-
Notifications
You must be signed in to change notification settings - Fork 228
New Integration Sumo Logic Notification By Microsoft #4837
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
jpipkin1
merged 3 commits into
SumoLogic:main
from
rishav-sumo-dev:app-centeral-sumologic-notification-ews
Dec 3, 2024
Merged
Changes from 1 commit
Commits
Show all changes
3 commits
Select commit
Hold shift + click to select a range
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
109 changes: 109 additions & 0 deletions
109
...ation-service/app-central/integrations/sumo-logic-notifications-by-microsoft.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,109 @@ | ||
| --- | ||
| title: Sumo Logic Notifications By Microsoft | ||
| description: '' | ||
| --- | ||
|
|
||
| import useBaseUrl from '@docusaurus/useBaseUrl'; | ||
|
|
||
| <img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/sumo-logic-notifications.png')} alt="sumo-logic-notifications" width="100"/> | ||
|
|
||
| ***Version: 1.0 | ||
| Updated: Dec 04, 2024*** | ||
|
|
||
| Integration with Sumo Logic platform for monitors and Microsoft (Outlook) notification. | ||
|
|
||
| ## Actions | ||
|
|
||
| * **Assess Alert Status** (*Scheduled*) - Periodically monitor status of a Sumo Logic alert and notify a Outlook user about an unresolved alert. | ||
|
|
||
| ## Sumo Logic Notifications By Microsoft configuration | ||
|
|
||
| 1. In the main Sumo Logic menu, select your username and then **Preferences**. | ||
| 2. From the preferences screen, in the section **My Access Keys**, click **Add Access Key**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/sumo-logic-notifications-by-gmail-2.png')} style={{border:'1px solid gray'}} alt="sumo-logic-notifications" width="600"/> | ||
| 3. Populate the name and click **Create Key**.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/sumo-logic-notifications-by-gmail-3.png')} style={{border:'1px solid gray'}} alt="sumo-logic-notifications" width="400"/> | ||
| 4. Copy the **Access ID** and **Access Key** and store them (temporally) into a text editor. | ||
| :::note | ||
| They won't be available again once you close this screen. | ||
| ::: | ||
| 5. Click **Done** after you copied the Access ID and Access Key.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/sumo-logic-notifications-4.png')} style={{border:'1px solid gray'}} alt="sumo-logic-notifications" width="400"/> | ||
|
|
||
| ### Register an application | ||
|
|
||
| Registering your application establishes a trust relationship between your app and the Microsoft identity platform. The trust is unidirectional: your app trusts the Microsoft identity platform, and not the other way around. | ||
|
|
||
| Follow these steps to create the app registration: | ||
|
|
||
| 1. Sign in to the [Azure portal](https://portal.azure.com/). | ||
| 2. If you have access to multiple tenants, use the Directory + subscription filter <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/microsoft-ews/microsoft-ews-1.png')} style={{border:'1px solid gray'}} alt="/microsoft-ews" width="30"/> in the top menu to select the tenant in which you want to register an application. | ||
| 3. Search for and select the **Azure Active Directory**. | ||
| 4. Under **Manage**, select **App registrations > New registration**. | ||
| 5. Enter a Name for your application. Users of your app might see this name, and you can change it later. | ||
| 6. Select Register to complete the initial app registration. | ||
| 7. Don't enter anything for **Redirect URI (optional)**.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/microsoft-ews/microsoft-ews-2.png')} style={{border:'1px solid gray'}} alt="/microsoft-ews" width="800"/> | ||
|
|
||
| When registration completes, the Azure portal displays the app registration's Overview pane, which includes its Application (client) ID. Also referred to as just client ID, this value uniquely identifies your application in the Microsoft identity platform. | ||
|
|
||
| The client ID as one aspect in validating the security tokens it receives from the identity platform.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/microsoft-ews/microsoft-ews-3.png')} style={{border:'1px solid gray'}} alt="/microsoft-ews" width="800"/> | ||
|
|
||
| ### Add credentials | ||
|
|
||
| Credentials are used by confidential client applications that access an API. Examples of confidential clients are web apps, or service- and daemon-type applications. Credentials allow your application to authenticate as itself, requiring no interaction from a user at runtime. | ||
| You can add client secrets (a string) as credentials to your confidential client app registration. | ||
|
|
||
| <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/microsoft-ews/microsoft-ews-4.png')} style={{border:'1px solid gray'}} alt="/microsoft-ews" width="800"/> | ||
|
|
||
| ### Add a client secret | ||
|
|
||
| The client secret, known also as an application password, is a string value of your app. | ||
|
|
||
| 1. Select your application in App registrations in the Azure portal. | ||
| 2. Select **Certificates & secrets > New client secret**. | ||
| 3. Add a description for your client secret. | ||
| 4. Select a duration. | ||
| 5. Select **Add**. | ||
| 6. Record the secret's value for use in your client application code - it's never displayed again after you leave this page. | ||
|
|
||
| ### Add permissions to API | ||
|
|
||
| 1. Select your application in App registrations in the Azure portal. | ||
| 2. Select **API permissions > Add a permission**. | ||
| 3. Delegated permissions are selected by default. Delegated permissions are appropriate for client apps that access an API as the signed-in user, and whose access should be restricted to the permissions you select in the next step. | ||
| 4. Application permissions are for service- or daemon-type applications that need to access API as themselves, without user interaction for sign-in or consent. Unless you've defined application roles for your API. | ||
| 5. Select Add a permission, and add the following permissions (as we can see from picutre). <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-microsoft/sumo-logic-notifications-by-microsoft-1.png')} style={{border:'1px solid gray'}} alt="/microsoft-ews" width="800"/> | ||
|
|
||
|
|
||
| #### EWS API to be configured for these permissions | ||
|
|
||
| Applications are authorized to call APIs when they are granted permissions by users/admins as part of the consent process. The list of configured permissions should include all the permissions the application needs. | ||
|
|
||
| **API / Permissions** | ||
|
|
||
| Microsoft Graph (7) | ||
|
|
||
| * Mail.Read | ||
| + Type: Delegated | ||
| + Description: Read user mail | ||
| + Admin: - | ||
| * Mail.Read | ||
| + Type: Application | ||
| + Description: Read mail in all mailboxes | ||
| + Admin: Yes | ||
| * Mail.Send | ||
| + Type: Delegated | ||
| + Description: Send mail as a user | ||
| + Admin: Yes | ||
| * Mail.Send | ||
| + Type: Application | ||
| + Description: Send mail as any user | ||
| + Admin: Yes | ||
| * User.ReadBasic.All | ||
| + Type: Delegated | ||
| + Description: Read basic profiles of all users | ||
| + Admin: Yes | ||
| * User.ReadBasic.All | ||
| + Type: Application | ||
| + Description: Read basic profiles of all users | ||
| + Admin: Yes | ||
|
|
||
| ## Change Log | ||
| * December 04, 2024 - First upload | ||
Binary file added
BIN
+590 KB
...mo-logic-notifications-by-microsoft/sumo-logic-notifications-by-microsoft-1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.