After enabling Agentic SOC, you can ingest cloud service logs from the same account, other Alibaba Cloud accounts, and third-party cloud providers. This allows you to centrally monitor and analyze alerts and logs across all your resources. After you ingest the logs, Agentic SOC monitors and analyzes the collected data to identify and construct complete attack chains, generating detailed security events. This improves alert analysis and response efficiency.
Prerequisites
Agentic SOC is enabled. For more information, see What is Agentic SOC?.
Simple Log Service is enabled for the cloud services whose logs you want to ingest. This does not apply to Security Center. For more information, see the official documentation for the relevant cloud service.
NoteYou do not need to enable the log analysis feature for Security Center to ingest its logs.
Ingest logs from Alibaba Cloud services
To ingest logs from a cloud service within your current Alibaba Cloud account, you can directly select the cloud service and log type on the Service Integration page.
To configure a unified log ingestion policy for multiple Alibaba Cloud accounts, you must first set up a multi-account structure. Then, log on to the console as a global account administrator, switch to the Global Account View on the Service Integration page, and follow the steps below. For more information about multi-account management, see Multi-account management.
In the left-side navigation pane, choose . In the upper-left corner of the console, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.
In the service integration list, find the cloud service that you want to integrate and click Ingestion Settings in the Actions column.
In the service ingestion settings panel, find the log type that you want to ingest and click the number in the Associated Accounts column.
You can also select multiple log types and click the batch ingestion button at the bottom of the list to configure the accounts for ingestion in bulk.
In the ingestion settings panel, select the accounts from which you want to ingest logs.
NoteIf you are using an account with individual real-name verification, the Select Account panel only displays your current account. Only a global account administrator using the Global Account View can select from all accounts managed by Agentic SOC.
If the cloud service, such as Security Center, supports only a product-defined logstore, you only need to select the account. Security Center automatically ingests logs into the defined logstore.
If the cloud service uses a custom logstore, you must select the account and then select the corresponding logstore from the logstore (Format: regionId.project.logstore) drop-down list or paste the name of the custom logstore. The logstore name must be in the format
regionId.project.logstore.
If needed, enable Automatically Associate New Accounts.
You can choose whether to enable Automatically Associate New Accounts. After you enable this feature, threat analysis and response automatically ingests the cloud service logs from newly managed Alibaba Cloud accounts.
NoteOnly a global account administrator using the Global Account View can configure the Automatically Associate New Accounts option.
Ingest logs from third-party cloud services
If your business runs on both Alibaba Cloud and other platforms like Huawei Cloud or Tencent Cloud, you can integrate your third-party cloud accounts with Agentic SOC to manage security alerts across all environments. This provides a unified solution for alert monitoring and security operations.
1. Configure a third-party cloud platform account
Huawei Cloud sub-account
Tencent Cloud sub-account
2. Forward logs to a specified cloud service
To enable threat analysis and response, you must forward logs from your cloud services to a designated storage or messaging service provided by the cloud vendor, such as Object Storage Service (OBS) or Ckafka. Agentic SOC can then efficiently retrieve and analyze these logs from the source. Logs must be routed to the appropriate storage based on their type. Follow the guidelines below.
Cloud provider | Log type | Destination service | Configuration instructions | Data collection latency |
Huawei Cloud |
| OBS | Forward logs stored in Log Tank Service (LTS) to OBS. For details, see Forwarding Logs to OBS. Configure the key parameters as follows:
Important
| Agentic SOC collects data from OBS offline, which introduces some latency. The system is designed to collect data that is three collection cycles older than the current time. For example, if the collection cycle is 2 minutes and a task starts at 17:58 on September 10, 2024, the system retrieves data from the /2024/09/10/17/52 directory. This data is from 6 minutes (3 cycles) prior. This design ensures data integrity by allowing sufficient time for write operations to complete. This prevents incomplete data collection, especially in high-volume scenarios. |
Tencent Cloud | Cloud Firewall alert logs (only intrusion prevention logs are supported) | Ckafka | Ship intrusion prevention logs to a Ckafka topic. For more information, see Log Shipping. | Real-time collection with no latency. |
Web Application Firewall (WAF) alert logs | None | Agentic SOC collects these logs by calling the Web Application Firewall (WAF) API every 10 minutes. No forwarding configuration is required. | Data collection has a latency of 10 minutes or more. |
3. Add a Third-Party Cloud Account AK to Threat Analysis and Response
Add the access key of your third-party cloud account to Agentic SOC. This allows Agentic SOC to retrieve alert logs from your third-party cloud assets.
Log on to the Security Center console.
Authorize access to the third-party cloud account.
Security Center uses the access key of the third-party account to obtain read permissions and synchronize asset information from the third-party cloud.
In the left-side navigation pane, choose . In the upper-left corner of the console, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.
In the Multi-cloud Service Access section, hover over the icon for the third-party cloud provider you want to integrate and click Grant Permission.
In the Edit Multi-cloud Configuration panel, select Manual Configuration. In the Permission Description section, select Agentic SOC, and then click Next.
On the Submit AccessKey Pair page, enter the sub-account's access key information and click Next.
On the Policy Configuration page, select a period for the AK Service Status Check and click OK.
Bind the third-party cloud account.
In the left-side navigation pane, choose . In the upper-left corner of the console, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.
In the Multi-cloud Service Access section, hover over the icon for the third-party cloud provider you want to bind and click Add Account.
In the Add Account panel, click Add.
In the Account Association Settings panel, enter the main account name and ID of the third-party cloud provider, select the authorized sub-account's access key, and click Associate Account and Associate Data Source.
In the Data Source Settings panel, configure the data sources for the cloud services you want to integrate.
Huawei Cloud: A single data source can ingest data from one OBS bucket. If you need to ingest data from multiple OBS buckets, you must create multiple data sources. Otherwise, a single data source is sufficient.
In the Huawei Cloud panel, fill in the Access Method, Data Source Name, Region, and Bucket Name. Click Save Data Source.
Click Add Log Type, select the Log Type to ingest, specify the OBS File Path, and click Save Log Type.
The custom transfer path in the OBS File Path must be configured with minute-level granularity. Example:
/LogTanks/cn-north-4/CFW/lts-topic-cfw-0001//%Y/%m/%d/%H/%M.After saving a log type, if both Cloud Firewall and Web Application Firewall (WAF) logs are stored in the same OBS bucket, you must click Add Log Type again to create a configuration for the other log type.
Tencent Cloud: Since Cloud Firewall and Web Application Firewall (WAF) alert logs use different ingestion methods, you must create a separate data source for each log type if you want to ingest both. The following steps show an example for Cloud Firewall alert logs. To ingest Web Application Firewall (WAF) logs, follow the instructions in the console.
In the Data Source Settings - Tencent Cloud panel, fill in the Access Method, Data Source Name, Internet URL, Username, and Password. Click Save Data Source.
Click Add Log Type, fill in the Log Topic and Consumer Group Name, select a Log Type, and click Save Log Type.
4. Ingesting logs from third-party cloud services
In the left-side navigation pane, choose . In the upper-left corner of the console, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.
In the service integration list, find the third-party cloud service you want to integrate and click Ingestion Settings in the Actions column.
In the ingestion settings panel, find the log type you want to ingest and click the number in the Associated Accounts column.
In the ingestion settings dialog box, select the account to ingest from and click OK.
If needed, enable Automatically Associate New Accounts.
You can choose whether to enable Automatically Associate New Accounts. After you enable this feature, threat analysis and response automatically integrates the cloud service logs for new third-party cloud accounts.
NoteOnly a global account administrator using the Global Account View can configure the Automatically Associate New Accounts option.
Related documentation
After ingesting logs, you can configure threat detection rules to correlate multiple security alerts into a single security event with a complete attack chain. This reduces the number of alerts and improves alert analysis and response efficiency. For more information, see Configure threat detection rules.
You can use the Agentic SOC dashboard to centrally monitor and manage your security posture across different cloud platforms, accounts, and services through data visualizations, and to measure the effectiveness of your security operations. For more information, see Dashboard.
You can use the log management feature of Agentic SOC to quickly browse and query all collected logs, which simplifies log management in a multi-resource environment. For more information, see Log management.
You can call API operations related to log ingestion to perform tasks in batches, such as integrating services or logs and viewing bound cloud accounts. For a list of API operations, see Log ingestion.
Does Agentic SOC support ingesting logs from on-premises devices?