Skip to main content



The Sumo Logic App for Armis offers enhanced visibility into both alerts and device data, making it easier to monitor and manage your device security. The app features dashboards that analyze alerts by severity, status, and type, providing a clear picture of the trend of alerts over time. Additionally, the app allows you to monitor devices by risk level, type, and category, and provides a table view of the latest devices with key information to keep your IT infrastructure secure.

Log types

The Sumo Logic App for Armis gathers log information from the following two sources.

Alerts. These are notifications or warnings generated when a potential security threat is detected. The alerts provide information about the type of threat, its severity, and other relevant details.

activityIdsNumberThe activity IDs of the alert.
activityUUIDsStringThe activity UUIDs of the alert.
alertIdNumberThe ID of the alert.
connectionIdsNumberThe connection IDs of the alert.
descriptionStringA text description of the alert.
deviceIdsNumberThe device IDs of the alert.
severityStringThe severity of the alert.
statusStringThe status of the alert.
timeDateThe date and time the alert occurred.
titleStringThe title of the alert.
typeStringThe type of the alert.

Device. These logs are generated by the devices being managed by Armis and contain information about device activity, configuration changes, and other relevant details. The device logs help in understanding device behavior and assist in troubleshooting.

accessSwitchStringThe access switch of the device.
categoryStringThe category of the device.
firstSeenDateThe first time the device was seen.
idNumberThe ID of the device.
ipaddressStringThe IP address of the device.
ipv6StringThe IPv6 address of the device.
lastSeenDateThe last time the device was seen.
macAddressStringThe MAC address of the device.
manufacturerStringThe manufacturer of the device.
modelStringThe model of the device.
nameStringThe name of the device.
operatingSystemStringThe operating system of the device.
operatingSystemVersionStringThe operating system version of the device.
purdueLevelStringThe purdue level of the device.
riskLevelStringThe risk level of the device.
sensorStringThe sensor of the device.
siteStringThe site of the device.

Sample log messages

This section contains log messages for both Alerts and Device sources. It helps in monitoring activity and resolving issues.

Sample Alerts Log Messages
"data": {
"count": 10,
"next": 10,
"prev": null,
"results": [
"activityUUIDs": [
"alertId": 124,
"connectionIds": [

"description": "The Armis security platform has detected a violation of a policy and generated an alert.",
"deviceIds": [
"severity": "Medium",
"status": "Unhandled",
"time": "2022-12-27T06:44:31.638892+00:00",
"title": "Test Alerts - New Device",
"type": "System Policy Violation"
"total": 125
"success": true
Sample Device Log Messages
"data": {
"count": 83,
"next": null,
"prev": null,
"results": [
"accessSwitch": null,
"boundaries": "N/A",
"businessImpact": "Unassigned",
"category": "Handhelds",
"customProperties": {

"dataSources": [
"firstSeen": "2021-07-27T15:15:53+00:00",
"lastSeen": "2021-07-27T15:15:53+00:00",
"name": "API",
"types": [
"Data Upload"
"firstSeen": "2022-10-18T13:10:50.171951+00:00",
"lastSeen": "2022-10-28T11:02:59.289138+00:00",
"name": "User",
"types": [
"Data Upload"
"firstSeen": "2021-07-27T15:15:53+00:00",
"id": 2,
"ipAddress": "",
"ipv6": "fe82:3::1ff:fe23:4567:890e",
"lastSeen": "2022-10-18T13:07:46.713618+00:00",
"macAddress": "BC:BC:BC:BC:AC:AB",
"manufacturer": "Apple",
"model": "iPhone 6SP",
"name": "test_device alt1",
"operatingSystem": "iOS",
"operatingSystemVersion": "16.0",
"riskLevel": 9,
"sensor": {
"name": "API",
"type": "API"
"site": {
"location": "No location",
"name": null
"tags": [

"type": "Mobile Phones",
"userIds": [

"visibility": "Full"
"total": 83
"success": true

Sample queries

This section contains the sample queries of both the Alerts and Device.

Total Alerts
_sourceCategory=ArmisDashboards alertId
| json "alertId","activityUUIDs","connectionIds","description","deviceIds","severity","status","time","title","type" as alertId,activityUUIDs,connectionIds,description,deviceIds,severity,status,time,title,type nodrop
| where severity matches"{{Severity}}" and status matches"{{Status}}" and type matches"{{Type}}"
| extract field=deviceIds "(?<ids>\b\d+\b)" multi
| where "{{Site}}" = "*" or [subquery: (_sourceCategory=ArmisDashboards id)
| json "id","" as ids, site
| where site matches "{{Site}}"
| compose ids]
| count_distinct(alertId)
_sourceCategory=ArmisDashboards id
| json "id","name","manufacturer","model","riskLevel","sensor","","type","category","operatingSystem" as id, name, manufacturer, model, riskLevel, sensor, site, type, category, operatingSystem nodrop
| where site matches "{{Site}}" and manufacturer matches "{{Manufacturer}}" and type matches "{{Type}}"
| count_distinct(id)

Collecting Logs for Armis API

This section explains how to collect logs from Armis API and ingest them into Sumo Logic. Refer to the Armis API Cloud-to-Cloud Integration to create the source and use the same source category while installing the app.

Installing the Armis app

To install the app, do the following:

  1. Select App Catalog.
  2. In the Search Apps field, search for and then select your app.
    Optionally, you can scroll down to preview the dashboards included with the app.
  3. To install the app, click Install App.
  4. Click Next in the Setup Data section.
  5. In the Configure section of the respective app, complete the following fields.
    1. Key. Select either of these options for the data source.
      • Choose Source Category, and select a source category from the list for Default Value.
      • Choose Custom, and enter a custom metadata field. Insert its value in Default Value.
  6. Click Next. You will be redirected to the Preview & Done section.

Your app will be installed in the Installed Apps folder and dashboard panels will start to fill automatically.

Each panel slowly fills with data matching the time range query and received since the panel was created. Results will not immediately be available, updating with full graphs and charts over time.

Viewing the Armis dashboards

All dashboards have a set of filters that you can apply to the entire dashboard. Use these filters to drill down and examine the data to a granular level.

  • You can change the time range for a dashboard or panel by selecting a predefined interval from a drop-down list, choosing a recently used time range, or specifying custom dates and times. Learn more.
  • You can use template variables to drill down and examine the data on a granular level. For more information, see Filter with template variables.
  • Most Next-Gen apps allow you to provide the scope at the installation time and are comprised of a key (_sourceCategory by default) and a default value for this key. Based on your input, the app dashboards will be parameterized with a dashboard variable, allowing you to change the dataset queried by all panels. This eliminates the need to create multiple copies of the same dashboard with different queries.

Alerts Overview

Armis - Alerts Overview dashboard. The dashboard provides a comprehensive analysis of alerts, by categorizing them based on their severity, status, type, and presenting a trend of alerts over a specified period of time.

Device Overview

Armis - Device Overview dashboard. The dashboard provides a table view of last-seen devices with key information to protect your IT infrastructure and offers visibility into devices based on risk levels, types, and categories.

Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.