How to Use Security Analysis
Table 1 shows the process of using the security analysis function.
Step |
Description |
---|---|
Add a workspace for resource isolation and control. |
|
Configure the source of security data you need to collect. SecMaster can integrate log data of multiple Huawei Cloud products, such as storage, management and supervision, and security. After the integration, you can search for and analyze all collected logs. |
|
(Optional) Adding a Data Space |
Create a data space for storing collected log data. For data accessed through the console, the system creates a default data space. You do not need to create a data space. |
(Optional) Creating a Pipeline |
Create pipelines for collecting, storing, and querying log data. For data accessed through the console, the system creates a default data pipeline. You do not need to create a pipeline. |
Configure indexes to narrow down the query scope. By default, indexes have been configured for some reserved fields in the accessed cloud service logs. For details, see Log Fields. |
|
Query and analyze the accessed data. |
|
Allows you to download raw logs or queried and analyzed logs. |
|
After you run query and analysis statements, SecMaster can display the query and analysis results in charts and tables. Currently, data can be displayed in tables, line charts, bar charts, and pie charts. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.