Sumo Logic is a hosted logging platform. This chart adds the Sumo Logic Collector to all nodes in your cluster as a DaemonSet. The image supports fluentd file and system log sources.
After you have installed the chart, each pod, deployment, etc. can be optionally configured to specify its log format, source category, source name, or exclude itself from SumoLogic.
Kubernetes 1.2+ with Beta APIs enabled. However, certain configuration parameters may require a more recent version of Kubernetes. Such parameters will specify the minimum Kubernetes version required in the parameter description.
Third parties can be a boon to your cybersecurity efforts, or they can be the weak link in an otherwise secure operation. That’s why companies must stay alert to platform security considerations when choosing their partners—and ensure their data remains in capable hands—with vendors who take platform security seriously. Sumo Logic security applies best-in-class technologies and a rigorous process to put the safety of your data first.
Sumo Logic has been a platform security-minded operation from day one. The company was founded by veterans of the IT security sector who understand the crucial need to put security first in every step of the development lifecycle. The platform security team takes a fundamental role in the development of our log management and analytics software and stays closely involved in the specifications process, coding, code review, user acceptance, and operations.
Some key indicators of Sumo Logic’s platform security commitment include:
Compliance attestations and certifications speak to vendors’ commitment to data security. Sumo Logic currently holds the following:
In cybersecurity, the importance of physical protections can’t be overstated. That’s why Sumo Logic operates in ISO-certified data centers with PCI DSS Service Level 1 compliance.
Only key personnel knows the location of our physical data centers, which are protected 24/7 by armed guards, video surveillance, and biometric access controls.
Sumo Logic keeps data logically separate on various layers throughout our service. We tag all data per organization, throughout the lifecycle, and enforce tagging at all layers.
No data is transmitted to Sumo Logic without encryption. Within the Sumo Logic system, AES 256-bit encryption protects all data at rest. All spinning disks are encrypted at the OS level. All data is kept for long-term storage in Amazon’s Simple Storage Service, encrypted per a customer key that is changed every 24 hours.
The security of user accounts is a priority for Sumo Logic services. On account creation, the service automatically creates and issues a strong temporary password, which must be reset upon the first login. We maintain stringent password standards that users see in a password dialog, which also urges users to use a password that does not match any of their existing passwords.
After logging in and changing the temporary password, customers download Sumo Logic’s collector software. To securely register the collector, a customer must provide the one-time collector registration ID that the collector will generate upon installation.
When authenticating to a Sumo Logic security service, a highly secure session-ID tracking mechanism ensures that only an authorized user initiates requests.
Finally, Sumo Logic’s Role-Based Access Control (RBAC) features allow our customers to set per-user permissions to all of their data from their Sumo Logic console.
The Sumo Logic production system consists of many individual nodes running as a cluster. Each of these nodes is a hardened and well-protected system at the network and application layers.
Each cluster node is booted with the latest, up-to-the-minute Security releases of Ubuntu 14.04 LTS, and security updates are installed as they become available. All OS, application and security logs from each of the cluster-nodes are fed into a separate copy of the Sumo Logic environment for analysis.
Each node in the cluster also runs a default-deny firewall and the Snort Intrusion Detection System.
Only Sumo Logic employees with a validated need for access may access the production cluster, and they can only achieve this using a highly secured two-factor authentication system.
automated testing in a DevOps worldTesting Program
Critical to platform security is regular testing, including penetration testing and scanning. The Sumo Logic Security team runs daily scans of all new servers. On a weekly basis, we run fully credentialed scans of every new build. Every quarter, we run ASV scans, and penetration testers go to work on our platform every six months.
Security is our highest priority at Sumo Logic, and earning your trust is our top goal. Learn more about:
Unified platform for all your logs and metrics. Analyze all data in real-time with machine learning, perform root-cause analysis, and monitor apps and infrastructure in real-time.
Sumo Logic is introducing the industry’s first machine data analytics platform, powered by machine learning, to transform logs and metrics into real-time continuous intelligence for managing modern applications. Sumo Logic is a secure, cloud-native service that allows you to:
Heavily inspired by Buzzfeed’s example, this provides a way of protecting…
couchdb-prometheus-exporter is a Prometheus exporter for CouchDB metrics. The…
This chart bootstraps a Fluentd Cloudwatch deployment on a Kubernetes cluster…
Tell us about a new Kubernetes application
Never miss a thing! Sign up for our newsletter to stay updated.
Discover and learn about everything Kubernetes