Verifying Log Collection
Scenarios
This topic describes how to verify that non-Huawei Cloud logs can be forwarded to SecMaster.
Scenario |
Verification Method |
---|---|
Enabling SecMaster to collect logs on Huawei Cloud |
Go to the Security Analysis page on the SecMaster console and check whether there are logs of cloud services with log access enabled. |
Transferring logs from SecMaster to a third-party system or product |
Go to the third-party system or product and check whether forwarded logs have been received successfully. |
Ingesting third-party (non-Huawei Cloud) logs into SecMaster |
Verify the log access by referring to this section. |
Verifying Log Collection
- View data in the collection channel on the SecMaster console.
- Log in to the SecMaster console.
- Click
in the upper left corner of the management console and select a region or project.
- Click
in the upper left corner of the page and choose Security & Compliance > SecMaster.
- In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.
Figure 1 Workspace management page
- In the navigation pane on the left, choose Collection Channels tab.
Figure 2 Accessing the Collection Channels tab
. Then, select the
- On the Collection Channels tab, click the setting button in the upper right corner of the table and select Received and Sent.
Figure 3 Table parameters
- In the table, view the monitoring information of the corresponding collection channel. If there is data in the Received and Sent columns, the log access is successful.
- Check data in the security analysis log pipeline on the SecMaster console.
- In the navigation pane on the left, choose Figure 4 Accessing the Security Analysis tab page
. The Security Analysis page is displayed.
- In the data space navigation tree on the left, click a data space name to show the pipeline list. Click the name of the target pipeline. The pipeline data search page is displayed on the right.
Figure 5 Pipeline data page
- If data is displayed in the log pipeline, the log access is successful.
- In the navigation pane on the left, choose
- View data in the security data table on the SecMaster console.
- In the navigation pane on the left, choose Figure 6 Tables page
.
- On the Tables page, click the name of the target index data table to go to the query and analysis page.
- If data is displayed on the data table query and analysis page, the log access is successful.
- In the navigation pane on the left, choose
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.