Sumo Logic is a cloud-native log management and security analytics platform providing SIEM, observability, and threat detection capabilities through a unified SaaS interface with continuous intelligence features.
Security teams and vendors looking to integrate Sumo Logic can route normalized log and security event data into Sumo Logic's cloud SIEM through Synqly. Build a Sumo Logic integration to consolidate security telemetry for analytics, detection, and compliance without custom HTTP Source configurations.
Configuration for Sumo Logic Cloud SIEM.
[Configuration guide](https://docs.synqly.com/guides/provider-configuration/sumo-logic-setup)Integration Use Cases
Get Investigation
Retrieves an investigation by ID.
Patch Investigation
Updates an investigation by ID.
Post Events
Writes a batch of `Event` objects to the SIEM configured with the token used for authentication.
Query Alerts
Queries alerts from the SIEM configured with the token used for authentication.
Query Events
Queries events from the SIEM configured with the token used for authentication.
Query Investigations
Queries investigations
Query Log Providers
Queries available log providers in the source SIEM