diff --git a/blog-service/2025-10-31-apps-databricks-audit.md b/blog-service/2025-10-31-apps-databricks-audit.md
new file mode 100644
index 0000000000..135979670e
--- /dev/null
+++ b/blog-service/2025-10-31-apps-databricks-audit.md
@@ -0,0 +1,12 @@
+---
+title: Databricks Audit (Apps)
+image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082
+keywords:
+ - apps
+ - databricks-audit
+hide_table_of_contents: true
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+We're excited to introduce the new Sumo Logic app for Databricks Audit. This app helps identify potential threats, highlights key trends, and strengthens the overall security posture of your Databricks environment by analyzing the Databricks audit logs. [Learn more](/docs/integrations/saas-cloud/databricks-audit/).
\ No newline at end of file
diff --git a/cid-redirects.json b/cid-redirects.json
index b95f64ede3..63898d4ef2 100644
--- a/cid-redirects.json
+++ b/cid-redirects.json
@@ -2958,6 +2958,7 @@
"/docs/integrations/microsoft-azure/microsoft-entra-id-protection/": "/docs/integrations/microsoft-azure/azure-security-microsoft-entra-id-protection",
"/cid/1113": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/databricks-audit-source/",
"/cid/1117": "/docs/integrations/saas-cloud/chatgpt-compliance",
+ "/cid/1118": "/docs/integrations/saas-cloud/databricks-audit",
"/Cloud_SIEM_Enterprise": "/docs/cse",
"/Cloud_SIEM_Enterprise/Administration": "/docs/cse/administration",
"/Cloud_SIEM_Enterprise/Administration/Cloud_SIEM_Enterprise_Feature_Update_(2022)": "/docs/cse/administration",
diff --git a/docs/integrations/product-list/product-list-a-l.md b/docs/integrations/product-list/product-list-a-l.md
index e1f56a0758..2c3b6bea96 100644
--- a/docs/integrations/product-list/product-list-a-l.md
+++ b/docs/integrations/product-list/product-list-a-l.md
@@ -186,7 +186,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
| :-- | :-- | :-- |
|
| [DarkOwl](https://www.darkowl.com/) | Automation integration: [DarkOwl](/docs/platform-services/automation-service/app-central/integrations/darkowl/) |
|
| [Darktrace](https://darktrace.com/) | Automation integration: [Darktrace](/docs/platform-services/automation-service/app-central/integrations/darktrace/)
Cloud SIEM integration: [Darktrace](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/91f4544f-6118-4bdc-8b30-01f045d20e4c.md) |
-|
| [Databricks](https://www.databricks.com/) | Collector: [Databricks Audit Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/databricks-audit-source/) |
+|
| [Databricks](https://www.databricks.com/) | App: [Databricks Audit](/docs/integrations/saas-cloud/databricks-audit)
Collector: [Databricks Audit Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/databricks-audit-source/) |
| | [Datadog](https://www.datadoghq.com/) | App: [Datadog](/docs/integrations/saas-cloud/datadog/)
Webhook: [Webhook Connection for Datadog](/docs/alerts/webhook-connections/datadog/) |
| | [Dataminr](https://www.dataminr.com/) | Cloud SIEM integration: [Dataminr](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/0019f757-3674-4688-9d6c-063366cfcfa9.md)
Partner integration: [Dataminr Pulse for Sumo Logic](https://github.com/SumoLogic/sumologic-public-partner-apps/tree/master/DataminrPulse) |
|
| [Datto](https://www.datto.com/) | Automated integration: [Datto RMM](/docs/platform-services/automation-service/app-central/integrations/datto-rmm/)
Cloud SIEM integration: [Datto](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/1E4721C4-DC98-456D-B0DF-80365924683A.md) |
diff --git a/docs/integrations/saas-cloud/databricks-audit.md b/docs/integrations/saas-cloud/databricks-audit.md
new file mode 100644
index 0000000000..4d3458ccb8
--- /dev/null
+++ b/docs/integrations/saas-cloud/databricks-audit.md
@@ -0,0 +1,171 @@
+---
+id: databricks-audit
+title: Databricks Audit
+sidebar_label: Databricks Audit
+description: The Databricks Audit app for Sumo Logic provides insights into your organization's cybersecurity practices to strengthen security.
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+
+The Sumo Logic app for Databricks Audit provides insights into your organization's security analytics. It provides real-time visibility into user activity, administrative operations, and security-related events across Databricks workspaces, empowering security and compliance teams to quickly detect, investigate, and respond to suspicious behavior.
+
+By ingesting Databricks audit logs, the app enables detection of potential threats such as unauthorized access attempts, privilege escalations, and anomalous job or login activities. Preconfigured dashboards highlight user access trends, critical configuration changes, error patterns, and high-risk operations, helping analysts proactively identify emerging threats and compliance risks.
+
+With rich visualizations and detailed event insights, the app enhances oversight of sensitive data access and strengthens the overall security posture of Databricks environments.
+
+:::info
+This app includes [built-in monitors](#databricks-audit-monitors). For details on creating custom monitors, refer to [Create monitors for Databricks Audit app](#create-monitors-for-databricks-audit-app).
+:::
+
+## Log types
+
+This app uses Sumo Logic’s [Databricks Audit source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/databricks-audit-source/) to collect the [audit logs](https://docs.databricks.com/api/workspace/statementexecution/executestatement) from the Databricks Audit platform.
+
+## Sample log messages
+
+Audit Log
+
+```json
+{
+ "account_id":"83860f25-7194-4d0c-a304-8902b05c4b0e",
+ "action_name":"tokenLogin",
+ "audit_level":"WORKSPACE_LEVEL",
+ "event_date":"2025-10-23",
+ "event_id":"3dd93080-f90f-3ea4-8870-6b7527b77393",
+ "event_time":"2025-10-23T09:11:56.509Z",
+ "identity_metadata":"{\"run_by\":null,\"run_as\":null,\"acting_resource\":null}",
+ "request_id":"46e37143-8bb4-45ec-a63e-1eefe3d716bc",
+ "request_params":"{\"user\":\"ddb92362-81fa-4f41-b5d3-e5a747e0b2f5\",\"tokenId\":\"33846778b496e5a557f17ade5b0fe2e4afce8e4c90378fc130c5537c9042a94c\",\"authenticationMethod\":\"API_INT_PAT_TOKEN\"}",
+ "response":"{\"status_code\":\"200\",\"error_message\":null,\"result\":null}",
+ "service_name":"accounts",
+ "session_id":null,
+ "source_ip_address":"10.251.166.254",
+ "user_agent":"Apache-HttpClient/4.5.14 (Java/17.0.15) Databricks-Service/driver DBHttpClient/v2RawClient",
+ "user_identity":"{\"email\":\"ddb92362-81fa-4f41-b5d3-e5a747e0b2f5\",\"subject_name\":null}",
+ "version":"2.0",
+ "workspace_id":"4150696479394378"
+}
+```
+
+
+### Security Overview
+
+The **Databricks Audit - Security Overview** dashboard provides targeted insights into key security events and potential risk exposures across your Databricks environment. It enables proactive detection of suspicious activity by visualizing failed API calls over time, authentication method usage, and API response codes that may indicate unauthorized access attempts or configuration issues.
+
+Security teams can easily track trends in failed authentications and API errors, investigate root causes, and identify patterns that signal emerging threats or compliance violations. The dashboard also includes a geographic overview of audit activities, highlighting events originating from embargoed or high-risk regions to help monitor potential data exfiltration or policy breaches.
+
+By consolidating these critical security indicators, including summaries of failed API attempts and geographic context, the dashboard empowers teams to rapidly investigate incidents, respond to evolving risks, and maintain strong security and compliance across all Databricks workspaces.
+
+## Create monitors for Databricks Audit app
+
+import CreateMonitors from '../../reuse/apps/create-monitors.md';
+
+
Gather information about your organization's cybersecurity practices to strengthen security.
+Analyze your organization's security practices to identify emerging threats and compliance risks.
+