Skip to content

Commit 28bc287

Browse files
jpipkin1kimsauce
andauthored
DOCS-1021 - DigiCert and ACM certificate migration for Cloud Syslog Source (#5631)
* Update doc * Update docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Updates from review * Add release note * Update blog-service/2025-08-12-collection.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update blog-service/2025-08-12-collection.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update blog-service/2025-08-12-collection.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update per review by Ravi Mishra * Change release note date to August 4 2025 * Update Acquia article * Change release note date to August 1 2025 --------- Co-authored-by: Kim (Sumo Logic) <[email protected]>
1 parent 8a2261a commit 28bc287

File tree

6 files changed

+113
-64
lines changed

6 files changed

+113
-64
lines changed

blog-service/2025-08-01-collection.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Cloud Syslog Source Certificate Transition to ACM (Collection)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- certificates
6+
- Cloud Syslog Source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce that we are transitioning to AWS Certificate Manager (ACM) certificates for Transport Layer Security (TLS) communication between your cloud syslog sources and Sumo Logic.
13+
14+
Currently, Sumo Logic uses a DigiCert ALB certificate to secure communication with your cloud syslog sources. This certificate is set to expire on October 13, 2025, at which point Sumo Logic will transition to the ACM root certificates. This change provides the following benefits:
15+
* **Automated certificate renewal and deployment**. ACM eliminates the need for future manual renewals, reducing administrative overhead.
16+
* **Simplified infrastructure management for AWS customers**. ACM is deeply integrated into the AWS ecosystem, streamlining your overall infrastructure management. Because Sumo Logic is also on AWS, using ACM provides a seamless experience.
17+
18+
If you use cloud syslog sources to send data to Sumo Logic, please prepare for this transition by downloading and configuring the ACM certificate on your system. For more information and setup instructions, see:
19+
* [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source/)
20+
* [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog)
21+
* [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/)
22+
* [Collect Logs for SentinelOne](/docs/send-data/collect-from-other-data-sources/collect-logs-sentinelone/)
23+
* [Acquia](/docs/integrations/saas-cloud/acquia/#step-2-configure-a-source)

docs/integrations/saas-cloud/acquia.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -190,10 +190,20 @@ Be sure to copy and paste your **token** in a secure location. You'll need this
190190

191191
**Sumo Logic SSL certificate**
192192

193-
In the procedure below, you'll configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname. Then you'll set up TLS by downloading a cert to your server. Download the DigiCert certificate from one of the following locations:
194-
* [https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt](https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt)
195-
* [https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt.pem](https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt.pem)
196-
193+
In the procedure below, you'll configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname. Then you'll set up TLS by downloading a cert to your server.
194+
195+
1. Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
196+
* https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt
197+
* https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt.pem
198+
* https://www.amazontrust.com/repository/AmazonRootCA1.cer
199+
1. Run the following commands:
200+
* `wget -O digicert_ca.der https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.`
201+
* `openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt`
202+
* `wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer`
203+
* `openssl x509 -inform der -in acm_ca.der -out acm_ca.crt`
204+
* `cat acm_ca.crt digicert_ca.crt > digicert_acm_cas.crt`
205+
* `perl -p -i -e "s/\r//g" digicert_acm_cas.crt`
206+
1. You'll upload the merged cert to the Acquia app when you configure Acquia log forwarding. See [Step 3: Configure logging for Acquia](#step-3-configure-logging-for-acquia).
197207

198208
### Configuring a cloud syslog source
199209

docs/send-data/collect-from-other-data-sources/collect-logs-sentinelone.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,17 @@ To get a token and certificate from Sumo Logic, do the following:
2828

2929
1. Configure a Cloud Syslog [Hosted Collector](/docs/send-data/collector-faq/#configure-limits-for-collector-caching) and [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source), and generate a Cloud Syslog source token. 
3030

31-
1. Download the crt server certificate file from [here](https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt).
31+
1. Download the server certificate files from https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt and https://www.amazontrust.com/repository/AmazonRootCA1.cer.
3232

33-
1. Go to the location where the cert file is located and open a terminal window.
33+
1. Go to the location where the cert files are located and open a terminal window.
3434

35-
1. Run the following two commands:
36-
* `wget -O digicert_ca.der https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.`
37-
* `openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt`
35+
1. Run the following commands:
36+
* `wget -O digicert_ca.der https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.`
37+
* `openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt`
38+
* `wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer`
39+
* `openssl x509 -inform der -in acm_ca.der -out acm_ca.crt`
40+
* `cat acm_ca.crt digicert_ca.crt > digicert_acm_cas.crt`
41+
* `perl -p -i -e "s/\r//g" digicert_acm_cas.crt`
3842

3943
## Step 2. Configure syslog messages
4044

@@ -54,7 +58,7 @@ To configure syslog messages, do the following:
5458
1. Click **SYSLOG**. The SYSLOG dialog appears.
5559
1. Click the toggle to **Enable SYSLOG**.
5660
1. Enter the **Syslog Host URL** and **port** number.
57-
1. Click **Use SSL secure connection**, then click **Server certificate > Upload** and browse to the location of the downloaded crt certificate file.
61+
1. Click **Use SSL secure connection**, then click **Server certificate > Upload** and browse to the location of the merged crt certificate file.
5862
1. Specify the following **Formatting** options:
5963

6064
* **Information format**: Select **CEF2**

docs/send-data/hosted-collectors/cloud-syslog-source/index.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ You can configure a cloud syslog source to allow a syslog client to send [RFC 5
1313

1414
Syslog messages must be compliant with [RFC 5424](https://tools.ietf.org/html/rfc5424) or they are dropped. Messages over 64 KB are truncated.
1515

16-
Sumo manages an elastic scaling set of syslog servers, which scales up and down behind a set of AWS Elastic Load Balancers. The AWS ELB set can also scale up and down. For this reason, instead of IP address-based endpoints, Sumo uses endpoint hostnames in this format:
16+
Sumo Logic manages an elastic scaling set of syslog servers, which scales up and down behind a set of AWS Elastic Load Balancers. The AWS ELB set can also scale up and down. For this reason, instead of IP address-based endpoints, Sumo Logic uses endpoint hostnames in this format:
1717

1818
```
1919
syslog.collection.YOUR_DEPLOYMENT.sumologic.com
@@ -25,17 +25,19 @@ where `YOUR_DEPLOYMENT` is `au`, `ca`, `de`, `eu`, `fed`, `jp`, `kr`, `us1`,
2525
FIPS 140-2 compliance is not available for Cloud Syslog in the FedRAMP deployment. It is with great emphasis that you must recognize and understand that the responsibility to mitigate information spillage is solely yours. We have no insight into your data or how it is classified.
2626
:::
2727

28-
In the procedure below, you configure a Cloud Syslog Source, this will generate a Sumo Logic token and the endpoint hostname. Then you set up TLS by downloading a cert to your server. Download the **DigiCert** certificate
29-
from one of the following locations:
30-
* [https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt](https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt)
31-
* [https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.pem](https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.pem)
28+
In the procedure below, you configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname.
29+
30+
Then you set up TLS by downloading a cert to your server (see procedures for [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog/#setup-tls) and [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/#setup-tls)). Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
31+
* https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt
32+
* https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.pem
33+
* https://www.amazontrust.com/repository/AmazonRootCA1.cer
3234

3335
Sumo Logic supports syslog clients, including syslog-ng and rsyslog. Follow the instructions in the appropriate section below to configure your server to send syslog data. If syslog data does not appear in Sumo Logic, refer to
3436
[Troubleshooting](#troubleshooting) below.
3537

3638
## Configure a Cloud Syslog Source
3739

38-
Cloud syslog configuration requires a token that is automatically generated when you configure a cloud syslog source. The token allows Sumo to distinguish your log messages from those of other customers. The token is tied to the source, but not to any specific user. 
40+
Cloud syslog configuration requires a token that is automatically generated when you configure a cloud syslog source. The token allows Sumo Logic to distinguish your log messages from those of other customers. The token is tied to the source, but not to any specific user. 
3941

4042
Include the token as the [Structured ID](https://tools.ietf.org/html/rfc5424#section-7) in every syslog message that is sent to Sumo Logic. The token is removed by Sumo Logic during ingestion and is not included with your syslog message in search results.
4143

@@ -46,7 +48,7 @@ To configure a cloud syslog source, do the following:
4648
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the Sumo Logic top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**.
4749
1. On the **Collection** page, click **Add Source** next to a Hosted Collector. See [Set up a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector) for information on adding Hosted Collectors.
4850
1. Select **Cloud Syslog**.
49-
1. Enter a **Name** to display for this source in Sumo. Description is optional.
51+
1. Enter a **Name** to display for this source in Sumo Logic. Description is optional.
5052
1. (Optional) For **Source Host** and **Source Category**, enter any string to tag the output collected from this source. (Category metadata is stored in a searchable field called `_sourceCategory`.)
5153
1. **Fields.** Click the **+Add Field** link to define the fields you want to associate, each field needs a name (key) and value.
5254

@@ -57,7 +59,7 @@ To configure a cloud syslog source, do the following:
5759

5860
* **Enable Timestamp Parsing**. This option is selected by default. If it's deselected, no timestamp information is parsed.
5961
* **Time Zone**. There are two options for Time Zone. You can use the time zone present in your log files, and then choose an option in case time zone information is missing from a log message. Or, you can have Sumo Logic completely disregard any time zone information present in logs by forcing a time zone. It's important to have the proper time zone set, no matter which option you choose. If the time zone of logs cannot be determined, Sumo Logic assigns the UTC time zone; if the rest of your logs are from another time zone your search results will be affected.
60-
* **Timestamp Format**. By default, Sumo will automatically detect the timestamp format of your logs. However, you can manually specify a timestamp format for a source. See [Timestamps, Time Zones, and Time Ranges, and Date Formats](/docs/send-data/reference-information/time-reference).
62+
* **Timestamp Format**. By default, Sumo Logic will automatically detect the timestamp format of your logs. However, you can manually specify a timestamp format for a source. See [Timestamps, Time Zones, and Time Ranges, and Date Formats](/docs/send-data/reference-information/time-reference).
6163

6264
1. Create any Processing Rules you'd like for the new source.
6365
1. Click **Save**. The token information is displayed in a read-only dialog box, shown below.
@@ -69,7 +71,7 @@ To configure a cloud syslog source, do the following:
6971
Token: 9HFxoa6+lXBmvSM9koPjGzvTaxXDQvJ4POE/WCURPAo+w4H7PmZm8H3mSEKxPl0Q@41123, Host: syslog.collection.YOUR_DEPLOYMENT.sumologic.com, TCP TLS Port: 6514
7072
```
7173
72-
The number `41123` in the token is the Sumo Private Enterprise Number (PEN). There are two options for including the token. You can include it in the structured data field or in the message body.  In the following example, the token is in the structured data field. 
74+
The number `41123` in the token is the Sumo Logic Private Enterprise Number (PEN). There are two options for including the token. You can include it in the structured data field or in the message body.  In the following example, the token is in the structured data field. 
7375
7476
```
7577
<165>1 2015-01-11T22:14:15.003Z mymachine.example.com evntslog - ID47 [YOUR_TOKEN] msg
@@ -120,11 +122,11 @@ If syslog messages fail to authenticate to the syslog cloud source—for example
120122
121123
### Troubleshooting
122124
123-
If you encounter problems, follow the instructions below to first verify the Sumo service connection, and then check the client configuration is correct.
125+
If you encounter problems, follow the instructions below to first verify the Sumo Logic service connection, and then check the client configuration is correct.
124126
125-
#### Verify connection with Sumo service
127+
#### Verify connection with Sumo Logic service
126128
127-
To verify that the Sumo service can receive syslog messages, use a networking utility that supports TLS, such as nMap.org's ncat, to check that the syslog port accepts messages. 
129+
To verify that the Sumo Logic service can receive syslog messages, use a networking utility that supports TLS, such as nMap.org's ncat, to check that the syslog port accepts messages. 
128130
129131
```
130132
$ ncat --ssl syslog.collection.YOUR_DEPLOYMENT.sumologic.com PORT
@@ -142,7 +144,7 @@ Then, enter a test message, for example:
142144
<165>1 2017-10-24T06:00:15.003Z mymachine.example.com evntslog - ID47 - YOUR_TOKEN This is a message
143145
```
144146
145-
where `YOUR_TOKEN` is the token that Sumo generated when you created the Cloud Syslog Source above.
147+
where `YOUR_TOKEN` is the token that Sumo Logic generated when you created the Cloud Syslog Source above.
146148
147149
#### Verify client configuration
148150

0 commit comments

Comments
 (0)