd6f05c

Browse files
authored
Merge branch 'main' into update-deletion-request-docs
2 parents 33fefbc + a2f5555 commit fd6f05c

File tree

45 files changed

+531
-78
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+531
-78
lines changed

blog-cse/2025-04-14-content.md

Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
---
2+
title: April 14, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- Additional data requirements for GitHub rules added to rule descriptions.
15+
- Spelling corrections for AWS Lambda rules.
16+
- New Slack Anomaly Event log mapper and supporting parsing changes:
17+
- Enables passthrough detection of Slack Anomaly Events using Normalized Security Signal (MATCH-S00402).
18+
- Requires parser be defined for passthrough detection.
19+
- Updates to Sysdig parsing and mapping to support additional events.
20+
- Support for Microsoft Windows Sysmon-29 event.
21+
- Additional normalized field mappings for Microsoft Windows Sysmon events.
22+
- New `user_phoneNumber` and `targetUser_phoneNumber` schema fields.
23+
24+
25+
### Rules
26+
- [Updated] MATCH-S00874 AWS Lambda Function Recon
27+
- [Updated] MATCH-S00952 GitHub - Administrator Added or Invited
28+
- [Updated] MATCH-S00953 GitHub - Audit Logging Modification
29+
- [Updated] MATCH-S00954 GitHub - Copilot Seat Cancelled by GitHub
30+
- [Updated] FIRST-S00091 GitHub - First Seen Activity From Country for User
31+
- [Updated] FIRST-S00090 GitHub - First Seen Application Interacting with API
32+
- [Updated] MATCH-S00950 GitHub - Member Invitation or Addition
33+
- [Updated] MATCH-S00955 GitHub - Member Permissions Modification
34+
- [Updated] MATCH-S00956 GitHub - OAuth Application Activity
35+
- [Updated] MATCH-S00957 GitHub - Organization Transfer
36+
- [Updated] OUTLIER-S00026 GitHub - Outlier in Distinct User Agent Strings by User
37+
- [Updated] OUTLIER-S00027 GitHub - Outlier in Repository Cloning or Downloads
38+
- [Updated] MATCH-S00958 GitHub - PR Review Requirement Removed
39+
- [Updated] MATCH-S00959 GitHub - Repository Public Key Deletion
40+
- [Updated] MATCH-S00960 GitHub - Repository Transfer
41+
- [Updated] MATCH-S00961 GitHub - Repository Visibility Changed to Public
42+
- [Updated] MATCH-S00962 GitHub - Repository Visibility Permissions Changed
43+
- [Updated] MATCH-S00963 GitHub - SSH Key Created for Private Repo
44+
- [Updated] MATCH-S00964 GitHub - SSO Recovery Codes Access Activity
45+
- [Updated] MATCH-S00951 GitHub - Secret Scanning Alert
46+
- [Updated] MATCH-S00965 GitHub - Secret Scanning Potentially Disabled
47+
- [Updated] MATCH-S00966 GitHub - Two-Factor Authentication Disabled for Organization
48+
49+
### Log Mappers
50+
- [New] Slack Anomaly Event
51+
- [New] Windows - Microsoft-Windows-Sysmon/Operational - 16
52+
- [New] Windows - Microsoft-Windows-Sysmon/Operational - 19|20
53+
- [New] Windows - Microsoft-Windows-Sysmon/Operational-29
54+
- [Updated] Sysdig Secure Packages
55+
- [Updated] Sysdig Secure Vulnerability
56+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 1
57+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 2
58+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 3
59+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 4
60+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 5
61+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 6
62+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 7
63+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 8
64+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 9
65+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 10
66+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 11
67+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 15
68+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 17
69+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 18
70+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 23
71+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 24
72+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 26
73+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 27
74+
75+
### Parsers
76+
- [New] /Parsers/System/Slack/Slack Enterprise Audit
77+
- [Updated] /Parsers/System/Sysdig/Sysdig Secure
78+
79+
### Schema
80+
- [New] `targetUser_phoneNumber`
81+
- [New] `user_phoneNumber`

blog-service/2025-03-31-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1313

1414
We’re excited to announce the release of the new Azure Key Vault and AWS Auto scaling apps for Sumo Logic.
1515

16-
- **Azure Key Vault**. Azure Key Vault is a managed service, hosted in the cloud that acts as a central message hub for communication between an IoT application and its attached devices. This integration helps in comprehensive monitoring of your key vaults requests, performance, failures, and latency. [Learn more](/docs/integrations/microsoft-azure/azure-key-vault/).
16+
- **Azure Key Vault**. Azure Key Vault is a cloud service that helps you securely store and manage secrets, keys, and certificates. You can use it to protect data for cloud apps and services. This integration helps in comprehensive monitoring of your Key Vault operations, requests, failures, and latency. [Learn more](/docs/integrations/microsoft-azure/azure-key-vault/).
1717
- **AWS Auto scaling**. Amazon EC2 Auto Scaling helps you maintain application availability and lets you automatically add or remove EC2 instances using scaling policies that you define. Dynamic or predictive scaling policies let you add or remove EC2 instance capacity to service established or real-time demand patterns. [Learn more](/docs/integrations/amazon-aws/amazon-ec2-auto-scaling/).
1818

1919
### Enhancements

docs/cse/administration/mitre-coverage.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -211,3 +211,10 @@ You can use the following Cloud SIEM APIs to obtain information about your MITRE
211211
* [MitreAttackCoverageExportJson](https://api.sumologic.com/docs/sec/#operation/MitreAttackCoverageExportJson). Get a JSON representation of the Mitre ATT&CK coverage.
212212

213213
To find the Cloud SIEM API documentation for your endpoint, see [Cloud SIEM APIs](/docs/api/cloud-siem-enterprise/).
214+
215+
## Additional resources
216+
217+
* Blog: [Enhance your cloud security with MITRE ATT&CK and Sumo Logic Cloud SIEM](https://www.sumologic.com/blog/cloud-siem-mitre-attack/)
218+
* Glossary: [MITRE ATT&CK - definition & overview](https://www.sumologic.com/glossary/mitre-attack/)
219+
* Demo: [MITRE ATT&CK Coverage Explorer](https://www.sumologic.com/demo/cloud-siem-mitre-attack-coverage-explorer/)
220+
* Cloud SIEM Content Catalog: [Vendors](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/README.md)

docs/cse/rules/about-cse-rules.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -185,3 +185,9 @@ Threat Intelligence sources contain values that, when encountered in a record, a
185185

186186
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
187187

188+
## Additional resources
189+
190+
* Blogs:
191+
* [Secure your CI/CD pipelines from supply chain attacks with Sumo Logic’s Cloud SIEM rules](https://www.sumologic.com/blog/secure-azure-devops-github-supply-chain-attacks/)
192+
* [Rule tuning – supercharge Cloud SIEM for better alerts](https://www.sumologic.com/blog/rule-tuning-cloud-siem-alert-fatigue/)
193+
* Cloud SIEM Content Catalog: [Rules](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/rules/README.md)

docs/get-started/ai-machine-learning.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -100,12 +100,16 @@ Sumo Logic's Cloud SIEM leverages AI-driven rules for security management, inclu
100100
Our Global Intelligence Service apps provide security teams with valuable real-time security intelligence to scale detection, prioritization, investigation, and workflow to prevent potentially harmful service configurations that could lead to a costly data breach. [Learn more](/docs/integrations/global-intelligence).
101101

102102

103-
## More information
103+
## Additional resources
104+
105+
* Guide: [Understanding artificial intelligence for log analytics](https://www.sumologic.com/guides/machine-data-analytics)
106+
* Blogs:
107+
* [What are the differences between artificial intelligence, machine learning, deep learning and generative AI?](https://www.sumologic.com/blog/machine-learning-deep-learning)
108+
* [DevSecOps in an AI world requires disruptive log economics](https://www.sumologic.com/blog/devsecops-ai-disruptive-log-economics)
109+
* [Generative AI: The latest example of systems of insight](https://www.sumologic.com/blog/generative-ai-latest-example-systems-of-insight)
110+
* [Harnessing the power of artificial intelligence in log analytics](https://www.sumologic.com/blog/power-ai-log-analytics/)
111+
* [Reduce alert noise, automate incident response and keep coding with AI-driven alerting](https://www.sumologic.com/blog/ai-driven-low-noise-alerts/)
104112

105-
* [What are the differences between artificial intelligence, machine learning, deep learning and generative AI?](https://www.sumologic.com/blog/machine-learning-deep-learning)
106-
* [Understanding artificial intelligence for log analytics](https://www.sumologic.com/guides/machine-data-analytics)
107-
* [DevSecOps in an AI world requires disruptive log economics](https://www.sumologic.com/blog/devsecops-ai-disruptive-log-economics)
108-
* [Generative AI: The latest example of systems of insight](https://www.sumologic.com/blog/generative-ai-latest-example-systems-of-insight)
109113
<!--
110114
-Bashyam's blog about how we trained our AI
111115
-Flex Pricing? The more log data ingested, the sharper your analytics and ML/AI insights become. By eliminating ingest limitations and empowering an ML/AI-driven single source of truth for analytics, Flex enables DevOps and DevSecOps teams to troubleshoot faster, accelerate release velocity, and ensure reliable, secure digital experiences.

docs/integrations/amazon-aws/amazon-elastic-block-store.md

Lines changed: 62 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,70 @@ Amazon Elastic Block Store (Amazon EBS) provides block level storage volumes for
1212

1313
Amazon EBS is recommended for data that must be quickly accessible and requires long-term persistence. EBS volumes are particularly well-suited for use as the primary storage for file systems, databases, or for any applications that require fine granular updates and access to raw, unformatted, block-level storage. Amazon EBS is well suited to both database-style applications that rely on random reads and writes, and to throughput-intensive applications that perform long, continuous reads and writes. For more details, refer to the [AWS documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AmazonEBS.html).
1414

15-
## Log and metric types
15+
## Metric type
1616
* [CloudWatch Metrics](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using_cloudwatch_ebs.html)
17-
* [CloudTrail Logs](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/monitor-with-cloudtrail.html)
1817

18+
:::note
19+
For [CloudTrail log](https://docs.aws.amazon.com/ebs/latest/userguide/logging-ebs-apis-using-cloudtrail.html), Amazon EBS and Amazon EC2 are tightly integrated services. Most EBS-related events are captured and reflected as part of EC2 events, since EBS volumes are typically attached to EC2 instances for storage and compute operations. See the [Amazon EC2 app](https://help.sumologic.com/docs/integrations/amazon-aws/ec2-cloudwatch-metrics/#events) for EBS related captured events.
20+
:::
1921

2022
## Setup
21-
You can collect the logs and metrics for Sumo Logic's Amazon Elastic Block Store (Amazon EBS) integration by following the below steps.
23+
You can collect the metrics for Sumo Logic's Amazon Elastic Block Store (Amazon EBS) integration by following the below steps.
2224

23-
### Configure metrics collection
24-
* Collect **CloudWatch Metrics** with namespace `AWS/EBS` using the [AWS Kinesis Firehose for Metrics](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-metrics-source/) source. For `AWS/EBS` metrics and dimensions, refer to [Amazon Elastic Block Store (Amazon EBS) CloudWatch metrics](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using_cloudwatch_ebs.html).
25-
### Configure logs collection
26-
* Collect [AWS CloudTrail Logs](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/monitor-with-cloudtrail.html) using [AWS CloudTrail](/docs/send-data/hosted-collectors/amazon-aws/aws-cloudtrail-source/) source. Amazon EC2 and Amazon EBS are integrated with AWS CloudTrail, a service that provides a record of actions taken by a user, role, or AWS service in Amazon EC2 and Amazon EBS. CloudTrail captures all API calls for Amazon EC2 and Amazon EBS as events, including calls from the console and from code calls to the APIs. If you create a trail, you can enable continuous delivery of CloudTrail events to an Amazon S3 bucket, including events for Amazon EC2 and Amazon EBS. Using the information collected by CloudTrail, you can determine the request that was made to Amazon EC2 and Amazon EBS, the IP address from which the request was made, who made the request, when it was made, and additional details.
25+
### Collect CloudWatch Metrics
26+
27+
Sumo Logic supports collecting metrics using two source types:
28+
29+
* Configure an [AWS Kinesis Firehose for Metrics Source](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-metrics-source) (recommended); or
30+
* Configure an [Amazon CloudWatch Source for Metrics](/docs/send-data/hosted-collectors/amazon-aws/amazon-cloudwatch-source-metrics)
31+
32+
* The namespace for **Amazon Elastic Block Store** Service is **AWS/EBS**.
33+
* ​​​**Metadata**. Add an **account** field to the source and assign it a value that is a friendly name/alias to your AWS account from which you are collecting metrics. Metrics can be queried via the “account field”.
34+
35+
## Installing the Elastic Block Store app
36+
37+
Now that you have set up a collection for **Amazon Elastic Block Store**, install the Sumo Logic app to use the pre-configured [dashboards](#viewing-the-elastic-block-store-dashboards) that provide visibility into your environment for real-time analysis of overall usage.
38+
39+
import AppInstall from '../../reuse/apps/app-install-v2.md';
40+
41+
<AppInstall/>
42+
43+
## Viewing the Elastic Block Store dashboards
44+
45+
We highly recommend you view these dashboards in the [AWS Observability view](/docs/dashboards/explore-view/#aws-observability) of the AWS Observability solution.
46+
47+
:::note
48+
Most Amazon EBS metrics shown on the dashboard depend on the volume type and usage conditions. For more details, refer to [CloudWatch Metrics](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using_cloudwatch_ebs.html).
49+
:::
50+
51+
### Overview
52+
53+
The **Amazon EBS - Overview** dashboard offers a comprehensive view of the performance and utilization throughout the lifecycle of your EBS volumes. It allows you to monitor essential metrics such as volume activity, data throughput, and latency.
54+
55+
Use this dashboard to:
56+
* Monitor EBS volume performance metrics like IOPS, throughput, and latency.
57+
* Track burst balance and queue depth to assess I/O efficiency.
58+
59+
<img src={useBaseUrl('img/integrations/amazon-aws/Amazon-EBS-Overview.png')} alt="Elastic Block Store" style={{border: '1px solid gray'}} />
60+
61+
### Performance Monitoring
62+
63+
The **Amazon EBS - Performance** dashboard provides detail visibility into the performance and utilization of your EBS volumes, fast snapshot restore capabilities, and snapshot lifecycle. It enables monitoring of key metrics related to volume activity, latency.
64+
65+
Use this dashboard to:
66+
* Monitor EBS volume performance metrics like latency, time spent on operations.
67+
* Track burst balance and queue depth to assess I/O efficiency.
68+
* Monitor status checks to detect degraded or impaired volumes and snapshot copy progress.
69+
* Track Fast Snapshot Restore readiness and available restore credits.
70+
71+
<img src={useBaseUrl('img/integrations/amazon-aws/Amazon-EBS-Performance.png')} alt="Elastic Block Store" style={{border: '1px solid gray'}} />
72+
73+
The **Amazon EBS - Throughput and IOPS** dashboard provides detail visibility into the Throughput and IOPS utilization of your EBS volumes, It enables monitoring of key metrics related to volume IOPS activity, data throughput.
74+
75+
Use this dashboard to:
76+
* Monitor EBS volume performance metrics like IOPS, throughput.
77+
* Monitor status checks to detect degraded or impaired volumes.
78+
* Track data transfer activity to understand read/write patterns over time.
79+
80+
81+
<img src={useBaseUrl('img/integrations/amazon-aws/Amazon-EBS-Throughput-and-IOPS.png')} alt="Elastic Block Store" style={{border: '1px solid gray'}} />

docs/integrations/amazon-aws/cloudtrail.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -305,3 +305,8 @@ See information about S3 public objects and buckets, including counts of new pub
305305
**Modified Public Objects-Bucket**. Displays modified public objects per object on a timeline using the `timeslices` of one hour as a stacked column chart for the last 24 hours.
306306

307307
**Modified Public Objects Table**. Displays a table with modified public objects in your S3 bucket, with time, key, bucket name, account ID, region, username, and access key ID for the last 24 hours.
308+
309+
## Additional resources
310+
311+
* Blog: [What is AWS CloudTrail?](https://www.sumologic.com/blog/what-is-aws-cloudtrail/)
312+
* App description: [Logs for Security app for AWS CloudTrail](https://www.sumologic.com/application/aws-cloudtrail/)

docs/integrations/amazon-aws/waf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ _sourceCategory=AWS/WAF {{client_ip}}
6060
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop
6161
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=clientip
6262
```
63-
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
63+
<!-- Per DOCS-643, replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
6464
```sql title="Client IP Threat Info"
6565
_sourceCategory=AWS/WAF {{client_ip}}
6666
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop

docs/integrations/databases/postgresql.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -691,3 +691,9 @@ postgresql_index_size<br/>
691691
postgresql_table_size<br/>
692692

693693
</details>
694+
695+
## Additional resources
696+
697+
* Blogs:
698+
* [How to use Kubernetes to deploy Postgres](https://www.sumologic.com/blog/kubernetes-deploy-postgres/)
699+
* [PostgreSQL vs MySQL](https://www.sumologic.com/blog/postgresql-vs-mysql/)

docs/integrations/web-servers/opentelemetry/haproxy-opentelemetry.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -370,3 +370,8 @@ import CreateMonitors from '../../../reuse/apps/create-monitors.md';
370370
| `HAProxy - Backend Server Down` | This alert is triggered when a backend server for a given HAProxy server is down. | Count > 0 | Count < = 0 |
371371
| `HAProxy - High Client (HTTP 4xx) Error Rate` | This alert is triggered when there are too many HTTP requests (>5%) with a response status of 4xx. | Count > 0 | Count < = 0 |
372372
| `HAProxy - High Server (HTTP 5xx) Error Rate` | This alert fires when there are too many HTTP requests (>5%) with a response status of 5xx. | Count > 0 | Count < = 0 |
373+
374+
## Additional resources
375+
376+
* Blog: [Everything you need to know about HAProxy log format](https://www.sumologic.com/blog/haproxy-log-format/)
377+
* App description: [HAProxy App for Sumo Logic](https://www.sumologic.com/application/haproxy/)

0 commit comments

Comments
 (0)