diff --git a/blog-service/2025-06-20-apps.md b/blog-service/2025-06-20-apps.md index 39aea506e9..baf14108a3 100644 --- a/blog-service/2025-06-20-apps.md +++ b/blog-service/2025-06-20-apps.md @@ -1,11 +1,10 @@ --- -title: Akamai CPC (Apps) +title: Snowflake Logs (Apps) image: https://help.sumologic.com/img/sumo-square.png keywords: - apps - - akamai-cpc + - snowflake-logs hide_table_of_contents: true --- - -We're excited to introduce the new Akamai CPC app for Sumo Logic. This app enables you to monitor threats and respond to them in real time, enforcing compliance for client-side web applications using rich dashboards and Akamai CPC data. [Learn more](/docs/integrations/saas-cloud/akamai-cpc). \ No newline at end of file +We're excited to introduce the new Snowflake Logs app for Sumo Logic. This app enables you to gain real-time insights into key metrics, query performance, and overall health of the Snowflake environments to optimize operations, support informed decisions, and maximize Snowflake's potential. [Learn more](/docs/integrations/saas-cloud/snowflake-logs). \ No newline at end of file diff --git a/cid-redirects.json b/cid-redirects.json index 26f467a367..9ea150239f 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -1649,6 +1649,7 @@ "/cid/6028": "/docs/integrations/saas-cloud/bitwarden", "/cid/6029": "/docs/integrations/saas-cloud/kaltura", "/cid/6030": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source", + "/cid/6031": "/docs/integrations/saas-cloud/snowflake-logs", "/cid/6032": "/docs/integrations/saas-cloud/akamai-cpc", "/cid/10112": "/docs/integrations/app-development/jfrog-xray", "/cid/10113": "/docs/observability/root-cause-explorer-deprecation", diff --git a/docs/integrations/product-list/product-list-m-z.md b/docs/integrations/product-list/product-list-m-z.md index d20c1f51e3..5fc1403999 100644 --- a/docs/integrations/product-list/product-list-m-z.md +++ b/docs/integrations/product-list/product-list-m-z.md @@ -145,7 +145,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [ | Thumbnail icon | [Slack](https://slack.com/) | App: [Slack](/docs/integrations/saas-cloud/slack/)
Automation integration: [Slack](/docs/platform-services/automation-service/app-central/integrations/slack/)
Cloud SIEM integration: [Slack](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c93d9bf6-0a88-49fc-aebb-ac7b2ea6792c.md)
Collector: [Slack Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/slack-source/)
Webhook: [Webhook Connection for Slack](/docs/alerts/webhook-connections/slack/) | | Thumbnail icon | [Smartsheet](https://www.smartsheet.com/) | Collector: [Smartsheet Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/smartsheet-source) | | Thumbnail icon | [Snare](https://www.snaresolutions.com/) | Cloud SIEM integration: [Intersect Alliance](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/005c835d-f067-4147-9da9-fe4d2691247e.md) | -| Thumbnail icon | [Snowflake](https://www.snowflake.com/en/) | Cloud SIEM integration: [Snowflake](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/5541f59d-e27d-48e6-a35c-34fb75e9cf13.md)
Collector:
- [Snowflake Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source)
- [Snowflake SQL API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-sql-api-source) | +| Thumbnail icon | [Snowflake](https://www.snowflake.com/en/) | App: [Snowflake Logs](/docs/integrations/saas-cloud/snowflake-logs/)
Cloud SIEM integration: [Snowflake](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/5541f59d-e27d-48e6-a35c-34fb75e9cf13.md)
Collector:
- [Snowflake Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source)
- [Snowflake SQL API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-sql-api-source) | | Thumbnail icon | [Snyk](https://snyk.io/) | App: [Snyk](/docs/integrations/webhooks/snyk)
Automation integration: [Snyk](/docs/platform-services/automation-service/app-central/integrations/snyk/) | | Thumbnail icon | [SOCRadar](https://socradar.io/) | Automation integration: [SOCRadar](/docs/platform-services/automation-service/app-central/integrations/socradar/) | | Thumbnail icon | [SonicWall](https://www.sonicwall.com/) | Automation integration: [SonicWall](/docs/platform-services/automation-service/app-central/integrations/sonicwall/) | diff --git a/docs/integrations/saas-cloud/index.md b/docs/integrations/saas-cloud/index.md index 5a197d0e9a..954af0f9a6 100644 --- a/docs/integrations/saas-cloud/index.md +++ b/docs/integrations/saas-cloud/index.md @@ -357,6 +357,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.

Monitor analytics for your Slack users, channels, and access logs for workspaces.

+
+
+ icon

Snowflake Logs

+

Monitor the key metrics, query performance, and overall health of Snowflake environments to optimize Snowflake's potential.

+
+
icon

Sophos

diff --git a/docs/integrations/saas-cloud/snowflake-logs.md b/docs/integrations/saas-cloud/snowflake-logs.md new file mode 100644 index 0000000000..7570d15955 --- /dev/null +++ b/docs/integrations/saas-cloud/snowflake-logs.md @@ -0,0 +1,238 @@ +--- +id: snowflake-logs +title: Snowflake Logs +sidebar_label: Snowflake Logs +description: The Sumo Logic app for Snowflake Logs allows you to gain real-time insights into key metrics, query performance, and overall health of Snowflake environments to optimize operations, support informed decisions, and maximize Snowflake's potential. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +Thumbnail icon + +The Sumo Logic app for Snowflake Logs offers a powerful analytics solution designed to help you fully leverage the Snowflake cloud data platform. Known for its scalability and advanced data warehousing capabilities and analytics, Snowflake supports data-driven decision-making at scale. This app provides real-time visibility into key metrics, query performance, and the overall health of Snowflake environments. By analyzing Snowflake logs, you can monitor system performance, track login activity, optimize data management, and maintain better control over your data warehouse. + +With centralized monitoring and actionable insights, the app enables you to streamline operations, make informed decisions, and maximize the value of their Snowflake data assets. + +:::info +This app includes [built-in monitors](#snowflake-logs-monitors). For details on creating custom monitors, refer to the [Create monitors for Snowflake Logs app](#create-monitors-for-snowflake-logs-app). +::: + +## Log types + +This app uses Sumo Logic’s [Snowflake Logs Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source/) to collect the data from the Snowflake Logs platform. + +### Sample log messages + +
+Login History + +```json +{ + "CLIENT_IP": "52.44.184.81", + "CLIENT_PRIVATE_LINK_ID": null, + "CONNECTION": null, + "ERROR_CODE": null, + "ERROR_MESSAGE": null, + "EVENT_ID": "1023469238922246", + "EVENT_TIMESTAMP": "2025-06-12T01:14:02.745-04:00", + "EVENT_TYPE": "LOGIN", + "FIRST_AUTHENTICATION_FACTOR": "SAML2_ASSERTION", + "IS_SUCCESS": "YES", + "RELATED_EVENT_ID": "0", + "REPORTED_CLIENT_TYPE": "SNOWFLAKE_UI", + "REPORTED_CLIENT_VERSION": "9.15.2", + "SECOND_AUTHENTICATION_FACTOR": "DUO_PUSH", + "USER_NAME": "John" +} +``` +
+ +
+Sessions + +```json +{ + "AUTHENTICATION_METHOD":"Password", + "CLIENT_APPLICATION_ID":"Go 1.14.0", + "CLIENT_APPLICATION_VERSION":"1.14.0", + "CLIENT_BUILD_ID":"", +"CLIENT_ENVIRONMENT":"{\"APPLICATION\":\"Go\",\"OS\":\"linux\",\"OS_VERSION\":\"gc-amd64\",\"OCSP_MODE\":\"FAIL_OPEN\",\"GO_VERSION\":\"go1.23.9 X:boringcrypto\"}", + "CLIENT_VERSION":"0", + "CLOSED_REASON":"LOGOUT", + "CREATED_ON":"2025-06-12T01:59:56.812-07:00", + "LOGIN_EVENT_ID":"41338407433", + "SESSION_ID":"2709153701236758", + "USER_NAME":"JOhn" +} +``` +
+ +
+Stages + +```json +{ + "COMMENT": null, + "CREATED": "2025-06-12T03:37:20.787-04:00", + "DELETED": "2025-06-12T03:42:25.544-04:00", + "DIRECTORY_ENABLED": null, + "ENDPOINT": null, + "INSTANCE_ID": null, + "LAST_ALTERED": "2025-06-12T03:42:25.544-04:00", + "OWNER_ROLE_TYPE": null, + "STAGE_CATALOG": "CDWQA", + "STAGE_CATALOG_ID": "46", + "STAGE_ID": "42409", + "STAGE_NAME": "dhgfak", + "STAGE_OWNER": null, + "STAGE_REGION": null, + "STAGE_SCHEMA": "DVT", + "STAGE_SCHEMA_ID": "371", + "STAGE_TYPE": "Internal Named", + "STAGE_URL": null, + "STORAGE_INTEGRATION": null +} +``` +
+ +
+Data Transfer History + +```json +{ + "BYTES_TRANSFERRED": 15562, + "END_TIME": "2025-06-12T01:00:00-04:00", + "SOURCE_CLOUD": "aws", + "SOURCE_REGION": "us-east", + "START_TIME": "2025-06-12T00:00:00-04:00", + "TARGET_CLOUD": "aws", + "TARGET_REGION": "us-west", + "TRANSFER_TYPE": "COPY" +} +``` +
+ +
+Grants to User + +```json +{ + "CREATED_ON": "2025-06-12T09:44:40.468-04:00", + "DELETED_ON": null, + "GRANTED_BY": "JOHN", + "GRANTED_TO": "USER", + "GRANTEE_NAME": "SUMO", + "ROLE": "TESTER" +} +``` +
+ +### Sample queries + +```sql title="Users Login Over Time" +_sourceCategory="Labs/SnowflakeLogs" +| Json "REPORTED_CLIENT_TYPE", "USER_NAME", "FIRST_AUTHENTICATION_FACTOR", "SECOND_AUTHENTICATION_FACTOR", "AUTHENTICATION_METHOD", "SESSION_ID", "STAGE_ID", "STAGE_TYPE", "TRANSFER_TYPE", "CLIENT_IP", "CREATED_ON", "ROLE", "GRANTED_TO", "GRANTEE_NAME", "GRANTED_BY", "QUERY_TEXT", "QUERY_TYPE", "ROLE_NAME", "EXECUTION_STATUS", "EXECUTION_TIME" as client_type, user_name, first_authentication, second_authentication, authentication_method, session_id, stage_id, stage_type, data_transfer_type, ip_address, date, role, granted_to, grantee_name, granted_by, query_text, query_type, role_name, status, execution_time nodrop + +// global filters +| where isNull(stage_type) or stage_type matches "{{stage_type}}" +| where isNull(authentication_method) or authentication_method matches "{{authentication_method}}" +| where isNull(data_transfer_type) or data_transfer_type matches "{{data_transfer_type}}" +| where isNull(client_type) or client_type matches "{{client_type}}" +| where isNull(second_authentication) or second_authentication matches "{{2FA}}" + +// panel specific +| where !isNull(client_type) +| timeslice 1d +| count by user_name, _timeslice +| count as frequency by _timeslice +| fillmissing timeslice +``` + +```sql title="Breakdown by Session Closed Reason" +_sourceCategory="Labs/SnowflakeLogs" +| Json "AUTHENTICATION_METHOD", "SESSION_ID", "CLOSED_REASON", "TARGET_CLOUD", "SOURCE_CLOUD", "REPORTED_CLIENT_TYPE", "CLIENT_IP", "IS_SUCCESS", "USER_NAME", "ERROR_CODE", "ERROR_MESSAGE", "TRANSFER_TYPE", "SOURCE_REGION", "TARGET_REGION", "BYTES_TRANSFERRED" as authentication_method, session_id, session_closed_reason, target_cloud, source_cloud, client_type, ip_address, is_success, user_name, error_code, error_message, data_transfer_type, source_region, target_region, bytes_transferred nodrop + +// global filters +| where isNull(session_closed_reason) or session_closed_reason matches "{{session_closed_reason}}" +| where isNull(source_cloud) or source_cloud matches "{{source_cloud}}" +| where isNull(target_cloud) or target_cloud matches "{{target_cloud}}" +| where isNull(login_success) or login_success matches "{{login_success}}" + +// panel specific +| where !isNull(authentication_method) +| count by session_closed_reason, session_id +| count as frequency by session_closed_reason +| sort by frequency, session_closed_reason +``` + +## Collection configuration and app installation + +import CollectionConfiguration from '../../reuse/apps/collection-configuration.md'; + + + +:::important +Use the [Cloud-to-Cloud Integration for Snowflake Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Snowflake Logs app is properly integrated and configured to collect and analyze your Snowflake Logs data. +::: + +### Create a new collector and install the app + +import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md'; + + + +### Use an existing collector and install the app + +import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md'; + + + +### Use an existing source and install the app + +import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md'; + + + +## Viewing Snowflake Logs dashboards + +import ViewDashboards from '../../reuse/apps/view-dashboards.md'; + + + +### Snowflake Logs - Overview + +The **Snowflake Logs - Overview** dashboard provides a comprehensive view of key metrics and operational insights within your Snowflake environment. It enables real-time monitoring of user activity, system performance, and data transfer trends, helping stakeholders better understand overall usage and behavior. +Key panels include Total Users, 2FA Enabled Users, Total Sessions, User Geolocation, and more, allowing you to track login activity, system utilization, and authentication patterns over time. By analyzing data by authentication methods, transfer types, and other factors, you can proactively manage resources, optimize processes, and improve operational efficiency. + +Entries Overview dashboard + +### Snowflake Logs - Security + +The **Snowflake Logs - Security** dashboard offers in-depth visibility into security-related activities and potential threats within your Snowflake environment. It highlights key events such as failed login attempts, data transfers, and geolocation-based login patterns. With metrics like Failed Login Summary, Data Transfer by Source Cloud Platform, and Transfers Over 1GB, helping security teams identify anomalies, investigate incidents, and take proactive steps to mitigate risks effectively. + +Audits Overview dashboard + +## Create monitors for Snowflake Logs app + +import CreateMonitors from '../../reuse/apps/create-monitors.md'; + + + +### Snowflake Logs monitors + +| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition | +|:--|:--|:--|:--| +| `Snowflake Logs - Data Transfer Limitation` | This alert is triggered when more than 1GB data transfer occurs in single session. | Critical | Count > 0 | +| `Snowflake Logs - Logins from Embargoed Geo Locations` | This alert is triggered when logins are detected from sanctioned or embargoed regions, helping you to maintain adherence to legal and regulatory standards. | Critical | Count > 0| + +## Upgrade/Downgrade the Snowflake Logs app (Optional) + +import AppUpdate from '../../reuse/apps/app-update.md'; + + + +## Uninstalling the Snowflake Logs app (Optional) + +import AppUninstall from '../../reuse/apps/app-uninstall.md'; + + diff --git a/sidebars.ts b/sidebars.ts index aa4263a84b..44c8d7a70e 100644 --- a/sidebars.ts +++ b/sidebars.ts @@ -2584,6 +2584,7 @@ integrations: [ 'integrations/saas-cloud/salesforce', 'integrations/saas-cloud/sentinelone', 'integrations/saas-cloud/slack', + 'integrations/saas-cloud/snowflake-logs', 'integrations/saas-cloud/sophos', 'integrations/saas-cloud/sumo-collection', 'integrations/saas-cloud/symantec-endpoint-security-service',