Process Flow
This topic walks you through how SecMaster collects security logs from third-party (non-Huawei Cloud) systems or products, as well as how it transfers security logs from SecMaster to third-party systems or products. The procedure is as follows.
This section describes the process of transferring logs into and out of SecMaster.
| Procedure | Description |
|---|---|
| Install the log collector. | |
| Ensure that there is enough space to run the log collector. | |
| Ensure that there is enough space to run the log collector. | |
| Use this account to access SecMaster for the log collector on the tenant side. | |
| Establish the connection between the customer VPC and SecMaster. | |
| Manage the log collector node (ECS) on SecMaster. | |
| Configure the log collection process. | |
| This step is required when you transfer security logs from non-Huawei Cloud systems to SecMaster. Skip this step if you only need to transfer Huawei Cloud logs to a third-party system or product. Create a log storage location (pipeline) in SecMaster for log storage and analysis. | |
| Step 9: Configure a Connector | Set the parameters of the log source and destination ends. Complete this step based on your needs: |
| Configure a log parser to convert source logs to the required data type in codeless mode. | |
| Connect all function components to ensure that SecMaster and the log collector work properly. | |
| Check whether log access is successful. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.