Skip to main content
Skip table of contents

7.23.0 GA Release Notes - 6 January 2026

Welcome to LogRhythm SIEM 7.23, a release focused on making your security operations faster and more efficient, from initial threat investigation to large-scale administration. We are closing critical gaps in the analyst workflow by bringing high-fidelity AIE detections and global Threat Map visualizations directly to your modern Data Indexer (DX) dashboards. This creates a single, unified view that empowers your team to correlate threats and accelerate investigations without switching between screens. For administrators, this release introduces a foundational AIE Administration API, enabling you to programmatically manage rules and begin treating your detections as code. From a more cohesive analyst experience to powerful new automation capabilities, and much more, LogRhythm SIEM 7.23 is a critical step forward in empowering your team to defend smarter and faster.

What’s new in LogRhythm SIEM 7.23:

Maintenance

AIE Detections Direct to Your Dashboard

To investigate threats efficiently, analysts need a complete and unified view of all relevant data. However, a critical source for threat hunting was missing from your most powerful analytics tool: detections from the Advanced Intelligence Engine (AIE). This forced your team to switch between modern Data Indexer (DX) dashboards and legacy views, creating an incomplete picture that slows down investigations.

With LogRhythm SIEM 7.23, that workflow gap is closed. AIE events can now stream directly to the Data Indexer, making them a native data source for all your DX dashboard widgets. This means you can now build powerful, context-rich widgets that place high-fidelity AIE detections alongside the raw log data you need for investigation. The result is a faster, more streamlined workflow, empowering your team to correlate threats and respond without ever leaving their primary dashboard.

For more information on configuring AIE detections on your DX Dashboard, refer to Configure the Advanced Intelligence Engine.

AIEonDXDashboards.gif

Threat Map Visualization Comes to DX Dashboards

Along with unifying your threat and log data, we are bringing another essential visualization to your primary workspace. The Threat Map, a powerful tool for visualizing global activity, was previously confined to legacy dashboards, preventing you from correlating geographic patterns within your main analytical view.

Now, this essential widget comes to your DX Dashboards, allowing you to place it alongside AIE events and log data for a more complete intelligence picture. The visualization itself has also been refreshed with improved granularity and clarity. To ensure a consistent, high-quality experience, this visual upgrade applies to the Threat Map on legacy dashboards as well, delivering a better viewing experience platform-wide.

For more information, refer to Threat Activity Map.

ThreatMap.gif

AIE Administration API

For large enterprises and MSSPs, manually managing Advanced Intelligence Engine (AIE) rules across multiple deployments is a significant operational bottleneck. This manual process slows down the deployment of critical threat detections and makes it difficult to maintain consistency across all your environments.

LogRhythm SIEM 7.23 introduces a powerful new administration API for AIE, providing the foundational step toward automating your detection-as-code pipeline. Once you have perfected a rule in your test environment, you can now use the API to programmatically deploy it across your entire infrastructure. The new endpoints allow you to import existing rules, enable or disable them, and restart the AIE service to ensure they take effect immediately.

This API-first approach allows your team to streamline operations and dramatically reduce manual effort. Instead of clicking through UI menus in each deployment, you can now script the rollout of a critical new detection to all your customer tenants or production systems in a fraction of the time. It’s the first step in treating your AIE rules like code, enabling greater speed, consistency, and efficiency for your security operations.

For more information, refer to the LogRhythm API Developer Portal.

Open Collector Updates & New Collector

Our legacy method for collecting Salesforce data presented significant operational challenges. Configuration required manual editing of local .ini files, but more importantly, the collection logic was hardcoded into the System Monitor Agent itself. This meant that new features or critical fixes to the collection was tied to the full agent release cycle, delaying your access to essential capabilities.

As part of our ongoing strategy to modernize log collection, we are excited to introduce the new Salesforce Audit Beat for our Open Collector architecture. This new model decouples the collection logic from the agent, allowing the beat to be updated independently. This not only streamlines configuration by moving it into the Web Console but also fundamentally improves the update process.

For more information, refer to Salesforce Audit Beat.

Effortless JSON Policy Creation

The days of rebuilding entire JSON policies just to make a minor tweak or fumbling with nested JSON objects are over. Speed up the process of onboarding critical log sources with the redesigned JSON Policy Builder. You can now import an existing policy, modify it, and save your changes in minutes. And with full support for nested JSON, you can accurately parse even the most complex data structures.

For more information, refer to the updated JSON Policy Builder documentation.

JSONPolicyBuilder.png

Modernized Platform Support and Linux .NET 8 Agents

Maintaining a secure and performant SIEM requires staying current with the latest operating systems and collection technologies. Your security posture and operational efficiency depend on it.

This release adds full support for Windows Server 2025 and Rocky 10, ensuring you can deploy LogRhythm in the most modern and secure environments. We're also introducing a new Linux System Monitor Agent, now including the powerful JSON listener previously exclusive to Windows. This means you can securely and efficiently collect rich JSON logs from your Linux systems without additional agent deployments.

For more information on the new Linux Agent, refer to Install a .NET 8 System Monitor on Linux/UNIX.

Log Source Enhancements and Updates

LogRhythm SIEM 7.23 introduces updates designed to enhance the speed, consistency, and compatibility of data collection with third-party platforms. These enhancements include:

  • New log sources based on customer requests and feedback.

  • Improvements around Forcepoint log source collection.

New and Updated Log Sources

This past quarter of bi-weekly LogRhythm SIEM Knowledge Base updates included more than 50 enhanced or improved log sources, and six newly introduced log sources. This allows customers to expand their security capabilities by increasing log visibility within the LogRhythm SIEM.

The following log sources have been added or updated:

New Log Sources

Updated or Improved Log Sources

Syslog - Fortinet FortiWeb CEF

Syslog - Akamai Guardicore Centra CEF

Syslog - Trend Micro Deep Discovery Analyzer CEF

Syslog - Open Collector - Salesforce Audit SetupAuditTrail

Syslog - Open Collector - Salesforce Audit LoginHistory

Syslog - Open Collector - Salesforce Audit EventLog

Syslog - F5 BIG-IP ASM Key-Value Pairs

Syslog - Open Collector - Azure Event Hub

Syslog - BIND DNS

Syslog - Open Collector - AWS CloudTrail

Syslog - Cisco Firepower Threat Defense

Syslog - Cisco Firepower Threat Defense

Syslog - Open Collector - Sophos Central

Flat File - LogRhythm System Monitor Log File

Syslog - McAfee ePO

Syslog - Medigate CEF

MS Windows Event Logging XML - PowerShell

Syslog - Fortinet Fortigate

Syslog - Cisco ASA

Syslog - Citrix Netscaler

Syslog - F5 BIG-IP LTM

Syslog - Cisco Switch

Syslog - Forcepoint Stonesoft NGFW

Syslog - Crowdstrike FalconHost CEF

Syslog - F5 BIG-IP ASM v12

MS Windows Event Logging XML - System

Syslog - VMWare ESX/ESXi Server

Syslog - F5 BIG-IP ASM

Syslog - Blue Coat ProxySG

Flat File - Linux Audit Log

Syslog File - Linux Host

Syslog - Dell Remote Access Controller

Flat File - Microsoft IIS SMTP W3C Format

Syslog - Cisco Web Security

Flat File - Oracle WebLogic 11g Access Log

Syslog - Aruba Clear Pass

Syslog - Tenable SecurityCenter

Flat File - LogRhythm Data Indexer Monitor

Syslog - Sophos XG Firewall

Syslog - Generic Linux OS

Syslog - F5 BIG-IP ASM CEF

Syslog - Trend Micro Vision One CEF

Syslog - Open Collector - Mimecast SIEM

Syslog - Open Collector - Network Monitor Evt Logs

Syslog - VMWare vCenter Server

Syslog - Open Collector - SentinelOne

Syslog - Fortinet FortiAuthenticator

MS Windows Event Logging XML - System

MS Windows Event Logging - TS Remote Connection Manager

Syslog - Fortinet Fortiweb

Syslog - Zscaler Nano Streaming Service

Syslog - Palo Alto Cortex Data Lake CEF

Syslog - ManageEngine PAM360

Syslog - ESET Remote Administrator (ERA) LEEF

MS Windows Event Logging XML - Security

MS Windows Event Logging XML - Application

Platform Updates

LogRhythm 7.23 is packed with platform updates to improve security, performance, and stability. Spend more time hunting for threats and less time managing the platform.

Dependency Updates

As part of our ongoing commitment to maintaining third-party dependencies for stability and security improvements, the following packages have been updated:

  • Data-Indexer Java Corretto JRE updated to version 8.0.472,

  • Web-Indexer Java Corretto JDK updated to version 21.0.9,

  • .NET 8 Core updated to version 8.0.22,

  • Grafana updated to version 12.3.0,

  • Go Update to version 1.24.2 for Case API, and

  • NodeJS Updates to API Gateway (Linux) and Web Console API.

An API Gateway NodeJS update is now included with the Linux build of API Gateway. Note that NodeJS (a requirement of API Gateway) no longer supports CentOS 7, therefore ending support for CentOS/RHEL 7. Customers are advised to upgrade their Linux-based Data Indexers to Rocky Linux or RHEL 9 prior to upgrading to 7.23, as CentOS 7 support has ceased with this release of LogRhythm SIEM.

LogRhythm 7.22 SIEM was the last release with support for CentOS 7 based Data Indexers. Refer to the Notice of Deprecation section for more information.

Threat Intelligence Service (TIS) Updates

The Threat Intelligence Service has been updated to version 1.9.8. This update resolves some defects for a better TIS experience. For more information, refer to the main Threat Intelligence Service documentation.

Final Notice - CentOS 7 and RHEL 7 Deprecation

Due to compatibility issues with dependency services that no longer support older operating systems, CentOS 7 and RHEL 7 have reached end-of-life for Data Indexer support as of this release of LogRhythm SIEM (7.23.0). These operating system versions have been phased out in favor of Rocky 9 and Red Hat Enterprise Linux (RHEL) 9.

Starting with LogRhythm SIEM version 7.22.0 (October 2025), additional features have been added to perform operating system (OS) version checking with data indexer (DX) services and provide warnings for users to upgrade their DX OS versions.

Because the end-of-life for CentOS 7 was June 30, 2024, meaning that the operating system no longer receives security updates, it is necessary to upgrade your Data Indexer operating systems as soon as possible.

For more information about migrating your DXs from CentOS/RHEL7 to Rocky/RHEL 9, refer to the Data Indexer CentOS to Rocky Upgrades guide.

Resolved Issues & Improvements

The following issues have been resolved either via a defect fix or a platform improvement in LogRhythm SIEM 7.23.

Bug #

Component

Description

ENG-11147

Smart Response Plugins

An issue preventing users from adding collaborators via the Case Management SRP has been resolved.

For more information on the Case Management SRP, refer to the Community page.

ENG-11184

Smart Response Plugins

An issue preventing the CrowdStrike SRP from connecting to endpoints has been resolved.

For more information on the CrowdStrike SRP, refer to the Community page.

ENG-27857

Data Indexer

An issue preventing “service stop” logs from generating in the log file for the lr-carpenter service has been resolved.

ENG-33323

System Monitor

An issue with the System Monitor making Salesforce API calls for logs that don’t exist has been resolved by migrating functionality to the new Salesforce Audit Beat. For more information, refer to the Salesforce Audit Beat documentation.

ENG-38178

AI Engine

An issue with AI Engine rules not correctly observing configured Unique Values has been resolved.

ENG-51273

Reporting

An issue preventing the Agent Heartbeat Missed report from correctly generating results when “Log Source Entity” is defined in the report parameters has been resolved.

ENG-51439

Client Console

An issue with Client Console Investigations not correctly utilizing the configured “Log cache size” value has been resolved.

ENG-52792

Client Console

An issue in which the number of log sources that could be added to a list seemed to be capped at around 20,000 has been resolved.

ENG-52916,
ENG-54157,
ENG-71905

Agents

An issue preventing Agents from successfully auto-updating through Package Manager on various NIX operating systems has been resolved.

ENG-54500,
ENG-58146,
ENG-80149

Agents

Timestamp normalization for Syslog Messages has been revamped to support additional timezone formats and correctly apply offsets when log sources are not in the same timezone as the agent. The updated timestamp normalization process has been more thoroughly outlined on both the Syslog Collection and Modify System Monitor Basic Properties documentation topics. These fixes require the collection agent to be upgraded to 7.23 along with the deployment.

ENG-57634

HA, DR Deployments

The DR_ServiceControl script has been updated to utilize the correct ARM path in both Disaster Recovery (DR) and High Availability + Disaster Recovery (HA+DR) deployments.

ENG-58553

Log Processing Policy

The Salesforce API processing policy has been updated to no longer truncate logs in certain situations.

ENG-58940

Smart Response Plugins

An issue with the Case Management SRP throwing a “null” error for APISleep has been resolved.

For more information on the Case Management SRP, refer to the Community page.

ENG-59162

APIs

The Admin API’s “Update Log Source” endpoint no longer incorrectly modifies attributes that are not specified in the API call.

ENG-59217

Smart Response Plugins

The Trend Micro Vision One SRP now supports custom endpoint URLs providing support for non-US regions.

For more information on the Trend Micro Vision One SRP, refer to the Community page.

ENG-60544

TrueIdentity

An issue with “User (Impacted) Identity” fields not all showing correctly when running a search for merged accounts has been resolved.

ENG-61198

HA, DR Deployments

An issue with Disaster Recovery (DR) Setup handling for single and multiple failover IP scenarios has been resolved.

ENG-61433,
ENG-61963,
ENG-63008

Agents

An issue with Agents not correctly installing on AIX 7.1 and AIX 7.2 in certain situations has been resolved.

ENG-61822

APIs

Using the Admin API to retire a log source now correctly disables the log source’s associated MPE Policy.

ENG-61859

Web Console

The Web Console now correctly refreshes log messages even when third-party threat intelligence browser plugins are used.

ENG-61962

AI Engine

Updating an AI Engine rule and then clicking the “Restart Needed” no longer removes the “Restart Needed” prompt from all servers that require a restart.

ENG-62204

Client Console

An automatic “Collection Host update logic” has been added to the virtual log source authentication process to ensure that the Log Source Collection Host remains accurate for non-load balanced virtual log sources.

ENG-62212

Smart Response Plugins

Issues with the Case Management SRP creating cases with evidence dated 12/31/1969 and generating Case History URLs with “/null” at the end have been resolved.

For more information on the Case Management SRP, refer to the Community page.

ENG-62484,
ENG-63339

Agents

IPFix and Netflow v10 custom vendor definitions now collect correctly and support the full Netflow v10 field definitions.

ENG-62477

APIs

An issue in which the SecondLook API service was incorrectly throwing out-of-memory exceptions in certain situations when attempting to restore logs has been resolved.

ENG-62522

Smart Response Plugins

An issue with the ServiceNow Smart Response Plugin’s optional “contact_type” parameter not functioning as expected has been resolved.

For more information on the ServiceNow SRP, refer to the Community page.

ENG-62562

Web Console

An issue with border lines on the Threat Map widget has been resolved as part of the Threat Map Refresh for this release.

ENG-62808

HA, DR Deployments

The DR_ServiceControl script has been updated to remove Metrics Collection, allowing the primary and secondary host to both report Metrics information.

ENG-62956

Web Console

An issue that was causing an error message to appear in the LogRhythm Web Console API.log file in certain situations when opening search results in the Analyzer tab has been resolved.

ENG-62993

Web Console

The “Syslog - Open Collector - AWS S3 Cloudflare Firewall Logs” log source now correctly appears on the AWS S3 tab when creating a new Beat in the Web Console.

ENG-63353

Client Console

An issue with a host’s OS Version value updating with an incorrect value when no OS Version is supplied in the log has been resolved. When no OS Version is supplied from a host, the OS Version value remains blank instead of updating with incorrect data.

ENG-63473

APIs

Accepting pending Windows System Monitor Agents via the API no longer incorrectly sets the OS to Linux in certain situations.

ENG-63485

Message Processing Engine

Added an “AutomaticHostContextualization” option to the Data Processor Advanced Properties, allowing users to enable or disable Automatic Host Contextualization for the entire system rather than just on a log-by-log basis. This option is disabled by default.

ENG-63518

Log Processing Policy

The Azure Event Hubs processing policy has been updated to correctly parse the “ruleId” field into “parentprocessid” and the “ruleSetType” field into “parentprocessname.”

ENG-63596

Client Console

When exporting investigations, the maximum number of logs that can be exported is one billion (1,000,000,000), preventing the export from timing out or throwing an error. Entering a value above this amount will cause it to be reset to the maximum.

ENG-63603,
ENG-63765,
ENG-74603,
ENG-80835

Log Processing Policy

The Azure Event Hubs processing policy has been updated to correctly parse the “group” and “policy” fields.

ENG-63861

Smart Response Plugins

The Alarm Management SRP’s “Auto Close Alarm” action no longer fails to close alarms in certain situations.

For more information on the Alarm Management SRP, refer to the Community page.

ENG-68183

Log Processing Policy

The Prisma Cloud processing policy has been updated to correctly parse the “Alert ID” field into “parentprocessid.”

ENG-68388

Log Processing Policy

The Azure Event Hubs processing policy has been updated to correctly parse the “riskLevel” field into “severity.”

ENG-69004

Smart Response Plugins

The Smart Response Plugin Manager’s “Last Updated On” column within the Client Console now correctly sorts in ascending and descending order as expected.

ENG-70046

Web Console

The following fields are now correctly available in the inspector when configuring DX Dashboard widgets: IP Address V6 (Origin), IP Address V6 (Impacted), NAT IP Address V6 (Origin), NAT IP Address V6 (Impacted).

ENG-70141

AI Engine

An issue that was preventing AIE rule drilldown for various rules in both the Client and Web Consoles in certain situations has been resolved.

ENG-70557

Log Processing Policy

The Duo Authentication processing policy has been updated to correctly parse the “factor” field into “sessiontype.”

ENG-70959,
ENG-72312

APIs

The Alarm API Events endpoint now correctly retrieves values for the “object,” “objectName,” and “objectType” fields.

ENG-73669

APIs

An issue with the Admin API throwing a “host already exists” error when trying to accept a pending log source in certain situations where this is not the case has been resolved.

ENG-74085

AI Engine

An issue in which AIE rules were being updated by the import wizard even if the import was aborted/cancelled has been resolved.

ENG-74851

Web Console

An issue in which the log source type “Flat File - Mimecast Email” was not available on DX Dashboards in the Web Console has been resolved.

ENG-75001

Alarms

Silent log source alarms that send email notifications will no longer display “Restricted” in place of the log source information in certain situations.

ENG-75225

AI Engine

The AI Engine no longer incorrectly displays the “Restart Needed” notification after viewing a rule and making no changes to the rule.

ENG-75431

Web Console

An issue with upper-case characters causing the Lucene Wildcard search syntax to not function properly in certain situations has been resolved.

ENG-76027

Log Processing Policy

The Proofpoint log processing policy has been updated to correctly parse the “classification,” “detectionType,” “threat,” and “threatUrl” fields.

ENG-76109

Log Processing Policy

The Azure Event Hubs processing policy has been updated to correctly parse the “response.properties.message” field into “reason.”

ENG-76252

Log Processing Policy

The Okta System Log processing policy has been updated to correctly parse the “client.userAgent.rawUserAgent” field into “useragent,” and the “OktaID” field into “displayname” or “alternateID.”

ENG-77182

Message Processing Engine

An issue causing MPE sub-rules to not correctly match against 7.2 schema expansion fields has been resolved.

ENG-77383

Agents

An issue causing the Tenable Scanner log source fields “HasBeenMitigated” and “EXPLOITAVAILABLE” to always return a “False” value has been resolved.

ENG-77574

APIs

The Admin API’s “Updated Log Source” endpoint no longer requires the “status” parameter to function properly.

ENG-78816

Web Console

An issue with Case notification emails not sending in certain situations when the configured SMTP server requires authentication or SSL/TLS has been resolved.

ENG-79790

Web Console

An issue that was preventing custom dashboards from being imported in certain situations has been resolved.

ENG-80195

APIs

Submitting a query with an invalid “calendar_interval” value in a “date_histogram” aggregation now returns a more informative and actionable error message.

ENG-80269

Log Source Virtualization

The “Last Log Message” field is now correctly updated with the current system date/time when information is collected for virtual log sources.

ENG-80828

Log Processing Policy

The AWS Cloud Trail processing policy has been updated to set the “tag2” value based on values in the “serviceEventDetails” object. The policy now checks specific keys (CredentialChallenge, CreedentialVerification, UserAuthentication) and then assigns the corresponding value (Success or Failure) to the “tag2” field.

ENG-80995

Configuration Manager

GoMaintain now correctly observes the “IndexManage Elasticsearch Heap HWM” value set in Configuration Manager rather than always operating as if the value is the default.

ENG-81064

Agents

An issue with the MS Windows Event log source in which a large amount of EVID 7004 “failed to parse log data” messages would appear in certain situations has been resolved.

ENG-81162

HA, DR Deployments

The High Availability (HA), Disaster Recovery (DR), and HA+DR installers have all received a refresh to match current company branding.

ENG-81166

HA, DR Deployments

The Disaster Recovery (DR) installation script has been updated to correctly execute a scheduled task on modern operating systems.

ENG-81167

HA, DR Deployments

The Disaster Recovery (DR) setup script has been updated to correctly validate the path to the “DR Status” shortcut depending on which SQL version is installed.

ENG-81497

Job Manager

An issue with the Active Directory Group Authorization feature in which users were seeing incorrect or missing domain names being synced after upgrades to LogRhythm SIEM versions 7.21 and 7.22 has been resolved.

ENG-81565

APIs

An issue in which the Admin API call for “Update existing log source to enable virtualization” was not correctly implementing log source virtualization and logs were not being passed to child log sources has been resolved.

ENG-82061

APIs

An issue in which Elasticsearch API requests would fail if the indices list was not specified in the body of the request has been resolved.

ENG-82333

AI Engine

Manually restarting the AI Engine Services, rather than restarting the service using the “Restart AI Engine Services” button within the UI, now correctly clears the “Restart Needed” flag on servers that require a restart.

ENG-82514,
ENG-83222

Web Console

An issue in which a pivot search from Alarms, Searches, or Dashboards would incorrectly query the EventsDB instead of the DX/logs repository has been resolved.

ENG-82863

Elasticsearch

An issue in which Elasticsearch would get stuck in a recovery loop on non-English operating systems has been resolved.

ENG-82977

Log Processing Policy

The SentinelOne processing policy has been updated to correctly parse the “response” field.

ENG-83226

Agents

An issue in which JSONParser settings for .NET4 Agents were not visible within the System Monitor Advanced settings after upgrading the Agent to 7.22.0 has been resolved.

ENG-83236

Log Processing Policy

The O365 processing policy has been updated to correctly parse the “ClientIP,” “DeviceName,” “EndpointOperation,” “EnforcementMode,” “FileSize,” “Sha1,” “TargetDomain,” “TargetFilePath,” and “TargetUrl” fields.

ENG-83240

Log Processing Policy

The Network Monitor EVT processing policy has been updated to correctly parse additional fields.

ENG-83361

HA, DR Deployments

An issue with the Disaster Recovery (DR) installation process in which attempting to create clusters could throw error messages and stop the installation from completing in certain situations has been resolved.

ENG-83443

System Monitor

An issue preventing lcrypt from functioning correctly in certain situations with 7.22.0 System Monitor Agents has been resolved.

ENG-83540

Web Console

An issue that was causing incorrect search parameters to be used when using the “Add to search from Inspector” feature has been resolved.

Resolved Issues - Security

Security-related issues resolved with this release are available for customers to view in the Community.

Known Issues

The following issues have each been found and reported by multiple users.

Bug #

Found In Version

Components

Description

Notes

ENG-85615

7.23

Data Indexer

As part of the 7.23 deprecation of support for CentOS, an OS compatibility check was added to the DX Installer.

In some environments, the “WARNING: INCOMPATIBLE OPERATING SYSTEMS DETECTED” banner is popping up at the end of the DX Installer with an empty host list when there are no incompatible operating systems detected.

If the host list is empty “- :” no action is needed:

If the host list is not empty, contact LogRhythm Support for additional assistance.

Expected Results: The “WARNING: INCOMPATIBLE OPERATING SYSTEMS DETECTED” banner should only be displayed if there are hosts detected with incompatible operating systems.

Workaround: None needed, ignore the warning if the host list is empty.

ENG-75096

7.21

Web Indexer

Following an upgrade from versions prior to 7.20 to 7.21 or higher, some customers are experiencing blank widgets in the Web Console.

During the upgrade to 7.21, web indices were migrated to a new Lucene version. Some customers with very large web indices or systems with limited memory may be experiencing “out of memory” (OOM) conditions with the Web Indexer migration tool, or the Web Indexer migration tool window closes before migration finishes.

Expected Results: Web Indices should be migrated smoothly as part of the upgrade.

Workaround Options:

  1. Re-Run the Web Indexer Migration Tool from “C:\Program Files\LogRhythm\LogRhythm Web Services\LogRhythm Web Indexer\dependencies\index-upgrade”

  2. Stop the Web Indexer, delete the web indices directory, and restart Web Indexer. The cache will rebuild on its own; however, search/drill-down tasks from the last 24 hours are lost but can be re-run from the UI without data loss.

ENG-35302

Multiple

AI Engine

Alarm with “not observed” rule block is firing even when a log or multiple logs are present.

Expected Results: Alarm should not fire if log is present and is within the time window.

Workaround: There is currently no workaround for this issue.

ENG-42942

Multiple

Data Indexer

Data Indexer Investigations on multi-node clusters may produce different result counts when keyword searches are run multiple times.

Expected Results: All results should be returned each time an investigation is performed.

Workaround: Dev binaries are available for testing, please open a support case if you experience this issue.

ENG-78023
ENG-57623

Multiple

Web Console UI

Environments with multiple web consoles may experience out of sync alarm information displayed in the web console until a status update is made to an alarm. This issue most often occurs following an HA/DR failover event.

Expected Results: Alarm information should be consistent across all Web Console Instances

Workaround: Changing alarm status will trigger a refresh of the alarm details for all web console instances in the deployment

ENG-61278

7.19

APIs

After upgrading to LogRhythm SIEM version 7.19, servers running Windows Server 2012 R2 may throw errors when attempting to use the LogRhythm API or connecting through API Gateway.

Expected Results: The LogRhythm API should function as expected.

Workaround: A workaround for this issue has been documented at LogRhythm API Gateway Error on Windows Server 2012 R2.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.