How Long Are Logs Stored in SecMaster?
SecMaster can aggregate logs from many cloud products, such as WAF, HSS, and OBS. After the log aggregation, SecMaster can query and analyze the data and perform intelligent modeling.
The following table lists how long SecMaster stores logs of cloud products.
Category |
Cloud Service |
Log Description |
Log |
Aggregated Log Storage Limit |
---|---|---|---|---|
Server security |
Host Security Service (HSS) |
HSS alarms |
hss-alarm |
180 days |
HSS vulnerability scan results |
hss-vul |
7 days |
||
HSS security logs |
hss-log |
15 days |
||
Application security |
Web Application Firewall (WAF) |
Attack logs |
waf-attack |
30 days |
Access logs |
waf-access |
30 days |
||
API Gateway (APIG) |
Access logs |
apig-access |
180 days |
|
Cloud Trace Service (CTS) |
CTS logs |
cts-audit |
180 days |
|
Network security |
Intrusion Prevention System (IPS) |
Attack logs |
nip-attack |
180 days |
Anti-DDoS |
Attack logs |
ddos-attack |
180 days |
|
Cloud Firewall (CFW) |
Access control logs |
cfw-block |
30 days |
|
Traffic logs |
cfw-flow |
15 days |
||
Attack event logs |
cfw-risk |
180 days |
||
Data security |
Object Storage Service (OBS) |
Access logs |
obs-access |
15 days |
Database Security Service (DBSS) |
Alarm logs |
dbss-alarm |
180 days |
|
Data Security Center (DSC) |
Alarm logs |
dsc-alarm |
180 days |
|
Identity security |
Identity and Access Management (IAM) |
Audit logs |
iam-audit |
180 days |
Product Consulting FAQs
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- Where Does SecMaster Obtain Its Data From?
- What Are the Dependencies and Differences Between SecMaster and Other Security Services?
- What Are the Differences Between SecMaster and HSS?
- Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
- Can I Use SecMaster Across Accounts?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- Data Synchronization and Consistency
- Troubleshooting the Agent Installation Failure
- How Do I Grant Permissions to an IAM User?
- What Are the Relationships and Differences Between SecMaster and SA?
- How Long Are Logs Stored in SecMaster?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
more