Scenario
SecMaster can access cloud service logs by default. Beyond that, SecMaster also provides log collection management. With this function, you can collect, parse, and transfer logs, query logs in a visualized manner, and build threat models.
During this process, you need to install an agent to enable the communication between SecMaster and the target ECS. You also need to install the Logstash component for data access, parsing, and transfer.
Currently, you can use either of the following methods for data access in SecMaster:
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.