检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Figure 5 Workspace management page In the navigation pane on the left, choose Log Audit > Components. Then, select the Components tab. Figure 6 Accessing the Components tab On the Components page, view the component details.
Abnormal process behavior: msg.appendInfo.event_type=3007 Troubleshooting Methods and Handling Suggestions Go to the Log Audit > Security Data page in SecMaster, expand the target data space, and click pipeline sec-hss-alarm.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Security Data. Figure 2 Accessing the Security Analysis tab (Optional) Add a data space. For details, see Adding a Data Space.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Collections. Figure 2 Accessing the connection management page Add a data connection source. On the Connections tab, click Add. Configure the data connection source details.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Cloud Service Access. Figure 2 Cloud Service Access On the Cloud Service Access page, configure log integration.
By default, audit logs are stored in the database. You can dump audit logs to OBS to ensure that audit logs are backed up and to make it easier for you to view audit logs.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Collections. Then, select the Parsers tab. Figure 2 Accessing the Parsers tab page On the Parsers tab page, click the Templates tab.
After enabling log integration, you can query them on the Log Audit > Security Data page.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Components. Then, select the Components tab. Figure 2 Accessing the Components tab On the Components tab page, click Edit Settings in the upper right corner of the component to be viewed.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Components. Then, select the Components tab. Figure 2 Accessing the Components tab On the Components tab page, click Edit Settings in the upper right corner of the component to be viewed.
Supported Log Audit Overview Log Audit Overview Supported Supported Supported Multi-Account Management Multi-Account Management -- -- Supported
Figure 4 Workspace management page In the navigation pane on the left, choose Log Audit > Security Data. On the security analysis page displayed, click the Data Delivery tab. On the Data Delivery tab, click the Delivery Permissions tab.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Collections. Figure 2 Accessing the connection management page Add a source for the data connection. On the Connections tab, click Add. Configure the data connection source details.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Components. Figure 2 Node management page On the Nodes tab, click Create. The Create Node page is displayed on the right. On the Create Node page, configure a channel.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Collections. Then, select the Collection Nodes tab. Figure 2 Accessing the Collection Nodes page On the Collection Nodes page, view the detailed information about collection nodes.
In the navigation pane on the left, choose Log Audit > Components. On the displayed Nodes tab, locate the row that contains the target node and click Deregister in the Operation column. Figure 2 Deregistering a node In the displayed dialog box, click OK.
After enabling log integration, you can query them on the Log Audit > Security Data page. The procedure is as follows.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Collections. Then, select the Collection Channels tab.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Security Data. Figure 2 Accessing the Security Analysis tab In the data space navigation tree on the left, click the data space name to expand all pipelines.
Figure 1 Workspace management page In the navigation pane on the left, choose Log Audit > Security Data. Figure 2 Accessing the Security Analysis tab In the data space navigation tree on the left, click a data space name to show the pipeline list. Click a pipeline name.