Process Flow
This topic walks you through how SecMaster collects security logs from third-party (non-Huawei Cloud) systems or products, as well as how it transfers security logs from SecMaster to third-party systems or products. The procedure is as follows.

This section describes the process of transferring logs into and out of SecMaster.
Procedure | Description |
|---|---|
Install the log collector. | |
Ensure that there is enough space to run the log collector. | |
Ensure that there is enough space to run the log collector. | |
Use this account to access SecMaster for the log collector on the tenant side. | |
Establish the connection between the customer VPC and SecMaster. | |
Manage the log collector node (ECS) on SecMaster. | |
Configure the log collection process. | |
This step is required when you transfer security logs from non-Huawei Cloud systems to SecMaster. Skip this step if you only need to transfer Huawei Cloud logs to a third-party system or product. Create a log storage location (pipeline) in SecMaster for log storage and analysis. | |
Step 9: Configure a Connector | Set the parameters of the log source and destination ends. Complete this step based on your needs: |
Configure a log parser to convert source logs to the required data type in codeless mode. | |
Connect all function components to ensure that SecMaster and the log collector work properly. | |
Check whether log access is successful. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.

