Process Flow
This topic walks you through on how SecMaster collects security logs from third-party (non-Huawei Cloud) systems or products, as well as how it transfers security logs from SecMaster to third-party systems or products. The procedure is as follows.

This section describes the process of transferring logs in and out SecMaster.
Procedure |
Description |
---|---|
Install the log collector. |
|
Ensure that there is enough space to run the log collector. |
|
Ensure that there is enough space to run the log collector. |
|
Use this account to access SecMaster for the log collector on the tenant side. |
|
Establish the connection between the customer VPC and SecMaster. |
|
Manage the log collector node (ECS) on SecMaster. |
|
Configure the log collection process. |
|
This step is required when you transfer security logs from non-Huawei Cloud systems to SecMaster. Skip this step if you only need to transfer Huawei Cloud logs to a third-party system or product. Create a log storage location (pipeline) in SecMaster for log storage and analysis. |
|
Step 9: Configure a Connector |
Set the parameters of the log source and destination ends. Complete this step based on your needs: |
Configure a log parser to convert source logs to the required data type in codeless mode. |
|
Connect all function components to ensure that SecMaster and the log collector work properly. |
|
Check whether log access is successful. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot