Your organization can use collected data to investigate issues across your deployment.
Data is uploaded to ServiceNow via the use of scheduled searches. After saving a search, results are available in ServiceNow. Additionally, you can launch ad-hoc ServiceNow investigations using search results in Sumo Logic.
To access ServiceNow connections, go to Manage Data > Monitoring > Connections.
From here, you can also:
Search Connections to search.
View the Details of Connections.
To create events in ServiceNow, see Set Up ServiceNow Connections.
To create incidents in ServiceNow, see Set Up a ServiceNow Incident Webhook Connection.
To import and maintain real-time information about AWS and VMware virtual machine assets into the ServiceNow CMDB, see the Service Graph Installation and Configuration Guide.
For the Sumo Logic Cloud SIEM integration with the ServiceNow Security Incident Response (SIR) module, see Security Incident Response (SIR) Integration.
In this section, we'll introduce the following concepts:
Learn how to launch ad-hoc investigations directly from search results in Sumo Logic.
Set Up Searches
Learn how to set up scheduled searches for ServiceNow integration.
Set Up Connections
Learn how to set up connections for ServiceNow integration.
Set Up Security Incident Webhooks
Learn to set up a ServiceNow Security Incident Webhook connection and create scheduled searches.