Manage Org Details (Manage)
We're excited to announce that organization managers can now edit a child organization's name, subdomain, and account owner directly from the organizations pages. Learn more.
We're excited to announce that organization managers can now edit a child organization's name, subdomain, and account owner directly from the organizations pages. Learn more.
We're excited to announce the ability to run log search queries and dashboard queries directly across multiple child orgs under a parent org. Previously, you could only query across one child org under a parent org. Going forward, you can now query across multiple child orgs, making it easier to dive into multi org-specific insights while staying connected at the parent org level.
We're excited to introduce the new Sumo Logic app for Zero Networks Segment. This app provides deep visibility into network activity, segmentation policies, and enforcement actions, helping security teams detect anomalies, assess risk, and validate zero‑trust controls to strengthen overall network security. Learn more
Mobot's Query Agent and Knowledge Agent are now generally available, bringing AI-powered troubleshooting and platform learning to all users.
Query Agent translates your questions into log search queries and helps you refine them through natural conversation—no query syntax required. Investigate performance issues, security threats, and anomalies faster with contextual suggestions and step-by-step refinements.
Knowledge Agent answers how-to questions about Sumo Logic, sourced directly from official documentation. Get setup guidance, troubleshooting help, and best practices without leaving your workflow.
Ask questions in plain English, refine with follow-ups, and get results in minutes. Perfect for on-call engineers, security teams, and anyone who needs answers fast. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Google Threat Intel. This source securely collects alerts from the Google Threat Intel platform and sends them to Sumo Logic for streamlined analysis. Learn more.
We're excited to annouce a new Collection Overview page, providing parent organization users with a unified view of all Installed, Hosted, and OpenTelemetry collectors across their child orgs. This also helps you to monitor collector health status and drill down into the selected organization for deeper analysis. Learn more.
We’re excited to introduce Conditional thresholds to table charts in dashboards, helping you to quickly surface trends, outliers, and key indicators to enhance data readability at a glance. This feature allows you to apply flexible color rules to rows and cells, making it easy to highlight values that breach defined thresholds. Learn more.
Mobot has been updated for Beta customers and now gives users access to two specialized agents designed to make natural-language interactions clearer and more effective:
Mobot remains your conversational interface for Sumo Logic — simply ask questions and get actionable results without writing syntax or hunting through docs. Query Agent focuses on data investigation, while Knowledge Agent focuses on product guidance. Together, they help you troubleshoot faster, explore data more intuitively, and learn the platform without friction.
Only Mobot Beta customers will see this update. Learn more
We're excited to introduce the new Sumo Logic app for Varonis. This app provides a unified view of threat intelligence and detection activity for faster and more informed analysis by collecting alerts from the Varonis platform. Learn more.
We're excited to announce the ability to manage your Library content across your Enterprise multi-orgs and MSSP (typically a parent organization with multiple child organizations). This lets you to save, share, and manage log searches, dashboards, apps, and other Sumo Logic content for launching searches and dashboards with a single click. Learn more.
We're excited to introduce the new Sumo Logic app for GitHub Copilot. This app provides actionable insights into Copilot adoption, engagement, and productivity across your organization. Use its dashboards to track usage trends, measure efficiency, and optimize AI-assisted development. Learn more.
We're excited to introduce the new Sumo Logic app for Databricks Audit. This app helps identify potential threats, highlights key trends, and strengthens the overall security posture of your Databricks environment by analyzing the Databricks audit logs. Learn more.
New release:
Enhancements:
>= 5.16.2 and < 7.0.0.1.5.7.sumologic-app-utils - 2.0.21.sumologic-s3-logging-auto-enable - 1.0.18.Deprecation:
Updated the Sumo Logic Lambda Extension to version 1.3.0. Learn more.
aws-sdk-go to aws-sdk-go-v2 for better performance and modularity.The method of collecting metrics using Azure Resource Manager (ARM) will be deprecated and no longer supported starting January 1, 2026. Refer to the updated approach using Azure Metric Source, which offers improved functionality and ongoing support.
We're excited to introduce the new Sumo Logic app for ChatGPT Compliance. This app helps identify compliance risks, enforce responsible AI policies, and protect proprietary information, strengthening governance, safeguarding data integrity, and maintaining trust in responsible technology use. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Varonis Alerts. This source securely collects alerts from the Varonis platform and sends them to Sumo Logic for streamlined analysis. Learn more.
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Entra ID Protection. This app enhances identity security across Azure environments by proactively detecting, investigating, and mitigating identity-related risks. This integration helps you safeguard user accounts and credentials, ensuring secure access to critical cloud resources. Learn more.
We're excited to announce that Sumo Logic has fully transitioned to AWS Certificate Manager (ACM) certificates for Transport Layer Security (TLS) communication between your cloud syslog sources and Sumo Logic.
In a previous release note, we announced that we are transitioning from DigiCert to ACM certificates.
This change provides the following benefits:
If you use cloud syslog sources to send data to Sumo Logic, download and configure the ACM certificate on your system. For more information and setup instructions, see:
Starting November 2025, Snowflake will block single-factor authentication (password-only sign-ins) as part of their enhanced security protocols.
Snowflake has signed the CISA Secure by Design pledge and is committed to adopting security best practices, including:
These changes are designed to strengthen Snowflake’s overall security posture and better protect your data.
As an interim measure, Sumo Logic recommends you to use the Programmatic Access Tokens (PATs) to authenticate your Sumo Logic integration with Snowflake before 1st November 2025. This ensures continued access and seamless data collection from the Snowflake platform.
Refer to Using programmatic access tokens for authentication for step-by-step instructions to authenticate the integration with Snowflake.
For more information, contact your Technical Account Engineer (TAE) or reach out to Sumo Logic Support.
We're excited to annouce the new AutoPause feature for Scheduled Views, designed to enhance system performance and optimize resource usage.
With AutoPause, any Scheduled View that remains inactive for 90 consecutive days (that is, not queried or referenced) will be automatically flagged and paused. To ensure you're informed ahead of time, Scheduled View owners and active account administrators will receive email and in-app notifications 21 days and 7 days before the scheduled pause. If no action is taken, the view will be automatically paused on the 90th day, followed by a final alert. Learn more.
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Cloud Apps. This app enhances Azure security with centralized monitoring, proactive threat detection, and rapid incident response. It also offers interactive dashboards for tracking user activity and access, enabling faster threat management and stronger protection of cloud assets. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Databricks Audit. This source securely collects audit logs from the Databricks platform and sends them to Sumo Logic for streamlined analysis. Learn more.
We’re excited to announce that the requiresRawMessages field for creating a search job will now be set to false by default. This change improves the performance of aggregate queries by eliminating the overhead of generating raw messages. Learn more
We're excited to introduce the new Sumo Logic app for Carbon Black Inventory. This app offers you enhanced capabilities to identify risks and configuration gaps in your environment. Learn more.
We’re excited to announce the new Organization Usage Limits tab, featuring the Ingestion – Throttling Limits section. This section displays your average ingestion rate for a selected time range alongside your account’s throttling limits. Additionally, you can opt in to receive email notifications whenever your account experiences throttling. Learn more.
We're excited to introduce the new Sumo Logic app for Azure OpenAI. This app provides secure access to OpenAI’s generative AI models within Azure’s enterprise-grade environment. It integrates with Azure services and external data sources to support advanced natural language processing, code generation, and reasoning, while offering tools to monitor usage, performance, and reliability. Learn more.
We are happy to announce that parent org admins can now configure the users to view and SSO into child organizations. Previously, any user with the View Organizations capability could view and SSO into all child orgs. Now, users with the Manage Organizations capability can define access on a per-child-org basis, giving you more precise control over who can sign in where. Learn more.
Sumo Logic has introduced a change to the way group-to-role mapping is handled when performing on-demand role provisioning during SAML authentication. Previously, all groups included in a SAML assertion were validated against roles in Sumo Logic. Going forward, only the groups that match existing roles in Sumo Logic will be applied to the authenticating user. Any non-matching groups will be ignored. Only if no roles match with the groups passed in the assertion will an authentication fail.
For more information about SAML configuration for roles provisioning, see Configure on-demand roles provisioning.
We’re excited to announce the release of the new Azure Machine Learning app for Sumo Logic.
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Identity. This app offers you enhanced capabilities to protect endpoints and defend against advanced cyber threats. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for ChatGPT Compliance. This source securely collects conversation logs from the ChatGPT Compliance platform and sends them to Sumo Logic for streamlined analysis. Learn more.
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Office 365. This app provides insights into threats and alerts across Microsoft 365, helping you prioritize incidents, respond faster, and strengthen your Office 365 security posture. Learn more.
We’re excited to announce the release of our new Azure Metrics Source for Sumo Logic. This source enables you to collect metrics from Azure platform and send them to Sumo Logic for streamlined analysis. Learn more.
We're excited to introduce the new Trellix mVision ePO app for Sumo Logic. This app offers a centralized view of malicious activity, risky endpoints, and unusual network behavior by collecting events logs from the Trellix mVision ePO platform and sending them to Sumo Logic for analysis. Learn more.
We are happy to announce that you can now configure and forward the log data from Sumo Logic to a Google Cloud Storage (GCS) destination. Previously, data forwarding was limited only to AWS S3. Now you can forward the log data, log data with metadata, or log data with metadata and enriched fields, in either CSV or JSON format to GCS. Learn more.
To request access, contact your Sumo Logic account representative or Support.
We’re introducing Mobot, Sumo Logic’s new conversational UI for log search, and updating the product name from Copilot to Mobot. Learn more.
The new conversational experience lets you ask follow-up questions without repeating your search context, making investigations more natural and iterative.
Enhancements include:
As part of a staggered Beta rollout, Copilot is being renamed to Mobot. The Mobot name and experience are available only in organizations included in this Beta. All other customers will continue to see Copilot until general availability.
During the transition, some UI labels and screenshots may still show Copilot. Functionality is unchanged.
To request access, contact your Sumo Logic account representative or Support.
We're excited to introduce the new OneLogin - User Inventory dashboard to the existing OneLogin app for Sumo Logic. This dashboard offers a centralized view of user account lifecycle and activity within the OneLogin environment. Learn more.
We're excited to announce the ability to run a log search queries directly within a selected child org under a parent org. Additionally, you can now fetch data from the selected child org and seamlessly view the associated dashboards, thereby enabling more granular monitoring and insights.
This enhancement streamlines workflows across multi-org environments and makes it easier to dive into org-specific insights while staying connected at the parent org level.
Learn more - Log Search Across Child Orgs
Learn more - Create a Dashboard for Child Orgs
We're excited to introduce the new AWS IAM Users app for Sumo Logic. This app helps you monitor and analyze user-related data, enabling you to optimize security practices and ensure compliance within your AWS account. Learn more.
We’re excited to announce the release of the new Azure Event Hubs app and OpenTelemetry Collector Insights app for Sumo Logic.
sumologic-app-utils - SemanticVersion 2.0.21sumologic-s3-logging-auto-enable - SemanticVersion 1.0.18sumologic-guardduty-benchmark - SemanticVersion 1.0.18sumologic-aws-cloudtrail-benchmark - SemanticVersion 1.0.21We're excited to introduce the new Zimperium app for Sumo Logic. This app provides visibility into mobile threats by centralizing threat intelligence and device telemetry, and collects threat logs for analysis in Sumo Logic. Learn more.
We're excited to introduce the new OpenTelemetry Collector Insights app for Sumo Logic. This app offers robust monitoring and observability for Sumo Logic OpenTelemetry Collector instances (version 0.130.1-sumo-0 and above), enabling you to track performance, data flow, and resource usage through prebuilt dashboards and alerts. Learn more.
We're excited to introduce the new ExtraHop RevealX 360 app for Sumo Logic, which enables you to gain real-time visibility into your security hub findings data. This app can help security teams to monitor detection trends, track changes in risk levels, and gain insights into the most frequently observed MITRE techniques, top destination devices, and key targets on the network. Learn more.
We're excited to introduce the new Vectra app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Vectra source to collect the detections from the Vectra platform. It provides security analysts with visibility into security threats detected across networks, cloud environments, and endpoints. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for GitHub Copilot. This source aims to collect the organization and team metrics logs from the Copilot platform and send them to Sumo Logic for streamlined analysis. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for AWS IAM Users. This source collects the IAM User Inventory logs from the AWS SDK and sends them to Sumo Logic for streamlined analysis. Learn more.
We're excited to introduce the new AWS Security Hub - OCSF app for Sumo Logic, which enables you to gain real-time visibility into your security hub findings data. This app can help security teams identify threats, track compliance violations, and investigate affected resources with speed and clarity. Learn more.
We're excited to announce that we are transitioning to AWS Certificate Manager (ACM) certificates for Transport Layer Security (TLS) communication between your cloud syslog sources and Sumo Logic.
Currently, Sumo Logic uses a DigiCert ALB certificate to secure communication with your cloud syslog sources. This certificate is set to expire on October 13, 2025, at which point Sumo Logic will transition to the ACM root certificates. This change provides the following benefits:
If you use cloud syslog sources to send data to Sumo Logic, please prepare for this transition by downloading and configuring the ACM certificate on your system. For more information and setup instructions, see:
We're excited to announce the release of our new cloud-to-cloud source for OneLogin. This source aims to collect the user list logs from the OneLogin API and send it to Sumo Logic for streamlined analysis. Learn more.
We've introduced time range limits for subqueries in scheduled searches. This change helps you prevent long-running, inefficient queries, especially those impacting system stability and that drive up costs. While maintaining flexibility, these optimizations protect system health and reduce operational overhead.
Key benefits of this enhancements include:
We’re excited to announce the release of Query Assist, designed to simplify query building by reducing complexity, enabling easier field discovery, minimizing errors, and providing intelligent query-writing assistance. These enhancements deliver real-time syntax suggestions, schema-based recommendations, and a frictionless query experience.
Key features of this feature include:
These updates make it easier for both beginners and advanced users to craft accurate queries and analyze data efficiently. Learn more.
We're excited to introduce the new Microsoft Defender for Endpoint app for Sumo Logic. This app enables you to gain real-time visibility into security alert data across your software projects and dependencies. This app also helps security and DevOps teams track risk exposure, prioritize remediation, and maintain a strong security posture. Learn more.
We're excited to introduce the new Google Cloud Security Command Center app for Sumo Logic. This app enables you to analyze, monitor, and respond effectively to security issues, helping you to improve cloud security, reduce risk, and maintain compliance. Learn more.
We're happy to announce a new Default Starting Page preference that allows you to select the page to appear when you log in to Sumo Logic. This preference applies only to users of the New UI. Learn more.
To help you get the most from your trial and clearly understand what happens next, we've outlined what to expect after your 30-day Flex free trial.
This helps ensure a focused, hands-on evaluation during your trial, followed by clear options for upgrading when you're ready.
This update applies only to Flex trial accounts created after July 14, 2025. It does not affect existing customers or other trial types such as AWS Marketplace and credits-based trials.
Learn more about Sumo Logic pricing plans and upgrading.
We're excited to announce the release of our new cloud-to-cloud source for Zimperium MTD. This source aims to collect the device logs from the Zimperium API and send it to Sumo Logic for streamlined analysis. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Vectra. This source aims to collect the threat detections from the Vectra platform and send them to Sumo Logic for streamlined analysis. Learn more.
We're happy to include the Timezone field for the Scheduled Views. Previously, America/Los_Angeles (Includes DST) was considered as the default timezone. Going forward, you can select/edit the timezone of your choice. If you do not make a selection, the Scheduled View will default to the timezone preference in Sumo Logic.
We are excited to announce the ability to manage library content on the new Manage Content tab. Now MSSP administrators can conveniently push content in the Library folder to multiple child organizations at once, including dashboards, saved searches, and scheduled searches. Learn more.
This feature is in Beta. To participate, contact your Sumo Logic account executive or our Support Team.

Akamai CPC.We're excited to introduce the new Akamai CPC app for Sumo Logic. This app enables you to monitor threats and respond to them in real time, enforcing compliance for client-side web applications using rich dashboards and Akamai CPC data. Learn more.
Snowflake Logs. We're excited to introduce the new Snowflake Logs app for Sumo Logic. This app enables you to gain real-time insights into key metrics, query performance, and overall health of the Snowflake environments to optimize operations, support informed decisions, and maximize Snowflake's potential. Learn more.
We're happy to introduce the deactivate and delink option to child orgs, this helps you to deactivate the child org when it is no longer needed and eventually delink it after the 48 hours cooling-off period.
We’re excited to introduce a new dashboard variable type: Scope-Based Variables. Scope-Based Variables act as log filters that can be automatically applied to all or selected panels within a dashboard. This helps you to easily filter data across multiple panels without needing to manually edit each panel’s query to accept the variable. Learn more.
We're excited to introduce the new Palo Alto Networks 11 app for Sumo Logic. This app enables you to analyze traffic and understand your Palo Alto Networks environments. In addition, you can dive deeper into the data, which is broken down by threat detection indicators, malware type, and so on. Learn more.
We're excited to introduce the new Snyk app for Sumo Logic. This app enables you to gain real-time visibility into security vulnerabilities across your software projects and dependencies. This app also helps security and DevOps teams track risk exposure, prioritize remediation, and maintain a strong security posture. Learn more.
AWS is streamlining CloudTrail events for IAM Identity Center to retain only the essential fields needed for audit and incident response workflows. These changes improve user identification and integration with directories like Okta and Microsoft Active Directory, and do not impact CloudTrail events from other AWS services.
To learn more, see Important changes to CloudTrail events for AWS IAM Identity Center.
AWS is updating CloudTrail events for IAM Identity Center, affecting how user identity data is structured. So, if you are using the updated fields in your Cloud SIEM content or across the Sumo Logic platform, you need to update any saved queries, dashboards, or detection rules to reflect these changes and ensure continued functionality.
Key actions required while updating the AWS CloudTrail include:
If you're using any of the following apps that consume CloudTrail data, you must reinstall them:
To reinstall any of the above apps, follow the steps below:
These are Classic apps (V1), and reinstalling them will create a new folder in your Content Library with updated dashboards.
If you’ve created custom content based on CloudTrail fields, manual field updates as given below will be required to accommodate the new schema:
userName field from the userIdentity element to the additionalEventData element.principalId field from the schema.userId, identityStoreArn, and credentialId fields to the userIdentity element.For more information on field changes, see AWS Security Blog.
AWS plans to implement these enhancements on July 14, 2025.
Sumo Logic apps are backward-compatible, allowing you to update the apps ahead of time. For any custom content outside of Sumo Logic’s apps or parsers, ensure your changes are backward compatible and deploy updates before July 14, 2025.
Failure to update your apps, saved searches, or dashboards will result in user-related fields not being parsed correctly. Consequently, visualizations and panels relying on those fields will appear empty or display inaccurate data.
We're excited to introduce the updated version of our partner app for Gigamon Application Metadata Intelligence. This update includes a new set of security-focused dashboards, such as HIPAA Network, PCI Compliance, DevOps API Inventory & Network Insights, DNS & Web Traffic Insights, URL Analysis for Threat Detection, and Rogue Activity, aimed at improving visibility into compliance, network behaviour, and suspicious activities. Learn more.
Previously, we announced that Root Cause Explorer was deprecated. As of 3 June 2025, Root Cause Explorer has reached its end of life and is no longer available.
Learn more here.
Classic Apps to Next-Gen Apps Migration. ActiveMQ, IIS 7/8, Kafka, RabbitMQ, Squid Proxy, Strimzi Kafka, and Varnish.
Updated 13 Azure apps. Azure Application Gateway, Azure App Service Plan, Azure API Management, Azure Cache for Redis, Azure Container Instances, Azure Cosmos DB, Azure Database for MySQL, Azure Database for PostgreSQL, Azure Functions, Azure Kubernetes Service (AKS) - Control Plane, Azure Load Balancer, Azure Virtual Machine, and Azure WebApps.
Updated 12 OpenTelemetry apps. ActiveMQ - OpenTelemetry, Apache Tomcat - OpenTelemetry, Cassandra - OpenTelemetry, Elasticsearch - OpenTelemetry, JMX - OpenTelemetry, MongoDB - OpenTelemetry, MySQL - OpenTelemetry, Oracle - OpenTelemetry, PostgreSQL - OpenTelemetry, RabbitMQ - OpenTelemetry, Redis - OpenTelemetry, and VMWare - OpenTelemetry.
Updated AWS Lambda. New use cases added for CloudTrail logs and CloudWatch metrics.
We're happy to introduce a new way to rotate access keys, as well as a new access keys expiration policy. Together these help to make your account more secure by encouraging regular API key updates.
We're excited to introduce the new Kaltura app for Sumo Logic. This app enables you to gain valuable insights into the critical aspects of your platform operations, such as total entries, user activity trends, and event distributions, helping you monitor, secure, and optimize your content management strategies effectively. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Snowflake Logs. This source aims to collect the row data from the supported global tables (QUERY_HISTORY, LOGIN_HISTORY, SESSIONS, GRANTS_TO_USERS, DATA_TRANSFER_HISTORY, STAGES, and Custom Events) from the Snowflake platform and send them to Sumo Logic for streamlined analysis. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Akamai CPC. This source aims to collect CPC-Configs, CPC-Alerts, and CPC-Alert Details data from the Akamai platform and send them to Sumo Logic for streamlined analysis. Learn more.
We’ve launched a new Get Started onboarding page to help you hit the ground running in Sumo Logic. This personalized hub replaces the previous checklist and guides you through key actions such as:
This redesigned experience simplifies setup, accelerates time to value, and provides clear next steps to help you make the most of your trial. Learn more.
We're excited to introduce the new Bitwarden app for Sumo Logic. This app enables threat detection and identification of high-risk events such as vault exports or SSO deactivation, supporting continuous monitoring and accelerating incident response for credential and secret management workflows. Learn more.
We're excited to introduce the new Sysdig Secure app for Sumo Logic. With this app, you can gain real-time insights into vulnerabilities, compliance, and threats, making it easier to understand risks, respond quickly, and maintain continuous security and compliance to protect your containerized environments. Learn more.
We're excited to announce provisioning for Sumo Logic using SCIM (System for Cross-domain Identity Management). Now you can automatically provision and deprovision users in Sumo Logic with an identity provider like Microsoft Entra ID, Okta, or OneLogin.
The previously announced automatic conversion of Real-Time Scheduled Searches to 15-minute scheduled searches will not take place.
We are happy to announce that you can now create service accounts in Sumo Logic. Service accounts are a special type of account designed for automating processes that use Sumo Logic APIs, such as scripts, integrations, and infrastructure as code. Unlike user accounts, service accounts are not associated with an individual and do not allow for interactive logins.

We’re excited to announce the release of the following apps for Sumo Logic:
Enhancements:
Node.js v20.x to Node.js v22.x.Node.js v22.x in the CloudFormation template for AWS CloudWatch Logs with Dead Letter Queue Support.Python v3.11 to Python v3.13.Python v3.13 in the CloudFormation template for Kinesis Metric Collection.v3.x.Deprecations:
We are happy to announce that authorized users can now control the visibility of installed app content. This update allows content administrators and the installing user to configure the roles and users who should be allowed to view the dashboards and log searches that are installed with an app.
For more information about sharing apps, see Content Sharing in Sumo Logic.
We're excited to introduce the new Sumo Collection app for Sumo Logic. By leveraging this app, you can get insights into the health and status of Sumo Logic collectors and sources, allowing you to effectively manage and monitor collectors and sources within Sumo Logic. Learn more.
We’ve made it even easier to access Sumo Logic: you can now sign in using your Google account credentials.
If your email address is linked to a Google account, just click Continue with Google on the sign-in page to authenticate. No setup required.
You can also use Google SSO when signing up for a new Sumo Logic account.
Organizations using SAML or other identity providers will continue to sign in as usual.
We’re excited to announce the general availability of Kickstart Data, a streamlined onboarding experience that includes sample data and prebuilt dashboards. Whether you're starting a free trial or simply spinning up a new account, Kickstart Data makes it easy to understand Sumo Logic's capabilities without needing to ingest your own data first.
We’re excited to announce a new SumoLogic_ThreatIntel source incorporating Indicators of Compromise (IoC) from Intel 471. Analysts can use this out-of-the-box default source of threat indicators to aid in security analysis.

We're excited to introduce the new Cisco Vulnerability Management app for Sumo Logic. By leveraging this app, security analysts can collect the detected open vulnerabilities and active assets to enable a secure infrastructure. Learn more.
We’re excited to announce the release of the new Azure Key Vault and AWS Auto scaling apps for Sumo Logic.
Node.js v18 to Node.js v20. Learn more.Bugs for the following apps have been fixed:
We're excited to introduce the new CyberArk Audit app for Sumo Logic. By leveraging this app, security analysts can monitor, analyze, and visualize audit trails of user activities, security events, and anomalies to enhance security. Learn more.
A new preference setting allows you to open links from the left navigation menu in a new browser tab by default. This feature is available only in the New UI. Learn more.

We're excited to introduce the new Azure Security - Advisor app for Sumo Logic. By leveraging this app, security analysts can quickly assess Azure Advisor’s recommendations, track remediation progress over time, and take action to enhance the security and efficiency of their Azure infrastructure. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Confluent Cloud Metrics. This source aims to collect metric data from the Confluent Cloud Metrics platform and send them to Sumo Logic for streamlined analysis. Learn more.
We're excited to introduce the new Netskope WebTx app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Netskope WebTx source to collect the web transaction logs from the Netskope WebTx platform. It provides security and IT teams the visibility and insights into web transactions, helping organizations monitor, analyze, and secure their web traffic. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Sumo Collection. This source aims to collect the list of collectors and their sources using Sumo Logic Collector API and Source API and send them to Sumo Logic for streamlined analysis. Learn more.
We are excited to announce a new Content Management tab that allows MSSP administrators the ability to conveniently push updates to multiple child organizations at once. Learn more.
This feature is in Beta. To participate, contact your Sumo Logic account executive or our Support Team.

We’re excited to announce the next milestone in our transition to the New UI. Starting today, the New UI will become the default experience when you sign in to Sumo Logic.
The Classic UI will be retired in 2025. The exact date will be communicated closer to the transition. To ensure you have access to the latest features, performance improvements, and innovations, we encourage you to start using the New UI as soon as possible.
Here's what's changed since the last rollout.
We've introduced three new features to improve your Copilot experience:
Copilot now automatically updates conversation titles based on your query, making it easier to track and revisit past investigations. You can also customize it by clicking the pencil icon next to the title.
We've added an Open in Copilot button to the Alert Response page, allowing you to troubleshoot alerts directly in Copilot. This preserves the alert context, making it seamless to investigate and resolve issues.
Now you can pin Copilot suggestions for easy reference. Just hover over a suggestion and click the pin icon to save it within your conversation.
We’re excited to introduce Sumo Logic Threat Intelligence, a powerful feature set that enables Cloud SIEM administrators to seamlessly import indicators of Compromise (IoC) files and feeds directly into Sumo Logic to aid in security analysis. IoCs are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known targets for compromise.
Once indicators are ingested and appear on the Threat Intelligence tab, Cloud SIEM analysts can use the hasThreatMatch function in Cloud SIEM rules to analyze incoming records for matches to the threat intelligence indicators.
Sumo Logic Threat Intelligence will help you stay ahead of emerging threats and enhance your security posture.
Only Cloud SIEM administrators can add threat intelligence indicators to the datastore.

We’re excited to announce the release of the new Azure Container Instance app and three OpenTelemetry Remote Management source templates for Sumo Logic.
Azure Container Instance app. Azure Container Instances is a fully managed serverless container service that enables you to deploy and manage containers in Azure without the need for virtual machines. This integration allows you to analyse logs and metrics pertaining to Azure Container Instances. Learn more.
OpenTelemetry Remote Management. Released MySQL, PostgreSQL, and ElasticSearch OpenTelemetry Remote Management source templates.
We're excited to introduce the new Automox app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Automox source to collect audit and event logs from the Automox platform. It provides security and IT teams with visibility into endpoint management and security. By using this app, teams can improve their security monitoring, streamline endpoint management, and strengthen operational resilience. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for CyberArk Audit. This source aims to collect the audit events from the CyberArk platform using the CyberArk SIEM integrations API and send them to Sumo Logic for streamlined analysis. Learn more.
We've updated the onboarding experience to give you the option to bypass data collection setup and explore the App Catalog instead.
A new Go to App Catalog option now appears in the left-hand menu on the data setup page, allowing you to browse integrations and pre-built dashboards before configuring data ingestion. This change makes it easier to explore Sumo Logic’s capabilities without committing to a full setup.
To learn more, check out our quickstart and signup guides.
Enabling SSO for child organizations makes moving between organizations under your authority much more seamless and convenient. We are excited to announce that single sign-on (SSO) is now automatically enabled when you create child organizations, allowing you to sign in to child organizations without having to provide separate credentials. Learn more.
We're excited to introduce the new Dragos app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Dragos source that collects collect vulnerabilities, notifications, addresses, zones, and assets logs from the Dragos platform. This app helps security analysts to minimize cybersecurity risks, improve operational resilience, and safeguard critical infrastructure from evolving cyber threats. Learn more.
We're excited to announce the release of our new cloud-to-cloud source for Sysdig Secure. This source aims to collect the scan results from the scanner using Sysdig API and send them to Sumo Logic for streamlined analysis. Learn more.
We're excited to introduce the new Trust Login app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Trust Login source that collects report logs from the Trust Login platform, enabling security analysts to monitor authentication events and user activities, and respond to potential security threats across your organization. Learn more.
We're excited to introduce the new Code42 Incydr app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Code42 Incydr source that collects audits, file events, and user sessions data from the Code42 Incydr platform. This app helps security analysts monitor, detect, and respond to potential data threats across an organization. Learn more.
We're excited to introduce the new JumpCloud Directory Insights app for Sumo Logic. This app provides a comprehensive visibility into authentication events, user activities, and security-related actions within your JumpCloud-managed environment. The pre-configured dashboards can help you to track failed login attempts, privileged access changes, and account lockouts in real-time to improve security and ensure organizational policy compliance. Learn more.
We’re excited to announce the release of the new Azure Virtual Network app and 11 new OpenTelemetry Remote Management source templates for Sumo Logic.
This section details the new features and updates in AWS Observability for upgrading your Terraform script or CloudFormation template to version v2.11.0.
To learn more, refer the AWS Observability changelog.
quantization_interval filter variable.We are excited to announce that we are now supporting Sumo Logic's Organizations ("Sumo Orgs") feature for Sumo Logic Flex customers. With this release, Flex customers can effectively group, provision, manage, and monitor the credit usage across multiple organizations, providing greater visibility and control over account structures. Learn more.
We're excited to introduce the new VMware Workspace ONE app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud VMware Workspace ONE source that collects audit logs data from the VMware Workspace ONE platform. This app helps security analysts monitor device compliance, encryption, and overall security status, offering a powerful solution for effective risk analysis, policy enforcement, and device security. Learn more.
We're excited to introduce the time-phased scan budgets for advanced usage management, which helps you to set Daily, Weekly, or Monthly budgets for individual user or a single shared budget for an entire group. Learn more.
We're excited to announce enhancements to how you create and manage access keys.
The My Access Keys section has been moved out of Preferences to its own tab and renamed Personal Access Keys.
To open the Personal Access Keys tab:
You can now create permission scopes for access keys. Scopes limit the API endpoints an access key can be used to call. This allows you to specify only the permissions the access key needs to accomplish a specific task, making the key more secure.

Symantec Endpoint Security Service. We're excited to introduce the new Symantec Endpoint Security Service app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Symantec Endpoint Security source that collects incident and event logs data from the Symantec Endpoint Security platform. This app provides real-time insights into the log data that allows you to monitor and manage endpoint security in real time, enhancing quick responses to threats. Learn more.
Jamf. We're excited to introduce the new Jamf app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Jamf source that collects inventory data from the Jamf platform. This app helps security analysts with critical insights into their organization's Jamf environment. Learn more.
We're excited to introduce the new Trend Micro Vision One app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Trend Micro Vision One source that collects alert logs data from the Trend Micro Vision One platform. This app helps you can gain real-time visibility into security events and incidents within your organization's infrastructure, allowing them to detect and react to potential threats quickly. Learn more.
This is an archive of the 2024 Sumo Logic Service Release Notes.
This is an archive of the 2023 Sumo Logic Service Release Notes.
This is an archive of the 2022 Sumo Logic Service Release Notes.
This is an archive of the 2021 Sumo Logic Service Release Notes.
Release notes from 2016-2020 have been archived. If you need access to earlier versions, contact Support.