Cloudflare Docs
Cloud Email Security (formerly Area 1)
Edit this page
Give us feedback
Set theme to dark (⇧+D)

Sumo Logic integration guide

When Cloud Email Security detects a phishing email, the metadata of the detection can be sent directly into your instance of Sumo Logic. This document outlines the steps required to integrate Cloud Email Security with Sumo Logic.

A diagram outlining what happens when Cloud Email Security detects a phishing email and sends it to Sumo Logic.

​​ 1. Configure the Sumologic Collector

  1. Log in to Sumo Logic with an administrator account.

  2. Go to Manage Data > Collection to open the collector configuration pane.

  3. Select Add Collector.

    Add collector.
  4. In Select Collector Type, select Hosted Collector.

    Select Hosted Collector.
  5. In Add Hosted Collector, enter the following settings:

    • Name: Cloud Email Security Collector
    • Description: Cloud Email Security Security Collectors
    • Category: Anti-Phishing

    Enter the settings above to configure your collector.
  6. Select Save > OK to confirm the addition of the new Collector.

  7. In Cloud APIs, select HTTP Logs and Metrics to start the configuration of the data source.

    Select HTTP Logs and Metrics.
  8. Enter a descriptive Name and Description, and select Save.

    Enter a name and description.
  9. The system will present you a dialog box with the HTTP endpoint. Save it, as this will be required to configure Cloud Email Security later.

    Take note of the endpoint to use it later.

​​ 2. Configure Cloud Email Security

The next step is to configure Cloud Email Security to push the Email Detection Events to the Sumologic HTTP Collector.

  1. Log in to the Cloud Email Security dashboard.
  2. Go to Email Configuration > Alert Webhooks, and select New Webhook.
  3. In the Add Webhooks page, enter the following settings:
    • App type: Select SIEM > Splunk. In Auth code, enter Sumologic.
    • Target: Enter the HTTP endpoint you saved in the previous section.
    • For the dispositions (MALICIOUS, SUSPICIOUS, SPOOF, SPAM, BULK) choose which (if any) you want to send to the webhook. Sending SPAM and BULK dispositions will generate a high number of events.
  4. Select Publish Webhook.

Your Sumo Logic integration will now show up in the All Webhooks panel.

Your Sumo Logic webhook will display in the All Webhooks panel.

It will take about ten minutes for the configuration to fully propagate through the infrastructure of Cloudflare Cloud Email Security, and for events to start to appear in your searches. Once the configuration is propagated, events will start to appear in your instance of Sumo Logic.

To view logs, hover your mouse over the Cloud Email Security Collector, and select Open in Log Search.

View logs in Sumo Logic.

Once events start to flow, select New > Log search to search for the detection events with your search criteria (for example, _collector="Cloud Email Security Collector").

Search for events.