Process Flow
This topic walks you through on how SecMaster collects security logs from third-party (non-Huawei Cloud) systems or products, as well as how it transfers security logs from SecMaster to third-party systems or products. The procedure is as follows.
This section describes the process of transferring logs in and out SecMaster.
Procedure |
Description |
---|---|
Install the log collector. |
|
Ensure that there is enough space to run the log collector. |
|
Ensure that there is enough space to run the log collector. |
|
Use this account to access SecMaster for the log collector on the tenant side. |
|
Connect the tenant VPC to the SecMaster network. |
|
Manage the log collector node (ECS) on SecMaster. |
|
Configure the log collection process. |
|
This step is required when you transfer security logs from non-Huawei Cloud systems to SecMaster. Skip this step if you only need to transfer Huawei Cloud logs to a third-party system or product. Create a log storage location (pipeline) in SecMaster for log storage and analysis. |
|
Step 9: Configure a Connector |
Set the parameters of the log source and destination ends. Complete this step based on your needs: |
Configure a log parser to convert source logs to the required data type in codeless mode. |
|
Connect all function components to ensure that SecMaster and the log collector work properly. |
|
Check whether log access is successful. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.