From 2ebc3b47fbdc7c614c9fea41ada1e5e91f7abf29 Mon Sep 17 00:00:00 2001 From: Jagadisha V <129049263+JV0812@users.noreply.github.com> Date: Tue, 14 May 2024 11:26:00 +0530 Subject: [PATCH 1/3] Deleted the deprecated apps doc --- blog-service/2017/12-31.md | 4 +- blog-service/2021/12-31.md | 4 +- cid-redirects.json | 39 ++- docs/get-started/faq.md | 2 +- .../app-development/jfrog-artifactory.md | 145 +------- .../integrations/global-intelligence/nginx.md | 4 +- .../active-directory-legacy.md | 264 --------------- docs/integrations/microsoft-azure/index.md | 7 - .../windows-legacy-pci-compliance.md | 150 --------- docs/integrations/pci-compliance/index.md | 7 - docs/integrations/product-list.md | 8 +- .../security-threat-detection/index.md | 12 - .../palo-alto-networks-6.md | 163 --------- .../palo-alto-networks-8.md | 316 ------------------ docs/integrations/web-servers/index.md | 7 - .../integrations/web-servers/nginx-ingress.md | 2 +- docs/integrations/web-servers/nginx-legacy.md | 275 --------------- .../telegraf-collection-architecture.md | 2 +- sidebars.ts | 6 - 19 files changed, 36 insertions(+), 1381 deletions(-) delete mode 100644 docs/integrations/microsoft-azure/active-directory-legacy.md delete mode 100644 docs/integrations/microsoft-azure/windows-legacy-pci-compliance.md delete mode 100644 docs/integrations/security-threat-detection/palo-alto-networks-6.md delete mode 100644 docs/integrations/security-threat-detection/palo-alto-networks-8.md delete mode 100644 docs/integrations/web-servers/nginx-legacy.md diff --git a/blog-service/2017/12-31.md b/blog-service/2017/12-31.md index 204469e6e9..324851b1f2 100644 --- a/blog-service/2017/12-31.md +++ b/blog-service/2017/12-31.md @@ -519,7 +519,7 @@ This capability is called quantization. The quantization interval aligns your ti **PCI Compliance for Linux App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Linux offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Linux App covers PCI requirements 02, 07, 08 and 10. See [PCI Compliance for Linux App](/docs/integrations/pci-compliance/linux). -**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-legacy-pci-compliance). +**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-json-pci-compliance). --- ## April 24, 2017 @@ -548,7 +548,7 @@ This capability is called quantization. The quantization interval aligns your ti **PCI Compliance for Linux App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Linux offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Linux App covers PCI requirements 02, 07, 08 and 10. See [PCI Compliance for Linux App](/docs/integrations/pci-compliance/linux). -**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-legacy-pci-compliance). +**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-json-pci-compliance). --- ## April 24, 2017 diff --git a/blog-service/2021/12-31.md b/blog-service/2021/12-31.md index 7169828ba5..310f289022 100644 --- a/blog-service/2021/12-31.md +++ b/blog-service/2021/12-31.md @@ -456,9 +456,9 @@ New - The Sumo Logic App for [HAProxy](/docs/integrations/web-servers/haproxy **PCI Compliance for Windows Legacy App** -Update - The [Payment Card Industry (PCI) Compliance for Windows Legacy App](/docs/integrations/microsoft-azure/windows-legacy-pci-compliance) is updated to offer dashboards to monitor system, account, and user activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows Legacy App covers PCI requirements 2, 6, 8, and 10. +Update - The [Payment Card Industry (PCI) Compliance for Windows Legacy App](/docs/integrations/microsoft-azure/windows-json-pci-compliance) is updated to offer dashboards to monitor system, account, and user activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows Legacy App covers PCI requirements 2, 6, 8, and 10. -**PCI ****Compliance for Windows JSON App** +**PCI Compliance for Windows JSON App** New - The [Payment Card Industry (PCI) Compliance for Windows JSON App](/docs/integrations/microsoft-azure/windows-json-pci-compliance) is released. This App offers dashboards to monitor system, account, and user activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows JSON App covers PCI requirements 2, 6, 8, and 10. diff --git a/cid-redirects.json b/cid-redirects.json index ac4ed1c868..61aa1317d0 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -739,9 +739,9 @@ "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_JSON": "/docs/integrations/microsoft-azure/active-directory-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_JSON/Collect_Logs_for_the_Active_Directory_JSON_App": "/docs/integrations/microsoft-azure/active-directory-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_JSON/Install_the_Active_Directory_JSON_App_and_view_the_Dashboards": "/docs/integrations/microsoft-azure/active-directory-json", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Active-Directory-Legacy-App-Dashboards": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Collect_Log_Files_for_the_Active_Directory_Legacy_App": "/docs/integrations/microsoft-azure/active-directory-legacy", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy": "/docs/integrations/microsoft-azure/active-directory-json", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Active-Directory-Legacy-App-Dashboards": "/docs/integrations/microsoft-azure/active-directory-json", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Collect_Log_Files_for_the_Active_Directory_Legacy_App": "/docs/integrations/microsoft-azure/active-directory-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory/Active-Directory-App-Dashboards": "/docs/integrations/microsoft-azure", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Azure_Active_Directory": "/docs/integrations/microsoft-azure/active-directory-azure", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Azure_Active_Directory/Collect_Logs_for_the_Azure_Active_Directory_App": "/docs/integrations/microsoft-azure/active-directory-azure", @@ -790,10 +790,10 @@ "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows_JSON": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows_JSON/Collect_Logs_for_the_PCI_Compliance_for_Windows_JSON": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows_JSON/Install_the_PCI_Compliance_for_Windows_JSON_App_and_view_the_Dashboards": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/Collecting-Logs-for-the-PCI-Compliance-for-Windows-App": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/PCI-Compliance-for-Windows-App-Dashboards": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", - "/07sumo-logic-apps/04microsoft-and-azure/pci_compliance_for_windows": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/Collecting-Logs-for-the-PCI-Compliance-for-Windows-App": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/PCI-Compliance-for-Windows-App-Dashboards": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/07sumo-logic-apps/04microsoft-and-azure/pci_compliance_for_windows": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Windows_JSON": "/docs/integrations/microsoft-azure/windows-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Windows_JSON/Collect_Logs_for_the_Windows_JSON_App": "/docs/integrations/microsoft-azure/windows-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Windows_JSON/Install_the_Windows_JSON_App_and_view_the_Dashboards": "/docs/integrations/microsoft-azure/windows-json", @@ -1136,12 +1136,12 @@ "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Observable_Networks/01Collect-logs-for-the-Observable-Network-App": "/docs/integrations/security-threat-detection/observable-networks", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Observable_Networks/Observable-Networks-App-Dashboard-and-Searches": "/docs/integrations/security-threat-detection/observable-networks", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Opsgenie/Collect_Logs_for_Opsgenie": "/docs/integrations/saas-cloud/opsgenie", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6": "/docs/integrations/security-threat-detection/palo-alto-networks-6", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/01Collect-Logs-for-the-Palo-Alto-Networks-App": "/docs/integrations/security-threat-detection/palo-alto-networks-6", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/Palo-Alto-Networks-App-Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-6", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8": "/docs/integrations/security-threat-detection/palo-alto-networks-8", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Collect_Logs_for_the_Palo_Alto_Networks_8_App": "/docs/integrations/security-threat-detection/palo-alto-networks-8", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Install_the_Palo_Alto_Networks_8_App_and_View_the_Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-8", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/01Collect-Logs-for-the-Palo-Alto-Networks-App": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/Palo-Alto-Networks-App-Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Collect_Logs_for_the_Palo_Alto_Networks_8_App": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Install_the_Palo_Alto_Networks_8_App_and_View_the_Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-9", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_9": "/docs/integrations/pci-compliance/palo-alto-networks-9", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_9/Collect_logs_for_the_Palo_Alto_Networks_9_App": "/docs/integrations/pci-compliance/palo-alto-networks-9", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_9/Install_the_Palo_Alto_Networks_9_App_and_view_the_Dashboards": "/docs/integrations/pci-compliance/palo-alto-networks-9", @@ -3476,9 +3476,9 @@ "/07Sumo-Logic-Apps/24Web_Servers/Nginx_Ingress_ULM/Install_the_Nginx_Ingress_App_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx-ingress", "/07Sumo-Logic-Apps/24Web_Servers/Nginx_Ingress_ULM/Nginx_Ingress_Alerts": "/docs/integrations/web-servers/nginx-ingress", "/07Sumo-Logic-Apps/24Web_Servers/Nginx_Plus_Ingress/Install_the_Nginx_Plus_Ingress_App,_Alerts,_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx-plus-ingress", - "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM": "/docs/integrations/web-servers/nginx-legacy", - "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Global_Intelligence_for_Nginx": "/docs/integrations/web-servers/nginx-legacy", - "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Install_the_Nginx_ULM_App_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx-legacy", + "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM": "/docs/integrations/web-servers/nginx", + "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Global_Intelligence_for_Nginx": "/docs/integrations/web-servers/nginx", + "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Install_the_Nginx_ULM_App_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx", "/07Sumo-Logic-Apps/24Web_Servers/Nginx/Global_Intelligence_for_Nginx_App": "/docs/integrations/global-intelligence/nginx", "/APIs/Search-Job-A": "/docs/api/search-job", "/APIs/02Search_Job_API": "/docs/api/search-job", @@ -3893,5 +3893,10 @@ "/docs/manage/partitions-data-tiers/searching-data-tiers": "/docs/manage/partitions/data-tiers/searching-data-tiers", "/docs/manage/partitions-data-tiers/flex-pricing/estimate-and-actual-scan-data": "/docs/manage/partitions/flex/estimate-scan-data", "/docs/manage/partitions/flex/estimate-and-actual-scan-data": "/docs/manage/partitions/flex/estimate-scan-data", - "/docs/platform-services/automation-service/app-central/integrations/snowflake": "/docs/platform-services/automation-service/app-central/integrations" + "/docs/platform-services/automation-service/app-central/integrations/snowflake": "/docs/platform-services/automation-service/app-central/integrations", + "/docs/integrations/security-threat-detection/palo-alto-networks-6": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/docs/integrations/security-threat-detection/palo-alto-networks-8":"/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/docs/integrations/web-servers/nginx-legacy": "/docs/integrations/web-servers/nginx", + "/docs/integrations/microsoft-azure/active-directory-legacy/": "/docs/integrations/microsoft-azure/active-directory-json" } diff --git a/docs/get-started/faq.md b/docs/get-started/faq.md index 20c673b41c..4fc7d84db2 100644 --- a/docs/get-started/faq.md +++ b/docs/get-started/faq.md @@ -37,7 +37,7 @@ The following table lists data types and some of the popular sources that produc | Databases | | | Server / OS | | | Virtual | | -| Network | | +| Network | | | Content Delivery | | | IaaS / PaaS | | | SaaS | | diff --git a/docs/integrations/app-development/jfrog-artifactory.md b/docs/integrations/app-development/jfrog-artifactory.md index aac36bebd6..811dd45a40 100644 --- a/docs/integrations/app-development/jfrog-artifactory.md +++ b/docs/integrations/app-development/jfrog-artifactory.md @@ -9,7 +9,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; Thumbnail icon -JFrog Artifactory is a universal artifact repository manager that integrates with CI/CD and DevOps tools to provide artifact tracking. The Sumo Logic apps for Artifactory 6 and Artifactory 7 provide insight into your JFrog Artifactory binary repository. Our preconfigured dashboards provide an overview of your system as well as Traffic, Requests and Access, Download Activity, Cache Deployment Activity, and Non-Cached Deployment Activity. +JFrog Artifactory is a universal artifact repository manager that integrates with CI/CD and DevOps tools to provide artifact tracking. The Sumo Logic apps for Artifactory 7 provide insight into your JFrog Artifactory binary repository. Our preconfigured dashboards provide an overview of your system as well as Traffic, Requests and Access, Download Activity, Cache Deployment Activity, and Non-Cached Deployment Activity. If you _do not_ have a Sumo Logic account and want to get up and running quickly, the [JFrog Artifactory Sumo Logic integration](#if-you-do-not-have-a-sumo-logic-account) is the most convenient way to get started. It allows you to access Sumo Logic directly from Artifactory. @@ -20,149 +20,6 @@ If you have an existing Sumo Logic account, you can still use the integration, h * If you're using Artifactory Online, you'll need use the [integration](#artifactory-online-sumo-logic-integration) (our [app](#installing-the-artifactory-app) is not compatible with Artifactory Online). * If you're using Artifactory On-Premise, you can use our [app](#installing-the-artifactory-app) or the [integration](#artifactory-online-sumo-logic-integration). - -## Artifactory 6 - -### Log types - -The Sumo Logic app for Artifactory 6 collects data from the following logs: - -* `artifactory.log`. The main Artifactory log file that contains data on Artifactory server activity. -* `access.log`. The security log containing important information about accepted and denied requests, configuration changes, and password reset requests. The originating IP address for each event is also recorded. -* `request.log`. Generic HTTP traffic information similar to the Apache HTTPd request log. -* `traffic.log`. A log that contains information about site traffic and file sizes. - -For more details about Artifactory logs, refer to the [JFrog Logging documentation](https://www.jfrog.com/confluence/display/RTF/Artifactory+Log+Files) and [Artifactory Log Files](https://www.jfrog.com/confluence/display/RTF6X/Artifactory+Log+Files#ArtifactoryLogFiles-RequestLog). - -Sumo Logic reads logs in the directory `/var/opt/jfrog/artifactory/logs`: -* `artifactory.log` -* `access.log` -* `request.log` -* `traffic.*.log` - - -### Sample logs - -```json -20170113185444|17|REQUEST|1.1.1.1|anonymous|GET|/cloudera-repos/org/slf4j/slf4j-log4j12/1.7.5/slf4j-log4j12-1.7.5.jar|HTTP/1.1|200|8869 -``` - -```json -20170113185444|0|DOWNLOAD|1.1.1.1|cloudera-repos:org/apache/spark/spark-catalyst_2.11/2.0.1/spark-catalyst_2.11-2.0.1.jar.sha1|40 -``` - -```json -2017-01-13 18:54:12,121 [ACCEPTED DEPLOY] pypi-remote-cache:.pypi/test.html for billythekid/1.1.1.1. -``` - -### Sample queries - -```sql title="Data Transfer Over Time" -_sourceCategory=*artifactory* -| where _sourceCategory matches "*artifactory/traffic" -| parse regex -"(?\d{4})(?\d{2})(?\d{2})(?\d{2})(?\d{2})(?\d{2})\|\d*\|(?[^|]*)\|\s*(?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}|[^|]*)\|(?[^:]*):(?[^|]*)\|(?\d*)" nodrop -| timeslice 1h -| sum(size) by _timeslice, direction -| _sum / (1024 * 1024 * 1024) as sizeinGB | sort by _sum -| fields -_sum -| transpose row _timeslice column direction -``` - -```sql title="Requests by Status Code (Every 10 Minutes)" -_sourceCategory=*artifactory* -| where _sourceCategory matches "*artifactory/request" -| parse "*|*|*|*|*|*|*|*|*|*" as datetime, response_time, type, ip, user, method, path, protocol, status_code, size -| timeslice 10m -| count _timeslice, status_code | sort by _count -| transpose row _timeslice column status_code -``` - -```sql title="Unique Paths Accepted Deploys" -_sourceCategory=*artifactory* "ACCEPTED DEPLOY" "-cache" -| where _sourceCategory matches "*artifactory/access" -| parse "[*] *:* for */*" as what, repo, path, user, ip -| parse regex field=ip "(?.*)\." -| where what = "ACCEPTED DEPLOY" and repo matches "*-cache" -| timeslice 10m -| count_distinct(path) as paths by _timeslice -| outlier paths -``` - -### Collecting logs - -This section demonstrates how to collect logs from JFrog Artifactory 6 into Sumo Logic. - -#### Step 1: Activate the traffic.log file - -To activate the `traffic.log` file, add the following parameter to your `artifactory.system.properties` file, located under `$ARTIFACTORY/etc`: -```bash -artifactory.traffic.collectionActive=true -``` - -A restart is required for traffic collection to take effect. - -#### Step 2: Configure a Collector - -Configure an [Installed Collector](/docs/send-data/installed-collectors). - -#### Step 3: Configure Sources - -In this step, you configure four local file sources, one for each log source listed in the table below. When you create a file source for a log type: - -* Use the value from the File Path column below as the **File Path** for the source. -* The value you specify for the source's **Source Category** _must_ end with the suffix shown below in the Source Category column. For example, you could set the Source Category for the Artifactory Server log source to be `foo/artifactory/console`, but not `artifactory/console/foo`. - -The following suffixes are required. For example, you could use `_sourceCategory=/artifactory/console`, but the suffix `artifactory/console` must be used. - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Log sourceFile PathSource Category
Artifactory Server/var/opt/jfrog/artifactory/logs/artifactory.logartifactory/console
Access/var/opt/jfrog/artifactory/logs/access.logartifactory/access
Request/var/opt/jfrog/artifactory/logs/request.logartifactory/request
Traffic/var/opt/jfrog/artifactory/logs/traffic.*.logartifactory/traffic
- -:::note -`_sourceCategory` names are case sensitive. When you run a search using `_sourceCategory`, make sure you use the same case as you did when configuring the source. -::: - -For complete instructions, see [Local File Source](/docs/send-data/installed-collectors/sources/local-file-source). - -1. Configure a Local File source. -2. Configure the Source fields: - * **Name** (required). A name is required. - * **Description** (Optional). - * **Source Category**. (required). -3. Configure the Advanced section: - * **Enable Timestamp Parsing**. True. - * **Time Zone**. Logs are in UTC by default. - * **Timestamp Format**. Auto Detect. - * **Encoding Type**. UTF-8. - * **Multi-line Parsing**. Detect Messages Spanning Multiple Lines, Infer Boundaries. -4. Click **Save**. - - ## Artifactory 7 This procedure documents how to collect logs from JFrog Artifactory 7 into Sumo Logic. diff --git a/docs/integrations/global-intelligence/nginx.md b/docs/integrations/global-intelligence/nginx.md index 652a8ae4fc..56481e9e8b 100644 --- a/docs/integrations/global-intelligence/nginx.md +++ b/docs/integrations/global-intelligence/nginx.md @@ -14,7 +14,7 @@ This feature is available in the following account plans. | CloudFlex | Trial, Enterprise | | Credits | Trial, Enterprise Operations, Enterprise Suite | -[Nginx](https://www.nginx.com/) is a web server that is used as a reverse proxy, load balancer, mail proxy, and HTTP cache. Global Intelligence for Nginx, is a companion to the [Nginx ULM](/docs/integrations/web-servers/nginx-legacy) +[Nginx](https://www.nginx.com/) is a web server that is used as a reverse proxy, load balancer, mail proxy, and HTTP cache. Global Intelligence for Nginx, is a companion to the [Nginx ULM](/docs/integrations/web-servers/nginx) application. It helps DevOps and infrastructure engineers to compare server, and user activity patterns associated with their Nginx servers against other Sumo Logic customer’s servers. Such comparisons can help diagnose potential load, throughput or error issues in Nginx clusters and avoid operational incidents arising from sub-optimal configurations of Nginx clusters.  | Dashboard | Description| @@ -53,7 +53,7 @@ The following sample query is from the Average **Requests Per Second: My Company ## Configuring Log Collection for Global Intelligence for Nginx -Follow the steps on the [Sumo Logic Nginx app](/docs/integrations/web-servers/nginx-legacy) to configure the log collection for Global Intelligence for Nginx app. +Follow the steps on the [Sumo Logic Nginx app](/docs/integrations/web-servers/nginx) to configure the log collection for Global Intelligence for Nginx app. ## Installing the Global Intelligence for Nginx app diff --git a/docs/integrations/microsoft-azure/active-directory-legacy.md b/docs/integrations/microsoft-azure/active-directory-legacy.md deleted file mode 100644 index 395956d2e9..0000000000 --- a/docs/integrations/microsoft-azure/active-directory-legacy.md +++ /dev/null @@ -1,264 +0,0 @@ ---- -id: active-directory-legacy -title: Active Directory Legacy -sidebar_label: Active Directory (Legacy) -description: Allows you to analyze Windows Active Directory logs and gain insight into your deployment. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; - -Thumbnail icon - -The Sumo Logic app for Active Directory Legacy (2008+) allows you to analyze Windows Active Directory logs and gain insight into your deployment. Using the app, you can identify user activity across your network and security administration systems. The app uses predefined searches and Dashboards that provide visibility into your environment for real-time analysis of overall usage. - -We recommend using the Active Directory App in combination with the Windows App. - -## Log types - -Active Directory diagnostic log files are described in more detail in [Microsoft help](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc961809(v=technet.10)). - - -### Sample log messages - -```json title="Domain Controller" -DomainController DName=="DC=local" DomainName=="local" Forest=="local" NetBIOSName=="LOCAL" ControllerHostName=="HOST1DC01.local" IP=="102.240.30.12" Site=="DC1" -``` - - -```json title="AD Domain" -UserMembership SearchBase=="DC=local" DistinguishedName=="NN=Service My-Service,OU=DC=local" Name=="My-Service" ObjectGUID=="c1234249-6401-40e7-18a8-289fbb2faf26" Parent=="DC=local" -``` - - -```js title="Windows Event" -instance of Win32_NTLogEvent -{ - Computer = "HOSTDC01"; - EventCode = 4634; - EventIdentifier = 4634; - Logfile = "Security"; - RecordNumber = 184879601; - SourceName = "Microsoft-Windows-Security-Auditing"; - TimeGenerated = "20170213222816.000000-000"; - TimeWritten = "20170213222816.000000-000"; - Type = "Audit Success"; - EventType = 4; - Category = 12545; - CategoryString = "Logoff"; - Message = "An account was logged off. - -Subject: - Security ID: HOST1DC01$ (S-1-5-21-3123024953-243645673-3382258605-1103) - Account Name: HOST1DC01$ - Account Domain: Local - Logon ID: 0x6C367A5 - -Logon Type: 3 - -This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer."; - InsertionStrings = {"S-1-5-21-3123024953-2436456723-3382258605-1103", "HOST1DC01$", "HOSTING", "0x6c488a5", "3"}; -}; -``` - - -## Sample queries - -```sql title="Directory Service Object Changes (from Active Directory App)" -_sourceCategory=delete_test _sourceName=Security "Directory Service Changes" -| parse "EventCode = *;" as event_id nodrop | parse "Computer = \"*\";" as host nodrop | parse "ComputerName = \"*\";" as host nodrop | parse regex "Message = \"(?[^\r]+?)\r" nodrop | parse "CategoryString = \"*\";" as CategoryString nodrop | parse regex "Subcategory:\s+(?[^\r]+?)\r" nodrop -| parse regex "Logfile = \"Security\";[\s\S]+?Account Name:\s+(?[^\r]+?)\r[\s\S]+?Account Domain:\s+(?[^\r]+?)\r" nodrop -| parse regex "Logfile = \"Security\";[\s\S]+?Account Name:\s+(?[^\r]+?)\r[\s\S]+?Account Domain:\s+(?[^\r]+?)\r[\s\S]+?Account Name:\s+(?[^\r]+?)\r[\s\S]+?Account Domain:\s+(?[^\r]+?)(?:\r|\";)" nodrop -| parse regex "Directory Service:[\s\S]+?Name:\s+(?[^\r]+?)\r" nodrop | parse regex "Directory Service:[\s\S]+?Type:\s+(?[^\r]+?)\r" nodrop | parse "Object:\r\n\tDN:\t*\r\n\tGUID" as dest_ou nodrop -| fields msg_summary, categoryString, subcategory, event_id, src_user, src_domain, dest_user, dest_domain, host -| where categoryString="Directory Service Changes" or subcategory="Directory Service Changes" -``` - - -## Collecting Log Files for the Active Directory Legacy App - -Windows Active Directory (AD) is a directory service developed by Microsoft that stores information about various objects on a network. - -The Active Directory Legacy App analyzes, then graphically displays this information to users and network administrators, including information about domain controllers, forest, site, users, groups, computers and organizational units. Sumo Logic allows you to augment or couple regular Windows Events with this data to get more contextual insights from the logs. For example, by augmenting the events based on the domain name, you can build searches specific to a particular AD site or track activities to users under a specific Organizational Unit. - -### Prerequisites - -To begin collecting Active Directory logs, first: - -* A. Verify the Active Directory module -* B. Download and deploy Sumo Logic scripts - - -### A. Verify Active Directory module - -Before proceeding, verify that the Active Directory module is available. The Active Directory module is supported on Windows 7 and Windows 2008 Server (R2 and later) if Remote Server Administration Tools (RSAT) are installed. You'll find more information at [Microsoft TechNet](https://technet.microsoft.com/en-us/library/dd378937(WS.10).aspx). - -**To verify that Active Directory Module is available** - -1. Choose **Start > Administrative Tools**. -2. Look for **Active Directory Module for Windows PowerShell**. -3. If the module isn't installed, install RSAT as described on [Microsoft TechNet](https://technet.microsoft.com/en-us/library/cc730825.aspx). - - -### B. Download and deploy Sumo scripts - -In order to collect files, download the following scripts: - -* adQueryDS.ps1: Core functions that are leveraged by the other scripts -* adObjectCollector: Active Directory object collector -* domainCollector: Active Directory domain collector - - -These scripts should be deployed on a machine that is part of the domain where the log files exist. After deploying the scripts, you'll need to configure a script source on Sumo Logic for **domainCollector.ps1** and another script source for **adObjectCollector.ps1**. - -To deploy the scripts, do the following: - -1. Download the scripts to a folder, for example `C:\PSScripts`. -2. Edit the scripts so that `SCRIPTPATH` matches the path to the folder. - -Testing the scripts is optional, but recommended. - -To manually test the scripts, do the following: - -1. Open a command line interface. -2. Run `domainCollector` and `adObjectCollector`, using the path where the scripts were installed. - -```sh -powershell.exe -ExecutionPolicy Bypass -InputFormat None -File c:\PSScripts\domainCollector.ps1 -powershell.exe -ExecutionPolicy Bypass -InputFormat None -File c:\PSScripts\adObjectCollector.ps1 -``` - - -If the setup was successful, Active Directory domain and object information will be collected and the scripts will print results to the screen: - - -## Step 1: Configure a collector - -Configure an [Installed Collector](/docs/send-data/installed-collectors). - -Make sure the collector is installed on a machine that belongs to the domain managed by Active Directory. You can install a single collector and use a remote source, but Sumo Logic recommends installing a collector on each of your domain controllers for performance. - - -## Step 2: Configure event log sources - -If you have installed collectors on each domain controller, as recommended, configure a [Local Windows Event Log Source](/docs/send-data/installed-collectors/sources/local-windows-event-log-source) on each one. Otherwise, configure a [Remote Windows Event Log Source](/docs/send-data/installed-collectors/sources/remote-windows-event-log-source) to collect events from each Active Directory server. For these Windows Event sources, set the source category to **OS/Windows** and **Event Format** as **Collect using legacy format**. - - - -**Collect using legacy format.** Events retain their default text format from Windows. - - -## Step 3: Configure Script Sources - -Perform the configuration described below twice, to set up one script source for `adObjectCollector.ps1` and one for `domainCollector.ps1`. - -If your Domain Controllers are in the same domain, then you can just run the scripts on a select one or a few of the Domain Controller machines. Because each Domain Controller may have or allow different data, you will need to select the best ones. The adObjectCollector.ps1 script is the heaviest. There is no reason to pull your AD objects multiple times. - -To configure a script source, do the following: - -1. In Sumo Logic, select **Manage Data > Collection > Collection**. -2. Find the name of the installed collector to which you'd like to add a Source. Click **Add...** then choose **Add Source** from the pop-up menu. -3. Select **Script** for the Source type. Collectors using version 19.245-4 and later do not allow Script Sources to run by default. To allow Script Sources you need to set the Collector parameter `enableScriptSource` in [user.properties](/docs/send-data/installed-collectors/collector-installation-reference/user-properties) to true and [restart](/docs/send-data/collection/start-stop-collector-using-scripts.md) the Collector. -4. **Name**. Enter **DomainCollector** or **ADObjects**, depending on which script you are configuring. Description is optional. -5. **Source Host** (optional). Enter the hostname or the IP address of the machine. The hostname is stored in a searchable field called `_sourceHost`. The hostname can be a maximum of 128 characters. -6. **Source Category**. Enter a Source Category following the [Best Practices](/docs/send-data/best-practices) that allows you to include both the logs from these scripts and the logs from your Windows Event logs from the Domain Controller(s). For example, `DC/Windows/adObjects`, `DC/Windows/domainCollector`, and `DC/Windows/Event`. This will allow you to specify a query like `sourceCategory=DC/Windows/*` to bring in all AD-related logs. -7. **Frequency.** Select a short time for testing (for example, every 5 minutes), then change it to a longer interval once you confirm it’s working. - - -The **Frequency** option should be set according to your environment. We use a short interval in our example and testing, but in your deployment, the proper **Frequency** value depends on how often your topology changes. It's important that the **Frequency** be set to a time longer than it takes for the script to run. For example, if a script takes two hours to finish, the **Frequency** should be set to **Every 3 Hours**. If the topology is relatively stable, the **Frequency** can be set to a longer value, such as **Every 12 hours** (it is recommended that each script run at least once every day). - - -1. If you'd like to set a timeout for your script, select **Specify a timeout for your command**. If you do not need a timeout, or if you're running a script once daily, we recommend that you leave this option deselected. -2. **Command**. Select **PowerShell Script.** -3. **Script.** Do one of the following: - * If you have the script saved to a file location and you do not have restrictions on running scripts, choose **Type a path to the script to execute** and enter the path to the script. For example, `c:\PSScripts\adObjectCollector.ps1` or `c:\PSScripts\domainCollector.ps1`. (The script path you enter will depend on which script source you are currently configuring.) - * If you have restrictions for running scripts, then select **Type the script the execute**. Enter the command executed during testing on your system. The command will be specific to the script you’re configuring: - ``` - powershell.exe -ExecutionPolicy Bypass -InputFormat None -File c:\PSScripts\adObjectCollector.ps1 - powershell.exe -ExecutionPolicy Bypass -InputFormat None -File c:\PSScripts\domainCollector.ps1 - ``` -4. **Working Directory**: Enter the path where your scripts are located. -5. Click the icon next to **Processing Rules** to expand the dialog. -6. Click **Add Rule**. -7. **Name**. Enter a name for the processing rule (for example, domainCollector). -8. **Filter**. Enter the following filters to exclude command outputs from being logged. -`.*domainCollector\.ps1.* \ -.*adObjectCollector\.ps1.* \ -.*adQueryDS\.ps1.*` -9. **Type**: Select **Exclude messages that match**. -10. Click **Save** to create the source. - - - -## Installing the Sumo Logic App - -Now that you have set up collection for Active Directory, install the Sumo Logic App for Active Directory Legacy to use the pre-configured searches and dashboards that provide visibility into your environment for real-time analysis of overall usage. - -To install the app: - -Locate and install the app you need from the **App Catalog**. If you want to see a preview of the dashboards included with the app before installing, click **Preview Dashboards**. - -1. From the **App Catalog**, search for and select the app. -2. To install the app, click **Add to Library** and complete the following fields. - * **App Name.** You can retain the existing name, or enter a name of your choice for the app.
 - * **Data Source.** Select **Enter a Custom Data Filter** and enter a filter that references the Windows Event Logs source and the script sources" (configured as described in [Collect Active Directory Log Files](/docs/integrations/microsoft-azure/active-directory-legacy#collecting-log-files-for-the-active-directory-legacy-app)). For example: `(_sourceCategory=OS/Windows OR _sourceCategory=*adscripts*)`. - * **Advanced**. Select the **Location in Library** (the default is the Personal folder in the library), or click **New Folder** to add a new folder. -3. Click **Add to Library**. - -Once an app is installed, it will appear in your **Personal** folder, or other folder that you specified. From here, you can share it with your organization. See [Welcome to the New Library](/docs/get-started/library) for information on working with the library in the new UI. - -Panels will start to fill automatically. It's important to note that each panel slowly fills with data matching the time range query and received since the panel was created. Results won't immediately be available, but with a bit of time, you'll see full graphs and maps. - -Sumo Logic recommends using the Sumo Logic App for Active Directory in combination with the [Sumo Logic App for Windows](/docs/integrations/microsoft-azure/windows-legacy). - - -## Viewing Active Directory Legacy Dashboards - -The Sumo Logic application for Windows Active Directory (AD) includes several Dashboards that allow you instant access to information about your system's visitors, traffic, and web server operations. - - -### Information Dashboard - -This Dashboard will not display data unless you have downloaded and deployed the scripts, as described in [Collecting Active Directory log files](/docs/integrations/microsoft-azure/active-directory-legacy#collecting-log-files-for-the-active-directory-legacy-app). - - -By default the time range for these panels is two hours. If your source only pulls in data every 12-24 hours, you may see a No Data Available error. Adjust the time range for the panels in this dashboard to match your source. - -**Topology.** Displays your deployment's topology listing the forests, sites, domain DNs, and netbiosnames that have been active for the past two hours in a table. - -**Organizational Units per Domain.** Shows the distinct organizational units per domain in a bar chart for the past two hours. - -**Groups per Domain.** Provides information on the distinct groups per domain in a bar chart for the past two hours. - -**Computer OS per Domain.** Displays the computer operating systems used by visitors to your site per domain for the past two hours. - -Active Directory Legacy dashboards - - -### Service Activity - -Active Directory Legacy dashboards - -**Top 10 Messages.** Displays the top 10 messages reported in your system with message text and count in a table for the past 24 hours. - -**Rights Management.** Reports the events for rights assigned or removed in timeslices of one hour for the past 24 hours using a combination line chart. - -**Messages Over Time by Category.** Provides details on the messages reported by your system by category in timeslices of one hour over the last 24 hours, displayed in a combination line chart. - -**Logon/off Activity.** Displays details on remote and interactive logon and logoff activity in timeslices of one hour for the past 24 hours using a stacked column chart. - -**Object Creation.** Reports on creation events for users, computers, groups, and objects in timeslices of one hour for the past 24 hours using a stacked column chart. - -**Object Deletion.** Reports on deletion events for users, computers, groups, and objects in timeslices of one hour for the past 24 hours using a combination line chart. - - -### Service Failures - -Active Directory Legacy dashboards - -**Successes vs Failures.** Displays the number of messages generated by your system for success vs failure in timeslices of one hour over the past 24 hours, in a stacked column chart. - -**Admin Activity by Category.** Shows the administrator activity by category and count for the past 24 hours in a table. - -**Audit Failures Over Time.** Displays the type and number of failures in timeslices of one hour for the past 24 hours in a stacked column chart. - -**All Failures by IP.** Provides the IP addresses where failures have occurred along with the number of failures over the last 24 hours in a table. diff --git a/docs/integrations/microsoft-azure/index.md b/docs/integrations/microsoft-azure/index.md index 2722bccc8a..af51fed138 100644 --- a/docs/integrations/microsoft-azure/index.md +++ b/docs/integrations/microsoft-azure/index.md @@ -387,13 +387,6 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi

A guide to the Sumo Logic app for Microsoft Teams.

-
-
- Thumbnail icon -

PCI Compliance for Windows Legacy

-

A guide to the Sumo Logic app for PCI Compliance for Windows Legacy.

-
-
Thumbnail icon diff --git a/docs/integrations/microsoft-azure/windows-legacy-pci-compliance.md b/docs/integrations/microsoft-azure/windows-legacy-pci-compliance.md deleted file mode 100644 index c1f2b61568..0000000000 --- a/docs/integrations/microsoft-azure/windows-legacy-pci-compliance.md +++ /dev/null @@ -1,150 +0,0 @@ ---- -id: windows-legacy-pci-compliance -title: PCI Compliance for Windows Legacy -sidebar_label: PCI Compliance For Windows (Legacy) -description: The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; - -Thumbnail icon - -This guide helps you set up Sumo Logic Collectors, and install the PCI Compliance for Windows Legacy application, so you can begin monitoring your usage and determine if you are meeting Compliance benchmarks. - -## Log types - -The PCI Compliance For Windows Legacy App uses Windows Security Event and System Event logs. It does not work with third-party logs. - -### Sample log messages - -``` -instance of Win32_NTLogEvent -{ - Category = 13571; - CategoryString = "MPSSVC Rule-Level Policy Change"; - ComputerName = "aphrodite.sumolab.org"; - EventCode = 4957; - EventIdentifier = 4957; - EventType = 5; - InsertionStrings = {"CoreNet-IPHTTPS-In", "Core Networking - IPHTTPS (TCP-In)", "Local Port"}; - Logfile = "Security"; - Message = "Windows Firewall did not apply the following rule: - - Rule Information: - ID: CoreNet-IPHTTPS-In - Name: Core Networking - IPHTTPS (TCP-In) - - Error Information: - Reason: Local Port resolved to an empty set."; - RecordNumber = 1441653878; - SourceName = "Microsoft-Windows-Security-Auditing"; - TimeGenerated = "20130411232352.140400-000"; - TimeWritten = "20130411232352.140400-000"; - Type = "Audit Failure"; -}; -``` - - -### Sample queries - -```sql title="Recent Policy Changes" -_sourceCategory=OS/Windows/Events "Policy Change" -| parse regex "CategoryString = \"(?[^\"]+?)\";[\s\S]+?Logfile = \"Security\"" -| count by category -| where category matches "*Policy Change*" -``` - - -## Collecting Logs - -This section provides instructions for configuring log collection for the PCI Compliance for Windows Legacy App. - - -### Configure a Collector and a Source - -To configure a collector and source, do the following: - -1. Configure an [Installed Windows collector](/docs/send-data/installed-collectors/windows) through the user interface or from the command line. -2. Configure either a local or remote Windows Event Log source. To configure a Windows Event Log source set the following: - * **Event Format.** Select **Collect using legacy format.** Events retain their default text format from Windows. - -For more information on local or remote Windows Event Log Source configuration, refer to [Local Windows Event Log Source](/docs/send-data/installed-collectors/sources/local-windows-event-log-source) and [Remote Windows Event Log Source](/docs/send-data/installed-collectors/sources/remote-windows-event-log-source). - -Make sure to set the Source Category when configuring the Windows Event Log source. For example: `OS/Windows/Events`. - -This section provides instructions for configuring log collection for the PCI Compliance for Windows Legacy App. - - -## Installing the PCI Compliance for Windows Legacy App - -This section provides instructions for installing the PCI Compliance for Windows Legacy App, along with examples of each of the App dashboards. The PCI Compliance for Windows Legacy App offers pre-built dashboards and queries to help you track your Windows system, user accounts, login activity, and Windows updates. - -Now that you have set up collection, install the Sumo Logic App for PCI Compliance for Windows Legacy App to use the pre-configured searches and dashboards that provide insight into your data. - -import AppInstall from '../../reuse/apps/app-install.md'; - - - -## Viewing the Windows Legacy PCI Compliance Dashboards - -### Windows - PCI Req 02, 08, 10 - Account, User, System Monitoring - -Track your user accounts and recent system changes. - -Windows - PCI Req 02, 08, 10 - Account, User, System Monitoring - -* **User Account Created.** Aggregation table of the number of user accounts created in the last 24 hours. -* **User Account Deleted.** Aggregation table of the number of user accounts deleted in the last 24 hours. -* **User Account Enabled.** Aggregation table of the number of user accounts enabled in the last 24 hours. -* **User Account Disabled.** Aggregation table of the number of user accounts disabled in the last 24 hours. -* **User Account Locked.** Aggregation table of the number of user accounts locked in the last 24 hours. -* **Actions by Privileged Accounts.** Aggregation table of the number of actions taken by privileged accounts over the last 24 hours. - -* **Tampering Audit Logs.** Aggregation table of the number of destination hosts whose logs were modified or cleared in the last 24 hours. -* **System Time Change.** Aggregation table of the number of services with a change to their system time over the last 24 hours. -* **Policy Changes.** Aggregation table of the number of services with policy changes over the last 24 hours. -* **System Restarted.** Aggregation table of the number of services started over the last 24 hours. -* **Service Stopped.** Aggregation table of the number of services stopped over the last 24 hours. -* **Service Execution Trend.** Trend of the different services being executed over time. - - -### Windows - PCI Req 02, 10 - Login Activity - -Track login successes and failures. - -Windows - PCI Req 02, 10 - Login Activity - -* **Failed Logins.** Count of failed logins over the last 24 hours. -* **Failed Logins.** Aggregation table of the date, -* **Successful logins.** Total number of successful logins over the last 24 hours. Compare to Failed Logins to determine if the number of failed logins to successful logins is consistent with normal behavior or indicative of an attack. -* **Successful logins.** Aggregation table of successful logins, including date, time, event code, error code, and count. - -* **Default Login-Failure.** Aggregation table of failed default logins. -* **Default Login-Success.** Aggregation table of successful default logins. - - -### Windows - PCI Req 08 - Other User Activity - - -Track user activities such as password changes, password resets, excessive failed access attempts, unlocked accounts, and disabled accounts. - -Windows - PCI Req 08 - Other User Activity - -* **User Account Password Changes.** Displays an aggregation table of the times passwords were changed, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred. -* **User Account Password Reset.** Displays an aggregation table of the times passwords were reset, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred. -* **Excessive Failed Access Attempts.** Displays an aggregation table of the excessive failed access attempts, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred. -* **User Account Unlocked.** Displays an aggregation table of the times a user account was unlocked the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred. -* **User Account Disabled but not deleted.** Displays an aggregation table of the times a user account was unlocked, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred. - - -### Windows - PCI Req 06 - Windows Updates Activity - -Track your Windows Update activities. - -Windows - PCI Req 06 - Windows Updates Activity - -* **All Windows Updates.** Aggregation table displaying all updated hosts in the past 24 hours, success/failure of that update, and any relevant error codes. -* **Recent Windows Update Failures.** Aggregation table displaying all update failures in the last 7 days, update that failed, time of failure, and current status. -* **Windows Update Trend.** Bar chart that displays 7-day trend of updates success and failure time sliced by hour. -* **Windows Update Summary by Host.** Aggregation table of the hosts and a count of that host’s update success or failure for the past 7 days. -* **Windows Update Summary.** Aggregation table of the latest Windows updates for the last 7 days and a count of their successes and failures diff --git a/docs/integrations/pci-compliance/index.md b/docs/integrations/pci-compliance/index.md index a36d7af29b..83e089d771 100644 --- a/docs/integrations/pci-compliance/index.md +++ b/docs/integrations/pci-compliance/index.md @@ -71,11 +71,4 @@ With the Sumo Logic apps for PCI Compliance, you can meet evolving PCI requireme

A guide to the Sumo Logic app for PCI Compliance for Windows JSON.

-
-
- Thumbnail icon -

PCI Compliance for Windows Legacy

-

A guide to the Sumo Logic app for PCI Compliance for Windows Legacy.

-
-
diff --git a/docs/integrations/product-list.md b/docs/integrations/product-list.md index 3fb58b7c72..29f4d37b7c 100644 --- a/docs/integrations/product-list.md +++ b/docs/integrations/product-list.md @@ -27,7 +27,7 @@ Types of integrations: | Logo | Vendors and Products | Integrations | | :-- | :-- | :-- | | Thumbnail icon | [Acquia](https://www.acquia.com/) | App: [Acquia](/docs/integrations/saas-cloud/acquia/) | -| Thumbnail icon | [Active Directory](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc961809(v=technet.10)) | Apps:
- [Active Directory 2008+ (Legacy)](/docs/integrations/microsoft-azure/active-directory-legacy/)
- [Active Directory 2012+ (JSON)](/docs/integrations/microsoft-azure/active-directory-json/)
- [Active Directory JSON - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/)
Automation integrations:
- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)
- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/)
Collectors:
- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/)
- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/) | +| Thumbnail icon | [Active Directory](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc961809(v=technet.10)) | Apps:
- [Active Directory 2012+ (JSON)](/docs/integrations/microsoft-azure/active-directory-json/)
- [Active Directory JSON - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/)
Automation integrations:
- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)
- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/)
Collectors:
- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/)
- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/) | | Thumbnail icon | [Abnormal Security](https://abnormalsecurity.com/) | Automation integration: [Abnormal Security](/docs/platform-services/automation-service/app-central/integrations/abnormal-security/)
Collector: [Abnormal Security Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/abnormal-security-source/) | | Thumbnail icon | [Abuse.ch](https://abuse.ch/) | Automation integrations:
- [Abuse.ch SSLBL Feed](/docs/platform-services/automation-service/app-central/integrations/abuse.ch-sslbl-feed/)
- [Malware Bazaar](/docs/platform-services/automation-service/app-central/integrations/malware-bazaar/)
- [URLhaus Abuse](/docs/platform-services/automation-service/app-central/integrations/urlhaus-abuse/) | | Thumbnail icon | [AbuseIPDB](https://www.abuseipdb.com/) | Automation integration: [AbuseIPDB](/docs/platform-services/automation-service/app-central/integrations/abuseipdb/) | @@ -466,7 +466,7 @@ Types of integrations: | Thumbnail icon | [Netskope](https://www.netskope.com/) | Apps:
- [Netskope](/docs/integrations/security-threat-detection/netskope/)
- [Netskope Legacy](/docs/integrations/security-threat-detection/netskope-legacy-collection/)
Automation integrations:
- [Netskope](/docs/platform-services/automation-service/app-central/integrations/netskope/)
- [Netskope V2](/docs/platform-services/automation-service/app-central/integrations/netskope-v2/)
Collectors:
- [Netskope Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/netskope-source/)
- [Netskope WebTx Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/netskope-webtx-source/) | | Thumbnail icon | [Neustar](https://www.home.neustar/) | Automation integration: [Neustar IP GeoPoint](/docs/platform-services/automation-service/app-central/integrations/neustar-ip-geopoint/) | | Thumbnail icon | [New Relic](https://newrelic.com/) | Webhook: [Webhook Connection for New Relic](/docs/alerts/webhook-connections/new-relic/) | -| Thumbnail icon | [Nginx](https://www.nginx.com/) | Apps:
- [Nginx](/docs/integrations/web-servers/nginx/)
- [Nginx (Legacy)](/docs/integrations/web-servers/nginx-legacy/)
- [Nginx Ingress](/docs/integrations/web-servers/nginx-ingress/)
- [Nginx - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/nginx-opentelemetry/)
- [Global Intelligence for Nginx](/docs/integrations/global-intelligence/nginx)
Collector: [Nginx Access Logs - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/nginx-access-logs/) | +| Thumbnail icon | [Nginx](https://www.nginx.com/) | Apps:
- [Nginx](/docs/integrations/web-servers/nginx/)
- [Nginx Ingress](/docs/integrations/web-servers/nginx-ingress/)
- [Nginx - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/nginx-opentelemetry/)
- [Global Intelligence for Nginx](/docs/integrations/global-intelligence/nginx)
Collector: [Nginx Access Logs - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/nginx-access-logs/) | | Thumbnail icon | [Nginx Plus](https://www.nginx.com/products/nginx/) | Apps:
- [Nginx Plus](/docs/integrations/web-servers/nginx-plus/)
- [Nginx Plus Ingress](/docs/integrations/web-servers/nginx-plus-ingress/) | | Thumbnail icon | [Nmap](https://nmap.org/) | Automation integration: [Nmap](/docs/platform-services/automation-service/app-central/integrations/nmap/) | | Thumbnail icon | [Nobl9](https://www.nobl9.com/) | Webhook: [Nobl9](/docs/integrations/webhooks/nobl9/) | @@ -497,7 +497,7 @@ Types of integrations: | Logo | Vendors and Products | Integrations | | :-- | :-- | :-- | | Thumbnail icon | [PagerDuty](https://www.pagerduty.com/) | Apps:
- [PagerDuty V2](/docs/integrations/saas-cloud/pagerduty-v2/)
- [PagerDuty V3](/docs/integrations/saas-cloud/pagerduty-v3/)
Automation integration: [PagerDuty](/docs/platform-services/automation-service/app-central/integrations/pagerduty/)
Webhook: [Webhook Connection for PagerDuty](/docs/alerts/webhook-connections/pagerduty/) | -| Thumbnail icon | [Palo Alto Networks](https://www.paloaltonetworks.com/) | Apps:
- [Palo Alto Firewall 9](/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9/)
- [Palo Alto Firewall 10](/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10/)
- [Palo Alto Networks 6](/docs/integrations/security-threat-detection/palo-alto-networks-6/)
- [Palo Alto Networks 8](/docs/integrations/security-threat-detection/palo-alto-networks-8/)
- [Palo Alto Networks 9](/docs/integrations/security-threat-detection/palo-alto-networks-9/)
- [PCI Compliance for Palo Alto Networks 9](/docs/integrations/pci-compliance/palo-alto-networks-9/)
- [PCI Compliance for Palo Alto Networks 10](/docs/integrations/pci-compliance/palo-alto-networks-10/)
- [Palo Alto Cortex XDR](/docs/integrations/saas-cloud/palo-alto-cortex-xdr/)
Automation integrations:
- [Cortex XDR](/docs/platform-services/automation-service/app-central/integrations/cortex-xdr/)
- [Palo Alto AutoFocus](/docs/platform-services/automation-service/app-central/integrations/palo-alto-autofocus/)
- [Palo Alto Networks NGFW](/docs/platform-services/automation-service/app-central/integrations/palo-alto-networks-ngfw/)
- [Palo Alto Networks Panorama V2](/docs/platform-services/automation-service/app-central/integrations/palo-alto-networks-panorama-v2/)
Collectors:
- [Collect Logs from Palo Alto Networks Cortex Data Lake](/docs/send-data/collect-from-other-data-sources/collect-logs-palo-alto-networks-cortex/)
- [Palo Alto Cortex XDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/palo-alto-cortex-xdr-source/)
- [Palo Alto Firewall - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/palo-alto-firewall/)
Partner integration: [Cortex XSOAR](https://xsoar.pan.dev/docs/reference/integrations/sumo-logic) | +| Thumbnail icon | [Palo Alto Networks](https://www.paloaltonetworks.com/) | Apps:
- [Palo Alto Firewall 9](/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-9/)
- [Palo Alto Firewall 10](/docs/integrations/cloud-security-monitoring-analytics/palo-alto-firewall-10/)
- [Palo Alto Networks 9](/docs/integrations/security-threat-detection/palo-alto-networks-9/)
- [PCI Compliance for Palo Alto Networks 9](/docs/integrations/pci-compliance/palo-alto-networks-9/)
- [PCI Compliance for Palo Alto Networks 10](/docs/integrations/pci-compliance/palo-alto-networks-10/)
- [Palo Alto Cortex XDR](/docs/integrations/saas-cloud/palo-alto-cortex-xdr/)
Automation integrations:
- [Cortex XDR](/docs/platform-services/automation-service/app-central/integrations/cortex-xdr/)
- [Palo Alto AutoFocus](/docs/platform-services/automation-service/app-central/integrations/palo-alto-autofocus/)
- [Palo Alto Networks NGFW](/docs/platform-services/automation-service/app-central/integrations/palo-alto-networks-ngfw/)
- [Palo Alto Networks Panorama V2](/docs/platform-services/automation-service/app-central/integrations/palo-alto-networks-panorama-v2/)
Collectors:
- [Collect Logs from Palo Alto Networks Cortex Data Lake](/docs/send-data/collect-from-other-data-sources/collect-logs-palo-alto-networks-cortex/)
- [Palo Alto Cortex XDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/palo-alto-cortex-xdr-source/)
- [Palo Alto Firewall - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/palo-alto-firewall/)
Partner integration: [Cortex XSOAR](https://xsoar.pan.dev/docs/reference/integrations/sumo-logic) | | Thumbnail icon | [Palo Alto Networks Prisma Cloud (formerly Evident.io ESP)](https://www.paloaltonetworks.com/prisma/cloud) | App: [Evident.io ESP](/docs/integrations/security-threat-detection/evident-security-platform/)
Automation integration: [Prisma Cloud](/docs/platform-services/automation-service/app-central/integrations/prisma-cloud/) | | Thumbnail icon | [PaperTrail](https://www.papertrail.com/) | Webhook: [PaperTrail](/docs/integrations/webhooks/papertrail/) | | Thumbnail icon | [Phantombuster](https://phantombuster.com/) | Automation integration: [Phantombuster](/docs/platform-services/automation-service/app-central/integrations/phantombuster/) | @@ -616,7 +616,7 @@ Types of integrations: | :-- | :-- | :-- | | Thumbnail icon | [Watchguard](https://www.watchguard.com/) | Automation integration: [Panda EDR](/docs/platform-services/automation-service/app-central/integrations/panda-edr/) | | Thumbnail icon | [WhoisXML](https://main.whoisxmlapi.com/) | Automation integration: [WhoisXML](/docs/platform-services/automation-service/app-central/integrations/whoisxml/) | -| Thumbnail icon | [Windows](https://www.microsoft.com/en-us/windows) | Apps:
- [Windows Cloud Security Monitoring and Analytics](/docs/integrations/cloud-security-monitoring-analytics/windows/)
- [Windows - Cloud Security Monitoring and Analytics - OpenTelemetry](/docs/integrations/cloud-security-monitoring-analytics/opentelemetry/windows-opentelemetry/)
- [Windows JSON](/docs/integrations/microsoft-azure/windows-json/)
- [Windows - OpenTelemetry](/docs/integrations/hosts-operating-systems/opentelemetry/windows-opentelemetry/)
- [Windows Performance](/docs/integrations/microsoft-azure/performance/)
- [Windows Legacy](/docs/integrations/microsoft-azure/windows-legacy/)
- [PCI Compliance For Windows (JSON)](/docs/integrations/microsoft-azure/windows-json-pci-compliance/)
- [PCI Compliance for Windows JSON - OpenTelemetry](/docs/integrations/pci-compliance/opentelemetry/windows-json-opentelemetry/)
- [PCI Compliance For Windows (Legacy)](/docs/integrations/microsoft-azure/windows-legacy-pci-compliance/)
Automation integration: [PowerShell Tools](/docs/platform-services/automation-service/app-central/integrations/powershell-tools/)
Collectors:
- [Add a Collector to a Windows Machine Image](/docs/send-data/installed-collectors/collector-installation-reference/add-collector-windows-machine-image/)
- [Install a Collector on Windows](/docs/send-data/installed-collectors/windows/)
- [Install OpenTelemetry Collector on Windows](/docs/send-data/opentelemetry-collector/install-collector/windows/)
- [Local Windows Event Log Source](/docs/send-data/installed-collectors/sources/local-windows-event-log-source/)
- [Local Windows Performance Monitor Log Source](/docs/send-data/installed-collectors/sources/local-windows-performance-monitor-log-source/)
- [Microsoft Windows - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-windows/)
- [Preconfigure a Machine to Collect Remote Windows Events](/docs/send-data/installed-collectors/sources/preconfigure-machine-collect-remote-windows-events/)
- [Preconfigure a Machine to Collect Remote Windows Performance Monitoring Logs](/docs/send-data/installed-collectors/sources/preconfigure-machine-collect-remote-windows-performance-monitoring-logs/)
- [Remote Windows Event Log Source](/docs/send-data/installed-collectors/sources/remote-windows-event-log-source/)
- [Remote Windows Performance Monitor Log Source](/docs/send-data/installed-collectors/sources/remote-windows-performance-monitor-log-source/)
- [Windows Event Source Custom Channels](/docs/send-data/installed-collectors/sources/windows-event-source-custom-channels/)| +| Thumbnail icon | [Windows](https://www.microsoft.com/en-us/windows) | Apps:
- [Windows Cloud Security Monitoring and Analytics](/docs/integrations/cloud-security-monitoring-analytics/windows/)
- [Windows - Cloud Security Monitoring and Analytics - OpenTelemetry](/docs/integrations/cloud-security-monitoring-analytics/opentelemetry/windows-opentelemetry/)
- [Windows JSON](/docs/integrations/microsoft-azure/windows-json/)
- [Windows - OpenTelemetry](/docs/integrations/hosts-operating-systems/opentelemetry/windows-opentelemetry/)
- [Windows Performance](/docs/integrations/microsoft-azure/performance/)
- [Windows Legacy](/docs/integrations/microsoft-azure/windows-legacy/)
- [PCI Compliance For Windows (JSON)](/docs/integrations/microsoft-azure/windows-json-pci-compliance/)
- [PCI Compliance for Windows JSON - OpenTelemetry](/docs/integrations/pci-compliance/opentelemetry/windows-json-opentelemetry/)
-
Automation integration: [PowerShell Tools](/docs/platform-services/automation-service/app-central/integrations/powershell-tools/)
Collectors:
- [Add a Collector to a Windows Machine Image](/docs/send-data/installed-collectors/collector-installation-reference/add-collector-windows-machine-image/)
- [Install a Collector on Windows](/docs/send-data/installed-collectors/windows/)
- [Install OpenTelemetry Collector on Windows](/docs/send-data/opentelemetry-collector/install-collector/windows/)
- [Local Windows Event Log Source](/docs/send-data/installed-collectors/sources/local-windows-event-log-source/)
- [Local Windows Performance Monitor Log Source](/docs/send-data/installed-collectors/sources/local-windows-performance-monitor-log-source/)
- [Microsoft Windows - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-windows/)
- [Preconfigure a Machine to Collect Remote Windows Events](/docs/send-data/installed-collectors/sources/preconfigure-machine-collect-remote-windows-events/)
- [Preconfigure a Machine to Collect Remote Windows Performance Monitoring Logs](/docs/send-data/installed-collectors/sources/preconfigure-machine-collect-remote-windows-performance-monitoring-logs/)
- [Remote Windows Event Log Source](/docs/send-data/installed-collectors/sources/remote-windows-event-log-source/)
- [Remote Windows Performance Monitor Log Source](/docs/send-data/installed-collectors/sources/remote-windows-performance-monitor-log-source/)
- [Windows Event Source Custom Channels](/docs/send-data/installed-collectors/sources/windows-event-source-custom-channels/)| | Thumbnail icon | [WithSecure](https://www.withsecure.com/en/home) | Automation integrations:
- [WithSecure Elements](/docs/platform-services/automation-service/app-central/integrations/withsecure-elements/)
- [WithSecure Endpoint Protection](/docs/platform-services/automation-service/app-central/integrations/withsecure-endpoint-protection/) | | Thumbnail icon | [Wittra](https://www.wittra.io/) | Automation integration: [Wittra](/docs/platform-services/automation-service/app-central/integrations/wittra/) | | Thumbnail icon | [Workday](https://www.workday.com/) | App: [Workday](/docs/integrations/saas-cloud/workday/)
Collector: [Workday Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/workday-source/) | diff --git a/docs/integrations/security-threat-detection/index.md b/docs/integrations/security-threat-detection/index.md index a36bf306e3..0469699d73 100644 --- a/docs/integrations/security-threat-detection/index.md +++ b/docs/integrations/security-threat-detection/index.md @@ -105,18 +105,6 @@ Sumo Logic provides a variety of apps for security products and platforms, from

A guide to the Sumo Logic app for Observable Networks.

-
-
- thumbnail icon

Palo Alto Networks 6

-

A guide to the Sumo Logic app for Palo Alto Networks 6.

-
-
-
-
- thumbnail icon

Palo Alto Networks 8

-

A guide to the Sumo Logic app for Palo Alto Networks 8.

-
-
thumbnail icon

Palo Alto Networks 9

diff --git a/docs/integrations/security-threat-detection/palo-alto-networks-6.md b/docs/integrations/security-threat-detection/palo-alto-networks-6.md deleted file mode 100644 index 3bf9a3e94c..0000000000 --- a/docs/integrations/security-threat-detection/palo-alto-networks-6.md +++ /dev/null @@ -1,163 +0,0 @@ ---- -id: palo-alto-networks-6 -title: Palo Alto Networks 6 -sidebar_label: Palo Alto Networks 6 -description: The Palo Alto Networks 6 app provides four dashboards, giving you several ways to discover threats, consumption, traffic patterns, and other security-driven issues, providing additional insight for investigations. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; - -thumbnail icon - -The Palo Alto Networks 6 app provides four dashboards, giving you several ways to discover threats, consumption, traffic patterns, and other security-driven issues, providing additional insight for investigations. - -## Log types - -Parsing in the Palo Alto Networks 6 app for PAN 6 is based on the [PAN-OS Syslog integration](https://live.paloaltonetworks.com/t5/forums/searchpage/tab/message?q=PAN-OS+Syslog+integration&filter=labels&search_type=thread). - - -### Sample log messages - -```json -<12>Dec 22 13:22:14 PA-5050 1,2016/12/22 13:22:14,002201002211,THREAT,vulnerability,1,2016/12/22 13:22:14,77.200.181.165,208.74.205.51,0.0.0.0,0.0.0.0,Alert Logging,,,web-browsing,vsys1,IDS,IDS,ethernet1/21,ethernet1/21,Sumo_Logic,2016/12/22 13:22:14,34403128,1,59305,80,0,0,0x80000000,tcp,alert,"1794",HTTP SQL Injection Attempt(38195),any,medium,client-to-server,128764886,0x0,NL,US,0,,1345817091864062106,,,1,,,,,,,,0 - -<11>Dec 22 13:08:28 PA-5050 1,2016/12/22 13:08:28,002201002211,THREAT,vulnerability,1,2016/12/22 13:08:28,46.148.24.108,208.74.205.51,0.0.0.0,0.0.0.0,Alert Logging,,,web-browsing,vsys1,IDS,IDS,ethernet1/21,ethernet1/21,Sumo_Logic,2016/12/22 13:08:28,34645066,1,38899,80,0,0,0x80000000,tcp,alert,"message",HTTP /etc/passwd Access Attempt(30852),any,high,client-to-server,128763724,0x0,UA,US,0,,1345817091864061211,,,1,,,,,,,,0 -<14>Dec 22 16:24:05 AO-PA500-01.domain.local 1,2016/12/22 16:24:04,009401007189,TRAFFIC,drop,1,2016/12/22 16:24:04,45.55.255.28,184.18.215.26,0.0.0.0,0.0.0.0,deny untrust - logging,,,not-applicable,vsys1,untrust,untrust,ethernet1/1,,Log-Forwarding-01,2016/12/22 16:24:04,0,1,29272,2083,0,0,0x0,tcp,deny,92,92,0,1,2016/12/22 16:24:04,0,any,0,372320422,0x0,US,US,0,1,0,policy-deny,0,0,0,0,,AO-PA500-01,from-policy -``` - - - -### Sample queries - -```sql title="Threat Type by Severity" -_sourceCategory=palo_alto_network | parse "*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*" as f1,recvTime,serialNum,type,subtype,f2,genTime,src_ip,dest_ip,natsrc_ip,natdest_ip,ruleName,src_user,dest_user,app,vsys,src_zone,dest_zone,ingress_if,egress_if,logProfile,f3,sessionID,repeatCnt,src_port,dest_port,natsrc_port,natdest_port,flags,protocol,action,misc,threatID,cat,severity,direction,seqNum,action_flags,src_loc,dest_loc,f4,content_type | count as count by subtype,severity | transpose row severity column subtype -``` - - -## Collecting Logs for the Palo Alto Networks 6 app - -This section provides instructions on how to collect logs for the Palo Alto Networks 6 app, as well as log and query samples. - - -### Prerequisites - -* Configure Syslog Monitoring for your Palo Alto Networks device, as described in [Configure Syslog Monitoring](https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/monitoring/use-syslog-for-monitoring/configure-syslog-monitoring) in Palo Alto Networks help. -* This app supports Palo Alto Networks v6. - - -### Configure a Collector - -Configure an [Installed Collector](/docs/send-data/installed-collectors) or a Hosted source for Syslog-ng or Rsyslog. - - -### Configure a Source - -For Syslog, configure the Source fields: - -1. **Name**. (Required) A name is required. -2. **Description.** Optional. -3. **Protocol**. UDP or TCP -4. **Port**. Port number. -5. **Source Category**. (Required) The Source Category metadata field is a fundamental building block to organize and label Sources. For details, see [Best Practices](/docs/send-data/best-practices). -6. Click **Save**. - -For a Hosted source, use advanced settings as necessary, but save the endpoint URL associated in order to configure Palo Alto Networks. - - -### Field Extraction Rules - -When creating a Field Extraction Rule, you have the option to select from a template for Palo Alto Networks. - -It is recommended that you add **THREAT** as a keyword in the scope for the rule. - -```sql -parse "*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*" -as f1,recvTime,serialNum,type,subtype,f2,genTime,src_ip,dest_ip,natsrc_ip,natdest_ip, -ruleName,src_user,dest_user,app,vsys,src_zone,dest_zone,ingress_if,egress_if,logProfile, -f3,sessionID,repeatCnt,src_port,dest_port,natsrc_port,natdest_port,flags,protocol,action, -misc,threatID,cat,severity,direction,seqNum,action_flags,src_loc,dest_loc,f4,content_type -``` - - -## Installing the Palo Alto Networks 6 app - -Now that you have set up collection for Palo Alto Networks, install the Sumo Logic app for Palo Alto Networks to use the preconfigured searches and dashboards that provide insight into your data. - -import AppInstall from '../../reuse/apps/app-install.md'; - - - -## Viewing PAN 6 Dashboards - -### Overview - -The Overview Dashboard keeps you up-to-speed on the higher level operations of your PAN deployment. - -Palo_Alto_Networks_6 Dashboard - -**Source Host Locations.** Using a geolocation query, this Panel maps the location of source hosts using their IP addresses. - -**Threat Type by Severity.** Breaks down the number of threats, ranked by severity; threat types are divided into separate categories (such as Vulnerabilities and URL). Threat types displayed in this Panel include Low, Informational, High, and Critical. - -**Bandwidth Consumption (Bytes) by Virtual System.** Displays the bandwidth of virtual systems, making it easy to see which systems are consuming the most bandwidth. - -**Bandwidth Consumption (Percentage) by App.** Each app deployed by your organization is represented in an overall breakdown of how apps are consuming bandwidth. - - -### Threat Analysis - -Palo_Alto_Networks_6 Dashboard - -**Threat Type.** Get an idea of the number of threats as well as the type of threats detected by Palo Alto Networks. Top Destination IPs. Shows the top 10 destination IPs (the IPs that have made the most attempts). - -Top Destination IPs. Ranks the top 10 destination IPs as a bar chart. - -**Severity by Protocol.** View the number of threats sorted by severity (Critical, High, Low, or Informational). - -**App by Severity.** Shows the breakdown of threats per app, sorted by threat level (Critical, High, Informational, and Low). - -**Top Source IPs.** Ranks the top 10 source IPs hitting your firewall as a bar chart. - -**Threat by Category.** The query behind this Panel parses the threat ID and category from your Palo Alto Network logs, then returns the number of threats sorted by category. - - -### Traffic Monitoring - -The Traffic Monitoring Dashboard includes several Panels that display information about incoming and outgoing traffic, including bytes sent and received. - -Palo_Alto_Networks_6 Dashboard - -**Events by Protocol.** Displays the breakdown of events, sorted by protocol (ICMP, TCP, UDP, HOPOPT). - -**Top Destination IPs by Events.** Using a geolocation query, this Panel maps which IPs are being accessed outside the network for all event types. - -**Top 10 Apps by Bytes Sent.** Shows which apps are being sent the most bytes. - -**Apps by Action.** This Panel queries all traffic types and then displays each app per drop, denial, and success. - -**Top Source IPs by Events.** Displays the top 10 IPs generating events. - -**Top 10 Apps by Bytes Received.** Traffic from the 10 most active apps is shown, making unexpected upticks in traffic easy to identify. - -**Bytes Sent/Received Overtime.** Keep an eye on the overall inbound and outbound traffic in your deployment. - -**Triggered Rules by Virtual System.** Including all existing trigger rules, this Panel displays traffic from each virtual system in your deployment. - - -### Generic - -This advanced Dashboard includes specialized, targeted Panels that are typically used by IT Admins. - -Palo_Alto_Networks_6 Dashboard - -**Top 10 Source IPs by Byte.** Watch for unexpected spikes in traffic from the top 10 Source IP addresses. - -**High Severity Threat Distribution.** Displays the severity of threats over the past hour. - -**High Severity Threats by Destination & ID.** Counted by the number of threats coming from specific destinations and IP addresses, Critical and High severity threats are shown. - -**Bandwidth Consumption by App.** View the total bandwidth consumed by each app in one place. - -**Threat Distribution.** Displays the source of threats as well as the number of threats over the past 24 hours. - -**High Severity Threats by Source & ID.** No need to guess where Critical and High threats are coming from. This Panel displays each threat source. diff --git a/docs/integrations/security-threat-detection/palo-alto-networks-8.md b/docs/integrations/security-threat-detection/palo-alto-networks-8.md deleted file mode 100644 index ffd0d31768..0000000000 --- a/docs/integrations/security-threat-detection/palo-alto-networks-8.md +++ /dev/null @@ -1,316 +0,0 @@ ---- -id: palo-alto-networks-8 -title: Palo Alto Networks 8 -sidebar_label: Palo Alto Networks 8 -description: The Palo Alto Networks 8 app gives you visibility into firewall and traps activity, including information about firewall configuration changes, details about rejected and accepted firewall traffic, traffic events that match the Correlation Objects and Security Profiles you have configured in PAN, and events logged by the Traps Endpoint Security Manager. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; - -thumbnail icon - -Palo Alto Networks (PAN) 8 provides a next generation firewall and the Traps Endpoint Security Manager. The Palo Alto Networks 8 app gives you visibility into firewall and traps activity, including information about firewall configuration changes, details about rejected and accepted firewall traffic, traffic events that match the Correlation Objects and Security Profiles you have configured in PAN, and events logged by the Traps Endpoint Security Manager. - -## Log types - -Parsing in the Sumo Logic app for PAN 8 is based on the [PAN-OS Syslog Integration](https://live.paloaltonetworks.com/t5/Tech-Note-Articles/PAN-OS-Syslog-Integration/ta-p/55323) and uses the following log types: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Log type Description Supported log format For more information
TrafficEntries for the start and end of each session, including date and time; source and destination zones, addresses and ports; application name; security rule applied to the traffic flow; rule action (allow, deny, or drop); ingress and egress interface; number of bytes; and session end reason. SyslogTraffic Logs
ThreatEvents logged when traffic matches one of the Security Profiles attached to a security rule on the firewall.SyslogThreat Logs
System Information about system events on the Palo Alto Networks Device.SyslogSystem Logs
Config LogsInformation about Palo Alto Networks Device configuration changes.SyslogConfiguration
CorrelationEvents logged by firewall when patterns and thresholds defined in a Correlation Object match the traffic patterns on your network.SyslogCorrelation Logs
TrapsV4Events logged by the Traps Endpoint Security component.Common Event Format (CEF)CEF Format
- - -### Sample log messages - - -```json title="Config Log Sample" -Sep 05 12:30:11 SumoStg05 1,2018/09/05 12:30:11,012345678902,CONFIG,0,0,2018/09/05 12:30:11,34.75.147.122,,commit-all,duc,Panorama,Succeeded,,0123456789,0x8000000000000000,0,0,0,0,,SumoStg05 -``` - -```txt title="Correlation Log Sample" -Sep 05 12:00:22 1,2018/09/05 12:00:22,012345678902,CORRELATION,,,2018/09/05 12:00:22,11.95.8.142,npande,,compromised-host,medium,0,0,0,0,,us2,,beacon-heuristics,6005,"Host visited known malware URL (100 times). -``` - - -```json title="System Log Sample" -Sep 05 12:40:15 SumoQA01a 0,2018/09/05 12:40:15,012345678902,SYSTEM,url-filtering,0,2018/09/05 12:40:15,,upgrade-url-database-success,,0,0,general,informational,PAN-DB was upgraded to version 20170529.40084.,538241,0x8000000000000000,0,0,0,0,,SumoQA01a -``` - - -```json title="Threat Log Sample" -Sep 05 12:44:11 SumoStg05 0,2018/09/05 12:44:11,012345678902,THREAT,vulnerability,0,2018/09/05 12:44:11,174.234.40.32,240.84.174.144,,,General Web Infrastructure,,duc,web-browsing,vsys1,z2-FW-Sumo-Internal,inside,ethernet1/2,ethernet1/2,LOGreset-both,2018/09/05 12:44:11,320228,1,80,1296,0,0,0x2000,tcp,alert,"adcount.ohmynews.com/js.kti/ohmynews2007/article70@thumbnail3",Suspicious Abnormal HTTP Response Found(40397),news,informational,server-to-client,1077387368,0x8000000000000000,India,10.0.0.0-10.255.255.255,0,,0,,,1,,,,,,,,0,31,43,0,0,,us3,,,,,0,,0,,N/A,protocol-anomaly,AppThreat-52239-48642,0x0 -``` - - -```json title="Traffic Log Sample" -Sep 05 12:45:15 SumoStg05 0,2018/09/05 12:45:15,012345678901,TRAFFIC,end,0,2018/09/05 12:45:15,182.80.119.50,176.164.175.181,,,Unexpected Traffic,,npande,ping,vsys3,z1-FW-Transit,z3-Sumo-DMZ,ethernet1/2,ethernet1/2,LOGreset-both,2018/09/05 12:45:15,9434,1,0,0,0,0,0x100064,icmp,allow,122,122,0,1,2018/09/05 12:45:15,0,any,0,5134220147,0x8000000000000000,United States,10.0.0.0-10.255.255.255,0,1,0,aged-out,31,42,0,0,,SumoStg05,from-policy,,,0,,0,,N/A -``` - -```json title="Traps V4 Sample" -Sep 05 12:30:15 Host CEF:0|Palo Alto Networks|Traps Agent|3.4.3.19949|Client License Request|Agent|3|rt=Sep 05 12:30:15 dhost=preprod_Linux_SumoQA01a duser=administrator msg=New license request -``` - - - -### Sample queries - - -```sql title="Virus Threats" -_sourceCategory=Loggen/PAN/Threat THREAT (virus or "wildfire-virus") -| csv _raw extract 1 as f1, 2 as Receive_Time, 3 as serialNum, 4 as type, 5 as subtype, 6 as f2, 7 as LogGenerationTime, 8 as src_ip, 9 as dest_ip, 10 as NAT_src_ip, 11 as NAT_dest_ip, 12 as ruleName, 13 as src_user, 14 as dest_user, 15 as app, 16 as vsys, 17 as src_zone, 18 as dest_zone, 19 as inbound_interface, 20 as outbound_interface, 21 as LogAction, 22 as f3, 23 as SessonID, 24 as RepeatCount, 25 as src_port, 26 as dest_port, 27 as NAT_src_port, 28 as NAT_dest_port, 29 as flags, 30 as protocol, 31 as action, 32 as urlORFileName, 33 as Threat_Content_Name, 34 as category, 35 as severity, 36 as direction, 37 as seqNum, 38 as action_flags, 39 as src_country, 40 as dest_country, 41 as f4, 42 as content_type, 43 as pcap_id, 44 as filedigest, 45 as cloud, 46 as url_idx, 47 as user_agent, 48 as filetype, 49 as xff, 50 as referer, 51 as sender, 52 as subject, 53 as recipient, 54 as reportid, 55 as Device_Group_Hierarchy, 56 as vsys_name, 57 as DeviceName, 58 as f5, 59 as Source_VM_UUID, 60 as Destination_VM_UUID, 61 as Parent_Session_ID, 62 as Tunnel_ID_IMSI, 63 as Monitor_Tag_IMEI, 64 as method, 65 as parent_start_time, 66 as Tunnel, 67 as thr_category, 68 as contentver, 69 as f6, 70 as SCTP_Association_ID, 71 as Payload_Protocol_ID, 72 as http_headers -| where type = "THREAT" and subtype in ("virus","wildfire-virus") and severity != "informational" -| count as eventCount by Severity -| sort by eventCount, Severity -``` - - -## Collecting Logs for the Palo Alto Networks 8 app - -This section has instructions for collecting logs for the Palo Alto Networks 8 app, as well as examples of field extraction rules, logs, and queries. - -### Prerequisites - -* Configure Syslog Monitoring for your Palo Alto Networks device, as described in [Configure Syslog Monitoring](https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/monitoring/use-syslog-for-monitoring/configure-syslog-monitoring) in Palo Alto Networks help. -* This app supports Palo Alto Networks v7 and v8. -* Parsing in the Sumo Logic app for PAN 8 is based on the information described in these documents: - * [Traffic Log Fields](https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/traffic-log-fields) - * [Threat Log Fields](https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/threat-log-fields) - * [System Log Fields](https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/system-log-fields) - * [Config Logs Fields](https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/config-log-fields) - * [Correlated Events Log Fields](https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/correlated-events-log-fields) - * [TrapsV4 Logs - field list](https://www.paloaltonetworks.com/documentation/traps/4-2/traps-endpoint-security-manager-admin/reports-and-logging/forward-logs-to-an-external-logging-platform/cef-format#traps-admin-rpts-cef) - -Refer [PAN-OS 8](https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/monitoring/use-the-automated-correlation-engine.html) and [PAN-OS 8.1](https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/use-the-automated-correlation-engine.html) documentation for devices supporting Correlated Event Logs. - - -### Configure a collector and source - -In this step you configure a installed collector with a Syslog source that will act as Syslog server to receive logs and events from Palo Alto Networks 8 devices. - -1. Configure an [Installed Collector](/docs/send-data/installed-collectors) -2. Add a Syslog source to the installed collector: - 1. **Name**. (Required) A name is required. - 2. **Description.** Optional. - 3. **Protocol**. UDP or TCP. Choose the protocol you configured in Palo Alto Networks 8 for Syslog monitoring. - 4. **Port**. Port number. Choose the port you configured in Palo Alto Networks 8 for Syslog monitoring. - 5. **Source Category**. (Required) The Source Category metadata field is a fundamental building block to organize and label Sources. For details, see [Best Practices](/docs/send-data/best-practices). - 6. Click **Save**. - - -### Field Extraction Rules - -#### System Log Parsing - -It is recommended that you add **SYSTEM** as a keyword in the scope for the rule. - -```sql -_sourceCategory=Loggen/PAN/System ",SYSTEM," -| csv _raw extract 1 as f1, 2 as Receive_Time, 3 as serialNum, 4 as type, 5 as subtype, 6 as f2, 7 as LogGenerationTime, 8 as vsys, 9 as eventID, 10 as Object, 11 as f3, 12 as f4, 13 as Module, 14 as severity, 15 as description, 16 as seqNum, 17 as action_flags, 18 as Device_Group_Hierarchy, 19 as vsys_name, 20 as DeviceName -``` - - -#### Threat Log parsing - -It is recommended that you add **THREAT** as a keyword in the scope for the rule. - -```sql -_sourceCategory=Loggen/PAN/Threat THREAT -| csv _raw extract 1 as f1, 2 as Receive_Time, 3 as serialNum, 4 as type, 5 as subtype, 6 as f2, 7 as LogGenerationTime, 8 as src_ip, 9 as dest_ip, 10 as NAT_src_ip, 11 as NAT_dest_ip, 12 as ruleName, 13 as src_user, 14 as dest_user, 15 as app, 16 as vsys, 17 as src_zone, 18 as dest_zone, 19 as inbound_interface, 20 as outbound_interface, 21 as LogAction, 22 as f3, 23 as SessonID, 24 as RepeatCount, 25 as src_port, 26 as dest_port, 27 as NAT_src_port, 28 as NAT_dest_port, 29 as flags, 30 as protocol, 31 as action, 32 as urlORFileName, 33 as Threat_Content_Name, 34 as category, 35 as severity, 36 as direction, 37 as seqNum, 38 as action_flags, 39 as src_country, 40 as dest_country, 41 as f4, 42 as content_type, 43 as pcap_id, 44 as filedigest, 45 as cloud, 46 as url_idx, 47 as user_agent, 48 as filetype, 49 as xff, 50 as referer, 51 as sender, 52 as subject, 53 as recipient, 54 as reportid, 55 as Device_Group_Hierarchy, 56 as vsys_name, 57 as DeviceName, 58 as f5, 59 as Source_VM_UUID, 60 as Destination_VM_UUID, 61 as Parent_Session_ID, 62 as Tunnel_ID_IMSI, 63 as Monitor_Tag_IMEI, 64 as method, 65 as parent_start_time, 66 as Tunnel, 67 as thr_category, 68 as contentver, 69 as f6, 70 as SCTP_Association_ID, 71 as Payload_Protocol_ID, 72 as http_headers -``` - - -#### Correlation Log Parsing - -It is recommended that you add **CORRELATION** as a keyword in the scope for the rule. - -```sql -_sourceCategory=Loggen/PAN/Correlation ",CORRELATION," -| csv _raw extract 1 as f1, 2 as Receive_Time, 3 as serialNum, 4 as type, 5 as subtype, 6 as f2, 7 as LogGenerationTime, 8 as src_ip, 9 as src_user, 10 as vsys, 11 as Category, 12 as Severity, 13 as Device_Group_Hierarchy, 14 as vsys_name, 15 as DeviceName, 16 as vSysID, 17 as Object_Name, 18 as Object_ID, 19 as Evidence -``` - -#### Configuration Log Parsing - -It is recommended that you add **CONFIG** as a keyword in the scope for the rule. - -```sql -_sourceCategory=Loggen/PAN/Config ",CONFIG," -| csv _raw extract 1 as f1, 2 as Receive_Time, 3 as serialNum, 4 as type, 5 as subtype, 6 as f2, 7 as LogGenerationTime, 8 as src_ip, 9 as src_user, 10 as cmd, 11 as admin, 12 as client, 13 as result, 14 as path, 15 as seqno, 16 as action_flags, 17 as vsys, 18 as before_change_detail, 19 as after_change_detail, 20 as Device_Group_Hierarchy, 21 as vsys_name, 22 as DeviceName -``` - -#### TrapsV4 Log Parsing - -```sql -_sourceCategory=Loggen/PAN/TrapsV4 CEF "|Palo Alto Networks|" -| parse "CEF:0|Palo Alto Networks|*|*|*|Agent|*|rt=* dhost=* duser=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, dhost, duser, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Policy|*|rt=* shost=* suser=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, shost, suser, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|System|*|rt=* shost=* suser=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, shost, suser, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|System|*|rt=* shost=* duser=* management core fname=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, shost, duser, fname, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Config|*|rt=* shost=* suser=* dhost=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, shost, suser, dhost, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Agent|*|rt=* dhost=* duser=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, dhost, duser, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Agent|*|rt=* shost=* suser=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, shost, suser, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Agent|*|rt=* dhost=* duser=* deviceProcessName=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, dhost, duser, deviceProcessName, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Agent|*|rt=* dhost=* duser=* cs4Label=* cs4=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, dhost, duser, cs4Label, cs4, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Threat|*|rt=* shost=* duser=* cs2Label=* cs2=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, shost, duser, cs2Label, cs2, msg nodrop -| parse "CEF:0|Palo Alto Networks|*|*|*|Threat|*|rt=* dhost=* duser=* cs2Label=* cs2=* deviceProcessName=* fileHash=* cs3Label=* cs3=* dvc=* msg=*" as TrapsComponent, productVersion, event, ExternalSeverity, rt, dhost, duser, cs2Label, cs2, deviceProcessName, fileHash, cs3Label, cs3, dvc, msg nodrop -| parse field = msg "Agent Service Status Changed: *-> *" as oldStatus, newStatus nodrop -| parse field = msg " received new content- version *" as contentVersion nodrop -| parse field = msg "Content version was * to * successfully" as action, contentVersion nodrop -| parse field = msg "Access Violation- child process: *" as childProcess nodrop -| parse field = msg "New Notification event. Prevention Key: *" as preventionKey nodrop -| parse field = cs2 "WildFire Unknown deviceProcessName=* fileHash=*" as deviceProcessName, fileHash nodrop -``` - -#### Traffic Log Parsing - -It is recommended that you add **TRAFFIC** as a keyword in the scope for the rule. - -```sql -_sourceCategory=Loggen/PAN/Traffic TRAFFIC -| csv _raw extract 1 as f1, 2 as Receive_Time, 3 as serialNum, 4 as type, 5 as subtype, 6 as f2, 7 as LogGenerationTime, 8 as src_ip, 9 as dest_ip, 10 as NAT_src_ip, 11 as NAT_dest_ip, 12 as ruleName, 13 as src_user, 14 as dest_user, 15 as app, 16 as vsys, 17 as src_zone, 18 as dest_zone, 19 as inbound_interface, 20 as outbound_interface, 21 as LogAction, 22 as f3, 23 as SessonID, 24 as RepeatCount, 25 as src_port, 26 as dest_port, 27 as NAT_src_port, 28 as NAT_dest_port, 29 as flags, 30 as protocol, 31 as action,32 as bytes, 33 as bytes_sent, 34 as bytes_recv, 35 as Packets, 36 as StartTime, 37 as ElapsedTime, 38 as Category, 39 as f4, 40 as seqNum, 41 as ActionFlags, 42 as src_Country, 43 as dest_country, 44 as pkts_sent, 45 as pkts_received, 46 as session_end_reason, 47 as Device_Group_Hierarchy , 48 as vsys_Name, 49 as DeviceName, 50 as action_source, 51 as Source_VM_UUID, 52 as Destination_VM_UUID, 53 as Tunnel_ID_IMSI, 54 as Monitor_Tag_IMEI, 55 as Parent_Session_ID, 56 as parent_start_time, 57 as Tunnel, 58 as SCTP_Association_ID, 59 as SCTP_Chunks, 60 as SCTP_Chunks_Sent, 61 as SCTP_Chunks_Received -``` - - - -## Installing the Palo Alto Networks 8 app - -This section provides instructions for installing the Palo Alto Networks 8 app, along with examples of each of the dashboards that provide visual insights into your data. - -This app supports PAN-OS v7 and v8. - -import AppInstall from '../../reuse/apps/app-install.md'; - - - -## Viewing Palo Alto Networks 8 Dashboards - -### Overview - -**Description:** See an overview of system, correlation, configuration, and trap events; threats; and bandwidth consumption by app and by virtual system. - -**Use case:** Use this dashboard for an overview of various activities by severity level, geo-location, and bandwidth consumption. Based on the results you see, you can go to more detailed dashboards to drill down for details. For example, if the “Threats By Severity Level” panel shows that there are “Critical” threats, you can proceed to the threat-related dashboards, including Threat Overview, Threat Analysis, Traffic Insight - File Activity, and Traffic Insight - Web Activity. - -Palo_Alto_Networks_8 Dashboard - -### Configuration Analysis - -**Description:** See information about changes to your firewall configurations, including a breakdown of submitted, succeeded, and failed configuration updates; the trend of configuration update statuses; the top 10 IPs used for configuration changes; the top 10 admin users; and the top 10 commands executed. - -**Use case:** Use this dashboard to learn about firewall configuration changes. You can identify who performed a configuration change, and the system from which the configuration change was made. The dashboard also helps you identify failed and successful configurations changes. If you observe a sudden change in device behavior, you can check this dashboard to investigate whether a configuration change might be to blame. - -Palo_Alto_Networks_8 Dashboard - -### Correlation Analysis - -**Description:** See information about correlated events, including breakdowns of correlated events by severity, category, source user, and object; events by source IP; and recent correlation feeds. - -**Use case:** Use this dashboard to identify hosts that are compromised, very likely compromised, likely compromised, or possibly compromised, based on correlation events. - -Palo_Alto_Networks_8 Dashboard - -### High Severity Threats - -**Description:** See information about the top 10 source IPs by bytes; high and critical severity threats by destination ID, and by Source ID; threat distribution by severity; bandwidth consumption by app; and outlier analysis of allowed and rejected requests. - -**Use case:** Use this dashboard to identify the impact of high severity threats, including the most involved source and destination IPs. You can identify threats affecting multiple IPs, IPs affected by multiple threats, and identify source IPs or users which are responsible for generating high severity threats or are impacted by high severity threats. - -Palo_Alto_Networks_8 Dashboard - -### System Monitoring - -**Description:** See breakdowns of events by subtype, module, severity, and EventID; objects by severity level and event type; and recent logs to the system feed. - -**Use case:** Use this dashboard to identify system issues like hardware failures, HA failures, link down status, dropped connections with external devices, firmware / software upgrades, password change notifications, log in/log off, administrator name or password change, any configuration change, and other minor events. - -Palo_Alto_Networks_8 Dashboard - -### Threat Overview - -**Description:** See breakdowns of each threat type by severity; threat analytics, including threat outliers and a time comparison of current threats versus threats in the previous hour, day, and previous week; threats affecting the most destination IPs; IPs generating multiple threats; and IPs observing multiple threats. - -**Use case:** Use this dashboard to identify threat subtypes. Based on what you learn, you can drill down for additional detail in the “Threat Analysis” dashboard. You can also use this dashboard to identify threats that affect multiple IPs, IPs affected by multiple threats, and narrow in on source IPs or users that are responsible for generating threats or are impacted by threats. - -Palo_Alto_Networks_8 Dashboard - -### Threat Analysis - -**Description:** See analytics and details about threats, including the count of threats whose severity is greater that “Informational”; breakdowns of threats by subtype and severity; and recent critical and non-critical threat feeds. - -**Use case:** Use this dashboard to get detailed information on threats identified, rules fired, actions, trends, threat outliers, and threat directions. - -Palo_Alto_Networks_8 Dashboard - - -### Traffic Monitoring - -**Description:** See information about firewall traffic, including protocol usage; top source IPs, apps, destination IPs, source users, and destination ports; and outlier analysis of rejected and accepted traffic. - -**Use case:** Use this dashboard to detect sudden changes in allowed or rejected traffic in the outlier panels. To investigate outliers, look for a corresponding change in rules configuration on the Configuration Analysis dashboard. - -You can also monitor the types of content being accessed by various apps and virtual systems. You can track the bandwidth consumed by specific apps and take corrective action as necessary. Using the geolocation map, you can track source and destination locations and determine whether a location is expected, and block it, as appropriate. - -Palo_Alto_Networks_8 Dashboard - -### Traffic Insight - File Activity - -**Description:** See information about firewall requests that involved file uploads or downloads, including upload/download event counts; top file types, file names, and apps; and time comparison and outlier analysis of download and upload traffic. - -**Use case:** Use this dashboard to monitor end users’ file upload and download activities. You can track suspicious file types being uploaded or downloaded through various apps. It also provides insight into sudden changes in activities though outliers. You can compare the current activity trend with the the previous hour, the same time yesterday, and the same time last week with the time compare panel. - -Palo_Alto_Networks_8 Dashboard - -### Traffic Insight - Web Activity - -**Description:** See information about firewall requests that involved web browsing activities, including event count; top content types, apps, and URLs; and time comparison and outlier analysis of web browsing activity. - -**Use case:** Use this dashboard to monitor end users’ file web browsing activities. You can track URLs and the content being browsed using various apps. It also provides insight into sudden changes in activities though outliers. You can compare the current activity trend with the the previous hour, the same time yesterday, and the same time last week with the time compare panel. - -Palo_Alto_Networks_8 Dashboard - -### Traps V4 Monitoring - -**Description:** See information about trap events, including a count of trap events, a breakdown of trap events by severity, and a breakdown by Traps ESM and Traps Agent. - -**Use case:** Use this dashboard to identify how end points have been attacked. You can monitor ransomware threats and new exploits. You can also track agent installs/uninstalls, upgrades, service statuses, access violations, and prevention events. - -Palo_Alto_Networks_8 Dashboard diff --git a/docs/integrations/web-servers/index.md b/docs/integrations/web-servers/index.md index 62ac5efb78..4939e61c60 100644 --- a/docs/integrations/web-servers/index.md +++ b/docs/integrations/web-servers/index.md @@ -50,13 +50,6 @@ This guide has documentation for Sumo apps for web servers.

Nginx Ingress

The Nginx Ingress app is a unified logs and metrics app that helps you monitor the availability, performance, health, and resource utilization of your Nginx Ingress web servers.

-
-
-
- Thumbnail icon -

Nginx (Legacy)

-

The Sumo Logic App for Nginx (Legacy) support logs for Open Source Nginx, Nginx Plus, as well as Metrics for Open Source Nginx.

-
diff --git a/docs/integrations/web-servers/nginx-ingress.md b/docs/integrations/web-servers/nginx-ingress.md index 1a334eaf15..92bae37683 100644 --- a/docs/integrations/web-servers/nginx-ingress.md +++ b/docs/integrations/web-servers/nginx-ingress.md @@ -92,7 +92,7 @@ It’s assumed that you are using the latest helm chart version if not please up ## Installing Nginx Ingress Monitors -After [setting up collection](/docs/integrations/web-servers/nginx-legacy), you can proceed to installing the Nginx Ingress monitors, app, and view examples of each of dashboard. +After [setting up collection](/docs/integrations/web-servers/nginx), you can proceed to installing the Nginx Ingress monitors, app, and view examples of each of dashboard. * To install these alerts, you need to have the Manage Monitors role capability. * Alerts can be installed by either importing a JSON file or a Terraform script. diff --git a/docs/integrations/web-servers/nginx-legacy.md b/docs/integrations/web-servers/nginx-legacy.md deleted file mode 100644 index 85622e37c4..0000000000 --- a/docs/integrations/web-servers/nginx-legacy.md +++ /dev/null @@ -1,275 +0,0 @@ ---- -id: nginx-legacy -title: Nginx (Legacy) -sidebar_label: Nginx (Legacy) -description: The Sumo Logic app for Nginx (Legacy) helps you monitor webserver activity in Nginx. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; -import Tabs from '@theme/Tabs'; -import TabItem from '@theme/TabItem'; - -Thumbnail icon - -Nginx (Legacy) is a web server that can be used as a reverse proxy, load balancer, mail proxy, and HTTP cache. The Sumo Logic app for Nginx (Legacy) support logs for Open Source Nginx, Nginx Plus, as well as Metrics for Open Source Nginx. - -The Sumo Logic app for Nginx (Legacy) helps you monitor webserver activity in Nginx. The preconfigured dashboards provide information about site visitors, including the location of visitors, devices/operating systems, and browsers used; and information about server activity, including bots observed and error information. - -## Log and Metrics Types - -The Sumo Logic app for Nginx assumes the NCSA extended/combined log file format for Access logs and the default Nginx error log file format for error logs. - -All Dashboards (except the Error logs Analysis dashboard) assume the Access log format. The Error logs Analysis Dashboard assumes both Access and Error log formats, so as to correlate information between the two. For more details on Nginx logs, see [Module ngx_http_log_module](https://nginx.org/en/docs/http/ngx_http_log_module.html). - -The Sumo Logic app for Nginx assumes Prometheus format Metrics for Requests and Connections. For Nginx Server metrics, Stub_Status Module from Nginx Configuration is used. For more details on Nginx Metrics, see https://nginx.org/libxslt/en/docs/http/ngx_http_stub_status_module.html. - - -### Sample log messages - -```txt title="Access Log Example" -50.1.1.1 - example [23/Sep/2016:19:00:00 +0000] "POST /api/is_individual HTTP/1.1" 200 58 "-" -"python-requests/2.7.0 CPython/2.7.6 Linux/3.13.0-36-generic" -``` - -```txt title="Error Log Example" -2016/09/23 19:00:00 [error] 1600#1600: *61413 open() "/srv/core/client/dist/client/favicon.ico" -failed (2: No such file or directory), client: 101.1.1.1, server: _, request: "GET /favicon.ico -HTTP/1.1", host: "example.com", referrer: "https://abc.example.com/" -``` - -### Sample queries - -This sample query is from the **Requests by Clients** panel of the **Nginx (Legacy) - Overview** dashboard. - -``` -_sourceCategory = Labs/Nginx/Logs -| json field=_raw "log" as nginx_log_message nodrop -| if (isEmpty(nginx_log_message), _raw, nginx_log_message) as nginx_log_message -| parse regex field=nginx_log_message "(?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" -| parse regex field=nginx_log_message "(?[A-Z]+)\s(?\S+)\sHTTP/[\d\.]+\"\s(?\d+)\s(?[\d-]+)\s\"(?.*?)\"\s\"(?.+?)\".*" -| where _sourceHost matches "{{Server}}" and Client_Ip matches "{{Client_Ip}}" and Method matches "{{Method}}" and URL matches "{{URL}}" and Status_Code matches "{{Status_Code}}" -| count as count by Client_Ip -| sort count -``` - -## Collecting Logs and Metrics for Nginx (Legacy) - -This section provides instructions for configuring log and metrics collection for the Sumo Logic app for Nginx (Legacy), which is for non-Kubernetes environment. - -### Collecting Logs - -Nginx (Legacy) app supports the default access logs and error logs format. - -#### Step 1. Configure logging in Nginx - -Before you can configure Sumo Logic to ingest logs, you must configure the logging of errors and processed requests in NGINX Open Source and NGINX Plus. For instructions, refer to [this documentation](https://www.nginx.com/resources/admin-guide/logging-and-monitoring/). - -#### Step 2. Configure a Collector - -Use one of the following Sumo Logic Collector options: - -1. To collect logs directly from the Nginx machine, configure an [Installed Collector](/docs/send-data/installed-collectors). -2. If you're using a service like Fluentd, or you would like to upload your logs manually, [Create a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector). - - -#### Step 3. Configure a Source - - - - - -To collect logs directly from your Nginx machine, use an Installed Collector and a Local File Source. - -1. Add a [Local File Source](/docs/send-data/installed-collectors/sources/local-file-source). -2. Configure the Local File Source fields as follows: - * **Name.** (Required) - * **Description.** (Optional) - * **File Path (Required).** Enter the path to your error.log or access.log. The files are typically located in /var/log/nginx/error.log. If you're using a customized path, check the nginx.conf file for this information. If you're using Passenger, you may have instructed Passenger to log to a specific log using the passenger_log_file option. - * **Source Host.** Sumo Logic uses the hostname assigned by the OS unless you enter a different hostname. - * **Source Category.** Enter any string to tag the output collected from this Source, such as **Nginx/Access** or **Nginx/Error**. (The Source Category metadata field is a fundamental building block to organize and label Sources. For details, see [Best Practices](/docs/send-data/best-practices).) -3. Configure the **Advanced** section: - * **Enable Timestamp Parsing.** Select Extract timestamp information from log file entries. - * **Time Zone.** Automatically detect. - * **Timestamp Format.** The timestamp format is automatically detected. - * **Encoding.** Select UTF-8 (Default). - * **Enable Multiline Processing.** - * **Error logs.** Select **Detect messages spanning multiple lines** and **Infer Boundaries - Detect message boundaries automatically**. - * **Access** logs. These are single-line logs, uncheck **Detect messages spanning multiple lines**. -4. Click **Save**. - - - - -If you're using a service like Fluentd, or you would like to upload your logs manually, use a Hosted Collector and an HTTP Source. - -1. Add an [HTTP Source](/docs/send-data/hosted-collectors/http-source/logs-metrics). -2. Configure the HTTP Source fields as follows: - * **Name.** (Required) - * **Description.** (Optional) - * **Source Host.** Sumo Logic uses the hostname assigned by the OS unless you enter a different hostname. - * **Source Category.** Enter any string to tag the output collected from this Source, such as **Nginx/Access** or **Nginx/Error**. (The Source Category metadata field is a fundamental building block to organize and label Sources. For details, see [Best Practices](/docs/send-data/best-practices).) -3. Configure the **Advanced** section: - * **Enable Timestamp Parsing.** Select **Extract timestamp information from log file entries**. - * **Time Zone.** For Access logs, use the time zone from the log file. For Error logs, make sure to select the correct time zone. - * **Timestamp Format.** The timestamp format is automatically detected. - * **Enable Multiline Processing.** - * **Error** **logs**: Select **Detect messages spanning multiple lines** and **Infer Boundaries - Detect message boundaries automatically**. - * **Access** **logs**: These are single-line logs, uncheck **Detect messages spanning multiple lines**. -4. Click **Save**. -5. When the URL associated with the HTTP Source is displayed, copy the URL so you can add it to the service you are using, such as Fluentd. - - - - -### Field Extraction Rules - -Field Extraction Rules (FERs) tell Sumo Logic which fields to parse out automatically. For instructions, see [Create a Field Extraction Rule](/docs/manage/field-extractions/create-field-extraction-rule). - -Nginx assumes the NCSA extended/combined log file format for Access logs and the default Nginx error log file format for error logs. - -Both the parse expressions can be used for logs collected from Nginx Server running on Local or container-based systems. - -For **FER for Access Logs**, use the following Parse Expression: - -``` -| json field=_raw "log" as nginx_log_message nodrop -| if (isEmpty(nginx_log_message), _raw, nginx_log_message) as nginx_log_message -| parse regex field=nginx_log_message "(?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" -| parse regex field=nginx_log_message "(?[A-Z]+)\s(?\S+)\sHTTP/[\d\.]+\ -"\s(?\d+)\s(?[\d-]+)\s\"(?.*?)\"\s\"(?.+?)\".*" -``` - -For **FER for Error Logs**, use the following Parse Expression: - -``` -| json field=_raw "log" as nginx_log_message nodrop -| if (isEmpty(nginx_log_message), _raw, nginx_log_message) as nginx_log_message -| parse regex field=nginx_log_message "\s\[(?\S+)\]\s\d+#\d+:\s(?:\*\d+\s|)(?[A-Za-z][^,]+)(?:,|$)" -| parse field=nginx_log_message "client: *, server: *, request: \"* * HTTP/1.1\", host: -\"*\"" as Client_Ip, Server, Method, URL, Host nodrop -``` - -## Installing the Nginx (Legacy) app - -This section has instructions for installing the Sumo app for Nginx (Legacy). These instructions assume you have already set up the collection as described above. - -import AppInstall from '../../reuse/apps/app-install.md'; - - - -## Viewing Nginx (Legacy) Dashboards - -:::tip Filter with template variables -Template variables provide dynamic dashboards that can rescope data on the fly. As you apply variables to troubleshoot through your dashboard, you view dynamic changes to the data for a quicker resolution to the root cause. You can use template variables to drill down and examine the data on a granular level. For more information, see [Filter with template variables](/docs/dashboards/filter-template-variables). -::: - -### Overview - -The **Nginx (Legacy) - Overview** dashboard provides an at-a-glance view of the NGINX server access locations, error logs along with connection metrics. - -Use this dashboard to: -* Gain insights into originated traffic location by region. This can help you allocate computer resources to different regions according to their needs. -* Gain insights into your Nginx health using Critical Errors and Status of Nginx Server. -* Get insights into Active and dropped connections. - -Nginx-Overview - -### Error Logs Analysis - -The **Nginx (Legacy) - Error Logs Analysis** dashboard provides a high-level view of log level breakdowns, comparisons, and trends. The panels also show the geographic locations of clients and clients with critical messages, new connections and outliers, client requests, request trends, and request outliers. - -Use this dashboard to: -* Track requests from clients. A request is a message asking for a resource, such as a page or an image. -* Track and view client geographic locations generating errors. -* Track critical alerts and emergency error alerts. - -NginxL-Error-Logs-Analysis - -### Logs Timeline Analysis - -The **Nginx (Legacy) - Logs Timeline Analysis** dashboard provides a high-level view of the activity and health of Nginx servers on your network. Dashboard panels display visual graphs and detailed information on traffic volume and distribution, responses over time, as well as time comparisons for visitor locations and server hits. - -Use this dashboard to: -* To understand the traffic distribution across servers, provide insights for resource planning by analyzing data volume and bytes served. -* Gain insights into originated traffic location by region. This can help you allocate compute resources to different regions according to their needs. - -Nginx Legacy - -### Outlier Analysis - -The **Nginx (Legacy) - Outlier Analysis** dashboard provides a high-level view of Nginx server outlier metrics for bytes served, number of visitors, and server errors. You can select the time interval over which outliers are aggregated, then hover the cursor over the graph to display detailed information for that point in time. - -Use this dashboard to: -* Detect outliers in your infrastructure with Sumo Logic’s machine learning algorithm. -* To identify outliers in incoming traffic and the number of errors encountered by your servers. - -You can use schedule searches to send alerts to yourself whenever there is an outlier detected by Sumo Logic. - -Nginx Legacy - -### Threat Intel - -The **Nginx (Legacy) - Threat Intel** dashboard provides an at-a-glance view of threats to Nginx servers on your network. Dashboard panels display the threat count over a selected time period, geographic locations where threats occurred, source breakdown, actors responsible for threats, severity, and a correlation of IP addresses, method, and status code of threats. - -Use this dashboard to: -* To gain insights and understand threats in incoming traffic and discover potential IOCs. Incoming traffic requests are analyzed using the [Sumo - Crowdstrikes](/docs/integrations/security-threat-detection/threat-intel-quick-analysis#threat-intel-faq) threat feed. - -Nginx Legacy - -### Web Server Operations - -The **Nginx (Legacy) - Web Server Operations** dashboard provides a high-level view combined with detailed information on the top ten bots, geographic locations, and data for clients with high error rates, server errors over time, and non 200 response code status codes. Dashboard panels also show information on server error logs, error log levels, error responses by a server, and the top URIs responsible for 404 responses. - -Use this dashboard to: -* Gain insights into Client, Server Responses on Nginx Server. This helps you identify errors in Nginx Server. -* To identify geo locations of all Client errors. This helps you identify client location causing errors and helps you to block client IPs. - -Nginx Legacy - -### Visitor Access Types - -The **Nginx (Legacy) - Visitor Access Types** dashboard provides insights into visitor platform types, browsers, and operating systems, as well as the most popular mobile devices, PC and Mac versions used. - -Use this dashboard to: -* Understand which platform and browsers are used to gain access to your infrastructure. -* These insights can be useful for planning in which browsers, platforms, and operating systems (OS) should be supported by different software services. - -Nginx Legacy - -### Visitor Locations - -The **Nginx (Legacy)- Visitor Locations** dashboard provides a high-level view of Nginx visitor geographic locations both worldwide and in the United States. Dashboard panels also show graphic trends for visits by country over time and visits by US region over time. - -Use this dashboard to: -* Gain insights into geographic locations of your user base. This is useful for resource planning in different regions across the globe. - -Nginx Legacy - -### Visitor Traffic Insight - -The **Nginx (Legacy) - Visitor Traffic Insight** dashboard provides detailed information on the top documents accessed, top referrers, top search terms from popular search engines, and the media types served. - -Use this dashboard to: -* Understand the type of content that is frequently requested by users. -* Help in allocating IT resources according to the content types. - -Nginx Legacy - - -## Nginx (Legacy) Alerts - -Sumo Logic has provided out-of-the-box alerts available through [Sumo Logic monitors](/docs/alerts/monitors) to help you quickly determine if the Nginx server is available and performing as expected. These alerts are built based on logs and metrics datasets and have preset thresholds based on industry best practices and recommendations. They are as follows: - -| Alert Name | Alert Description | Alert Condition | Recover Condition | -|:---|:---|:---|:---| -| Nginx - Dropped Connections | This alert fires when we detect dropped connections for a given Nginx server. | > 0 | < = 0 | -| Nginx - Critical Error Messages | This alert fires when we detect critical error messages for a given Nginx server. | > 0 | < = 0 | -| Nginx - Access from Highly Malicious Sources | This alert fires when an Nginx is accessed from highly malicious IP addresses. | > 0 | < = 0 | -| Nginx - High Client (HTTP 4xx) Error Rate | This alert fires when there are too many HTTP requests (>5%) with a response status of 4xx. | > 0 | < = 0 | -| Nginx - High Server (HTTP 5xx) Error Rate | This alert fires when there are too many HTTP requests (>5%) with a response status of 5xx. | > 0 | < = 0 | diff --git a/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md b/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md index 86a0f1a77b..03c44d5649 100644 --- a/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md +++ b/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md @@ -30,7 +30,7 @@ The metrics collection pipeline for using Telegraf in a non-Kubernetes environme #### For applications that do not expose metrics Some applications may not expose their metrics for another system to access, in which case you'll need to configure the application to expose the metrics so that Telegraf can collect them. Some examples: -* To collect metrics from Nginx, you'd need to configure it to expose metrics in the Nginx configuration file. For more information, see [Collecting Logs and Metrics for Nginx (Legacy)](/docs/integrations/web-servers/nginx-legacy/#collecting-logs-and-metrics-for-nginx-legacy). +* To collect metrics from Nginx, you'd need to configure it to expose metrics in the Nginx configuration file. For more information, see [Collecting Logs and Metrics for Nginx](/docs/integrations/web-servers/nginx). * To collect JMX metrics from a Java application, you'd need to configure the application to use [Jolokia](https://jolokia.org/agent.html), a JMX-HTTP bridge. For more information, see [Collecting Metrics for JMX](/docs/integrations/app-development/jmx/#collecting-metrics-for-jmx). You select an existing HTTP Source on a Hosted Collection as the destination for the Telegraf-collected metrics, or configure a new collector and source, as desired.  diff --git a/sidebars.ts b/sidebars.ts index 9cf318b630..e8c421cb57 100644 --- a/sidebars.ts +++ b/sidebars.ts @@ -1922,7 +1922,6 @@ integrations: [ ], }, 'integrations/microsoft-azure/active-directory-json', - 'integrations/microsoft-azure/active-directory-legacy', 'integrations/microsoft-azure/active-directory-azure', 'integrations/microsoft-azure/audit', 'integrations/microsoft-azure/arm-integration-faq', @@ -1975,7 +1974,6 @@ integrations: [ 'integrations/microsoft-azure/office-365', 'integrations/microsoft-azure/sql-server', 'integrations/microsoft-azure/teams', - 'integrations/microsoft-azure/windows-legacy-pci-compliance', 'integrations/microsoft-azure/windows-json-pci-compliance', 'integrations/microsoft-azure/windows-json', 'integrations/microsoft-azure/windows-legacy', @@ -2244,7 +2242,6 @@ integrations: [ 'integrations/pci-compliance/palo-alto-networks-9', 'integrations/pci-compliance/palo-alto-networks-10', 'integrations/microsoft-azure/windows-json-pci-compliance', - 'integrations/microsoft-azure/windows-legacy-pci-compliance', ], }, { @@ -2333,8 +2330,6 @@ integrations: [ 'integrations/security-threat-detection/netskope-legacy-collection', 'integrations/security-threat-detection/netskope', 'integrations/security-threat-detection/observable-networks', - 'integrations/security-threat-detection/palo-alto-networks-6', - 'integrations/security-threat-detection/palo-alto-networks-8', 'integrations/security-threat-detection/palo-alto-networks-9', 'integrations/security-threat-detection/sailpoint', 'integrations/security-threat-detection/threat-intel-quick-analysis', @@ -2431,7 +2426,6 @@ integrations: [ 'integrations/web-servers/iis-10', 'integrations/web-servers/nginx', 'integrations/web-servers/nginx-ingress', - 'integrations/web-servers/nginx-legacy', 'integrations/web-servers/nginx-plus', 'integrations/web-servers/nginx-plus-ingress', 'integrations/web-servers/squid-proxy', From 70abb320d8f538508087df918138e22f3e92cff2 Mon Sep 17 00:00:00 2001 From: Kim Pohas Date: Tue, 14 May 2024 15:27:56 -0700 Subject: [PATCH 2/3] cid-redirects fix --- cid-redirects.json | 14 +++++++------- .../app-development/jfrog-artifactory.md | 2 +- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/cid-redirects.json b/cid-redirects.json index 61aa1317d0..05f6b5f3c7 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -1904,7 +1904,7 @@ "/cid/2324": "/docs/integrations/saas-cloud/workday", "/cid/23433": "/docs/search/search-query-language/search-operators/topk", "/cid/24000": "/docs/send-data/installed-collectors/sources/preconfigure-machine-collect-remote-windows-events", - "/cid/24841": "/docs/integrations/security-threat-detection/palo-alto-networks-8", + "/cid/24841": "/docs/integrations/security-threat-detection/palo-alto-networks-9", "/cid/25611": "/docs/integrations/saas-cloud/akamai-cloud-monitor", "/cid/25612": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/azure-event-hubs-source", "/cid/25613": "/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black", @@ -2053,9 +2053,9 @@ "/cid/5010": "/", "/cid/5011": "/docs/manage/users-roles/users/multi-account-access", "/cid/5012": "/docs/search/search-query-language/math-expressions/acos", - "/cid/5013": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/cid/5014": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/cid/5015": "/docs/integrations/microsoft-azure/active-directory-legacy", + "/cid/5013": "/docs/integrations/microsoft-azure/active-directory-json", + "/cid/5014": "/docs/integrations/microsoft-azure/active-directory-json", + "/cid/5015": "/docs/integrations/microsoft-azure/active-directory-json", "/cid/5016": "/docs/send-data/choose-collector-source", "/cid/5017": "/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source", "/cid/5018": "/docs/send-data/hosted-collectors/amazon-aws/amazon-s3-audit-source", @@ -2218,7 +2218,7 @@ "/cid/5252": "/docs/integrations/web-servers/nginx", "/cid/5253": "/docs/integrations/web-servers/nginx", "/cid/5254": "/docs/dashboards/panels/single-value-charts", - "/cid/5255": "/docs/integrations/security-threat-detection/palo-alto-networks-6", + "/cid/5255": "/docs/integrations/security-threat-detection/palo-alto-networks-9", "/cid/5256": "/docs/integrations/security-threat-detection/palo-alto-networks-6", "/cid/5262": "/docs/search/get-started-with-search/suggested-searches/apache-access-parser", "/cid/52621": "/docs/integrations/amazon-aws/redshift-ulm", @@ -2243,7 +2243,7 @@ "/cid/5283": "/docs/integrations/pci-compliance", "/cid/5284": "/docs/integrations/pci-compliance", "/cid/5286": "/docs/get-started/library", - "/cid/5287": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", + "/cid/5287": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/cid/5289": "/docs/get-started/library", "/cid/5294": "/docs/get-started/library", "/cid/5301": "/docs/manage/partitions/data-tiers", @@ -3898,5 +3898,5 @@ "/docs/integrations/security-threat-detection/palo-alto-networks-8":"/docs/integrations/security-threat-detection/palo-alto-networks-9", "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/docs/integrations/web-servers/nginx-legacy": "/docs/integrations/web-servers/nginx", - "/docs/integrations/microsoft-azure/active-directory-legacy/": "/docs/integrations/microsoft-azure/active-directory-json" + "/docs/integrations/microsoft-azure/active-directory-legacy": "/docs/integrations/microsoft-azure/active-directory-json" } diff --git a/docs/integrations/app-development/jfrog-artifactory.md b/docs/integrations/app-development/jfrog-artifactory.md index 811dd45a40..1f5f5c6291 100644 --- a/docs/integrations/app-development/jfrog-artifactory.md +++ b/docs/integrations/app-development/jfrog-artifactory.md @@ -9,7 +9,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; Thumbnail icon -JFrog Artifactory is a universal artifact repository manager that integrates with CI/CD and DevOps tools to provide artifact tracking. The Sumo Logic apps for Artifactory 7 provide insight into your JFrog Artifactory binary repository. Our preconfigured dashboards provide an overview of your system as well as Traffic, Requests and Access, Download Activity, Cache Deployment Activity, and Non-Cached Deployment Activity. +JFrog Artifactory is a universal artifact repository manager that integrates with CI/CD and DevOps tools to provide artifact tracking. The Sumo Logic app for Artifactory 7 provides insight into your JFrog Artifactory binary repository. Our preconfigured dashboards provide an overview of your system as well as Traffic, Requests and Access, Download Activity, Cache Deployment Activity, and Non-Cached Deployment Activity. If you _do not_ have a Sumo Logic account and want to get up and running quickly, the [JFrog Artifactory Sumo Logic integration](#if-you-do-not-have-a-sumo-logic-account) is the most convenient way to get started. It allows you to access Sumo Logic directly from Artifactory. From 50a98c6c97c03ab6f60f326ef7c140a21fcda9ee Mon Sep 17 00:00:00 2001 From: Kim Pohas Date: Tue, 14 May 2024 15:39:22 -0700 Subject: [PATCH 3/3] minor fix --- cid-redirects.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cid-redirects.json b/cid-redirects.json index 05f6b5f3c7..6fd7d031d5 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -2219,7 +2219,7 @@ "/cid/5253": "/docs/integrations/web-servers/nginx", "/cid/5254": "/docs/dashboards/panels/single-value-charts", "/cid/5255": "/docs/integrations/security-threat-detection/palo-alto-networks-9", - "/cid/5256": "/docs/integrations/security-threat-detection/palo-alto-networks-6", + "/cid/5256": "/docs/integrations/security-threat-detection/palo-alto-networks-9", "/cid/5262": "/docs/search/get-started-with-search/suggested-searches/apache-access-parser", "/cid/52621": "/docs/integrations/amazon-aws/redshift-ulm", "/cid/5263": "/docs/search/get-started-with-search/suggested-searches/apache-errors-parser",