Skip to content

Snowflake logs (apps) #5504

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 6 commits into from
Jun 20, 2025
Merged
Show file tree
Hide file tree
Changes from 3 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions blog-service/2025-06-20-apps.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
title: Snowflake Logs (Apps)
image: https://help.sumologic.com/img/sumo-square.png
keywords:
- apps
- snowflake-logs
hide_table_of_contents: true
---

We're excited to introduce the new Snowflake Logs app for Sumo Logic. This app enables you to gain real-time insights into key metrics, query performance, and overall health of the Snowflake environments to optimize operations, support informed decisions, and maximize Snowflake's potential. [Learn more](/docs/integrations/saas-cloud/snowflake-logs).
1 change: 1 addition & 0 deletions cid-redirects.json
Original file line number Diff line number Diff line change
Expand Up @@ -1649,6 +1649,7 @@
"/cid/6028": "/docs/integrations/saas-cloud/bitwarden",
"/cid/6029": "/docs/integrations/saas-cloud/kaltura",
"/cid/6030": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source",
"/cid/6031": "/docs/integrations/saas-cloud/snowflake-logs",
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
"/cid/10113": "/docs/observability/root-cause-explorer-deprecation",
"/cid/10116": "/docs/manage/fields",
Expand Down
2 changes: 1 addition & 1 deletion docs/integrations/product-list/product-list-m-z.md
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
| <img src={useBaseUrl('img/integrations/saas-cloud/slack.png')} alt="Thumbnail icon" width="50"/> | [Slack](https://slack.com/) | App: [Slack](/docs/integrations/saas-cloud/slack/) <br/>Automation integration: [Slack](/docs/platform-services/automation-service/app-central/integrations/slack/) <br/>Cloud SIEM integration: [Slack](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c93d9bf6-0a88-49fc-aebb-ac7b2ea6792c.md) <br/>Collector: [Slack Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/slack-source/) <br/>Webhook: [Webhook Connection for Slack](/docs/alerts/webhook-connections/slack/) |
| <img src={useBaseUrl('img/send-data/smartsheet.png')} alt="Thumbnail icon" width="50"/> | [Smartsheet](https://www.smartsheet.com/) | Collector: [Smartsheet Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/smartsheet-source) |
| <img src={useBaseUrl('img/integrations/misc/snare-logo.png')} alt="Thumbnail icon" width="75"/> | [Snare](https://www.snaresolutions.com/) | Cloud SIEM integration: [Intersect Alliance](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/005c835d-f067-4147-9da9-fe4d2691247e.md) |
| <img src={useBaseUrl('img/integrations/misc/snowflake-logo.png')} alt="Thumbnail icon" width="100"/> | [Snowflake](https://www.snowflake.com/en/) | Cloud SIEM integration: [Snowflake](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/5541f59d-e27d-48e6-a35c-34fb75e9cf13.md) <br/>Collector: <br/>- [Snowflake Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source) <br/>- [Snowflake SQL API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-sql-api-source) |
| <img src={useBaseUrl('img/integrations/misc/snowflake-logo.png')} alt="Thumbnail icon" width="100"/> | [Snowflake](https://www.snowflake.com/en/) | App: [Snowflake Logs](/docs/integrations/saas-cloud/snowflake-logs/) <br/>Cloud SIEM integration: [Snowflake](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/5541f59d-e27d-48e6-a35c-34fb75e9cf13.md) <br/>Collector: <br/>- [Snowflake Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source) <br/>- [Snowflake SQL API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-sql-api-source) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/snyk.png')} alt="Thumbnail icon" width="75"/> | [Snyk](https://snyk.io/) | App: [Snyk](/docs/integrations/webhooks/snyk) <br/> Automation integration: [Snyk](/docs/platform-services/automation-service/app-central/integrations/snyk/) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/socradar.png')} alt="Thumbnail icon" width="75"/> | [SOCRadar](https://socradar.io/) | Automation integration: [SOCRadar](/docs/platform-services/automation-service/app-central/integrations/socradar/) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/sonicwall.png')} alt="Thumbnail icon" width="75"/> | [SonicWall](https://www.sonicwall.com/) | Automation integration: [SonicWall](/docs/platform-services/automation-service/app-central/integrations/sonicwall/) |
Expand Down
6 changes: 6 additions & 0 deletions docs/integrations/saas-cloud/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -348,6 +348,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
<div className="box smallbox card">
<div className="container">
<a href="/docs/integrations/saas-cloud/slack"><img src={useBaseUrl('img/integrations/saas-cloud/slack.png')} alt="icon" width="50"/><h4>Slack</h4></a>
<p>Monitor the key metrics, query performance, and overall health of Snowflake environments to optimize Snowflake's potential.</p>
</div>
</div>
<div className="box smallbox card">
<div className="container">
<a href="/docs/integrations/saas-cloud/snowflake-logs"><img src={useBaseUrl('img/integrations/security-threat-detection/snowflake.png')} alt="icon" width="50"/><h4>Snowflake Logs</h4></a>
<p>Monitor analytics for your Slack users, channels, and access logs for workspaces.</p>
</div>
</div>
Expand Down
238 changes: 238 additions & 0 deletions docs/integrations/saas-cloud/snowflake-logs.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,238 @@
---
id: snowflake-logs
title: Snowflake Logs
sidebar_label: Snowflake Logs
description: The Sumo Logic app for Snowflake Logs allows you to gain real-time insights into key metrics, query performance, and overall health of Snowflake environments to optimize operations, support informed decisions, and maximize Snowflake's potential.
---

import useBaseUrl from '@docusaurus/useBaseUrl';

<img src={useBaseUrl('img/integrations/security-threat-detection/snowflake.png')} alt="Thumbnail icon" width="150"/>

The Sumo Logic app for Snowflake Logs offers a powerful analytics solution designed to help you fully leverage the Snowflake cloud data platform. Known for its scalability and advanced data warehousing capabilities and analytics, Snowflake supports data-driven decision-making at scale. This app provides real-time visibility into key metrics, query performance, and the overall health of Snowflake environments. By analyzing Snowflake logs, you can monitor system performance, track login activity, optimize data management, and maintain better control over your data warehouse.

With centralized monitoring and actionable insights, the app enables you to streamline operations, make informed decisions, and maximize the value of their Snowflake data assets.

:::info
This app includes [built-in monitors](#snowflake-logs-monitors). For details on creating custom monitors, refer to the [Create monitors for Snowflake Logs app](#create-monitors-for-snowflake-logs-app).
:::

## Log types

This app uses Sumo Logic’s [Snowflake Logs Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source/) to collect the data from the Snowflake Logs platform.

### Sample log messages

<details>
<summary>Login History</summary>

```json
{
"CLIENT_IP": "52.44.184.81",
"CLIENT_PRIVATE_LINK_ID": null,
"CONNECTION": null,
"ERROR_CODE": null,
"ERROR_MESSAGE": null,
"EVENT_ID": "1023469238922246",
"EVENT_TIMESTAMP": "2025-06-12T01:14:02.745-04:00",
"EVENT_TYPE": "LOGIN",
"FIRST_AUTHENTICATION_FACTOR": "SAML2_ASSERTION",
"IS_SUCCESS": "YES",
"RELATED_EVENT_ID": "0",
"REPORTED_CLIENT_TYPE": "SNOWFLAKE_UI",
"REPORTED_CLIENT_VERSION": "9.15.2",
"SECOND_AUTHENTICATION_FACTOR": "DUO_PUSH",
"USER_NAME": "John"
}
```
</details>

<details>
<summary>Sessions</summary>

```json
{
"AUTHENTICATION_METHOD":"Password",
"CLIENT_APPLICATION_ID":"Go 1.14.0",
"CLIENT_APPLICATION_VERSION":"1.14.0",
"CLIENT_BUILD_ID":"",
"CLIENT_ENVIRONMENT":"{\"APPLICATION\":\"Go\",\"OS\":\"linux\",\"OS_VERSION\":\"gc-amd64\",\"OCSP_MODE\":\"FAIL_OPEN\",\"GO_VERSION\":\"go1.23.9 X:boringcrypto\"}",
"CLIENT_VERSION":"0",
"CLOSED_REASON":"LOGOUT",
"CREATED_ON":"2025-06-12T01:59:56.812-07:00",
"LOGIN_EVENT_ID":"41338407433",
"SESSION_ID":"2709153701236758",
"USER_NAME":"JOhn"
}
```
</details>

<details>
<summary>Stages</summary>

```json
{
"COMMENT": null,
"CREATED": "2025-06-12T03:37:20.787-04:00",
"DELETED": "2025-06-12T03:42:25.544-04:00",
"DIRECTORY_ENABLED": null,
"ENDPOINT": null,
"INSTANCE_ID": null,
"LAST_ALTERED": "2025-06-12T03:42:25.544-04:00",
"OWNER_ROLE_TYPE": null,
"STAGE_CATALOG": "CDWQA",
"STAGE_CATALOG_ID": "46",
"STAGE_ID": "42409",
"STAGE_NAME": "dhgfak",
"STAGE_OWNER": null,
"STAGE_REGION": null,
"STAGE_SCHEMA": "DVT",
"STAGE_SCHEMA_ID": "371",
"STAGE_TYPE": "Internal Named",
"STAGE_URL": null,
"STORAGE_INTEGRATION": null
}
```
</details>

<details>
<summary>Data Transfer History</summary>

```json
{
"BYTES_TRANSFERRED": 15562,
"END_TIME": "2025-06-12T01:00:00-04:00",
"SOURCE_CLOUD": "aws",
"SOURCE_REGION": "us-east",
"START_TIME": "2025-06-12T00:00:00-04:00",
"TARGET_CLOUD": "aws",
"TARGET_REGION": "us-west",
"TRANSFER_TYPE": "COPY"
}
```
</details>

<details>
<summary>Grants to User</summary>

```json
{
"CREATED_ON": "2025-06-12T09:44:40.468-04:00",
"DELETED_ON": null,
"GRANTED_BY": "JOHN",
"GRANTED_TO": "USER",
"GRANTEE_NAME": "SUMO",
"ROLE": "TESTER"
}
```
</details>

### Sample queries

```sql title="Users Login Over Time"
_sourceCategory="Labs/SnowflakeLogs"
| Json "REPORTED_CLIENT_TYPE", "USER_NAME", "FIRST_AUTHENTICATION_FACTOR", "SECOND_AUTHENTICATION_FACTOR", "AUTHENTICATION_METHOD", "SESSION_ID", "STAGE_ID", "STAGE_TYPE", "TRANSFER_TYPE", "CLIENT_IP", "CREATED_ON", "ROLE", "GRANTED_TO", "GRANTEE_NAME", "GRANTED_BY", "QUERY_TEXT", "QUERY_TYPE", "ROLE_NAME", "EXECUTION_STATUS", "EXECUTION_TIME" as client_type, user_name, first_authentication, second_authentication, authentication_method, session_id, stage_id, stage_type, data_transfer_type, ip_address, date, role, granted_to, grantee_name, granted_by, query_text, query_type, role_name, status, execution_time nodrop

// global filters
| where isNull(stage_type) or stage_type matches "{{stage_type}}"
| where isNull(authentication_method) or authentication_method matches "{{authentication_method}}"
| where isNull(data_transfer_type) or data_transfer_type matches "{{data_transfer_type}}"
| where isNull(client_type) or client_type matches "{{client_type}}"
| where isNull(second_authentication) or second_authentication matches "{{2FA}}"

// panel specific
| where !isNull(client_type)
| timeslice 1d
| count by user_name, _timeslice
| count as frequency by _timeslice
| fillmissing timeslice
```

```sql title="Breakdown by Session Closed Reason"
_sourceCategory="Labs/SnowflakeLogs"
| Json "AUTHENTICATION_METHOD", "SESSION_ID", "CLOSED_REASON", "TARGET_CLOUD", "SOURCE_CLOUD", "REPORTED_CLIENT_TYPE", "CLIENT_IP", "IS_SUCCESS", "USER_NAME", "ERROR_CODE", "ERROR_MESSAGE", "TRANSFER_TYPE", "SOURCE_REGION", "TARGET_REGION", "BYTES_TRANSFERRED" as authentication_method, session_id, session_closed_reason, target_cloud, source_cloud, client_type, ip_address, is_success, user_name, error_code, error_message, data_transfer_type, source_region, target_region, bytes_transferred nodrop

// global filters
| where isNull(session_closed_reason) or session_closed_reason matches "{{session_closed_reason}}"
| where isNull(source_cloud) or source_cloud matches "{{source_cloud}}"
| where isNull(target_cloud) or target_cloud matches "{{target_cloud}}"
| where isNull(login_success) or login_success matches "{{login_success}}"

// panel specific
| where !isNull(authentication_method)
| count by session_closed_reason, session_id
| count as frequency by session_closed_reason
| sort by frequency, session_closed_reason
```

## Collection configuration and app installation

import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';

<CollectionConfiguration/>

:::important
Use the [Cloud-to-Cloud Integration for Snowflake Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/snowflake-logs-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Snowflake Logs app is properly integrated and configured to collect and analyze your Snowflake Logs data.
:::

### Create a new collector and install the app

import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';

<AppCollectionOPtion1/>

### Use an existing collector and install the app

import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';

<AppCollectionOPtion2/>

### Use an existing source and install the app

import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';

<AppCollectionOPtion3/>

## Viewing Snowflake Logs dashboards

import ViewDashboards from '../../reuse/apps/view-dashboards.md';

<ViewDashboards/>

### Snowflake Logs - Overview

The **Snowflake Logs - Overview** dashboard provides a comprehensive view of key metrics and operational insights within your Snowflake environment. It enables real-time monitoring of user activity, system performance, and data transfer trends, helping stakeholders better understand overall usage and behavior.
Key panels include Total Users, 2FA Enabled Users, Total Sessions, User Geolocation, and more, allowing you to track login activity, system utilization, and authentication patterns over time. By analyzing data by authentication methods, transfer types, and other factors, you can proactively manage resources, optimize processes, and improve operational efficiency.

<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Snowflake-Logs/Snowflake+Logs+-+Overview.png')} alt="Entries Overview dashboard" />

### Snowflake Logs - Security

The **Snowflake Logs - Security** dashboard offers in-depth visibility into security-related activities and potential threats within your Snowflake environment. It highlights key events such as failed login attempts, data transfers, and geolocation-based login patterns. With metrics like Failed Login Summary, Data Transfer by Source Cloud Platform, and Transfers Over 1GB, helping security teams identify anomalies, investigate incidents, and take proactive steps to mitigate risks effectively.

<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Snowflake-Logs/Snowflake+Logs+-+Security.png')} alt="Audits Overview dashboard" />

## Create monitors for Snowflake Logs app

import CreateMonitors from '../../reuse/apps/create-monitors.md';

<CreateMonitors/>

### Snowflake Logs monitors

| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
|:--|:--|:--|:--|
| `Snowflake Logs - Data Transfer Limitation` | This alert is triggered when more than 1GB data transfer occurs in single session. | Critical | Count > 0 |
| `Snowflake Logs - Logins from Embargoed Geo Locations` | This alert is triggered when logins are detected from sanctioned or embargoed regions, helping you to maintain adherence to legal and regulatory standards. | Critical | Count > 0|

## Upgrade/Downgrade the Snowflake Logs app (Optional)

import AppUpdate from '../../reuse/apps/app-update.md';

<AppUpdate/>

## Uninstalling the Snowflake Logs app (Optional)

import AppUninstall from '../../reuse/apps/app-uninstall.md';

<AppUninstall/>
1 change: 1 addition & 0 deletions sidebars.ts
Original file line number Diff line number Diff line change
Expand Up @@ -2583,6 +2583,7 @@ integrations: [
'integrations/saas-cloud/salesforce',
'integrations/saas-cloud/sentinelone',
'integrations/saas-cloud/slack',
'integrations/saas-cloud/snowflake-logs',
'integrations/saas-cloud/sophos',
'integrations/saas-cloud/sumo-collection',
'integrations/saas-cloud/symantec-endpoint-security-service',
Expand Down