All Products
Search
Document Center

Simple Log Service:Collect Security Center logs to Log Audit Service

Last Updated:Aug 20, 2024

Simple Log Service provides the new version of Log Audit Service. You can use the application to collect Security Center logs from multiple regions and accounts to one project. Then, you can manage and analyze the logs in a centralized manner.

How it works

After you enable the log analysis feature for Security Center, Security Center logs are automatically collected and stored in a Logstore named sas-log of a project named sas-log-${Alibaba Cloud account ID}-${Region ID}. If you use the new version of Log Audit Service, you can collect Security Center logs from multiple regions and accounts to one project.

image

Prerequisites

1. Associate a project

Security Center logs are stored in a project that you associate.

  1. Log on to the Simple Log Service console. In the Log Application section, click the Audit & Security tab. Then, click Log Audit Service (New Version).

    image

  2. On the Log Audit (New Version) page, click Associate Project. In the Associate Project dialog box, configure the parameters and click Confirm. In this topic, the a-multi-accounts-security-log-center project is used.

    image

2. Create a collection rule

2.1 Configure a collection rule

  1. On the Log Audit (New Version) page, click the project that you want to manage.

    image

  2. On the Policies tab, click Create Collection Rule. In this example, specify China (Hangzhou) and Singapore for the Region field of the Resource Attributes parameter. Set the Destination Store for Centralized Storage parameter to Select Existing Resource and select the central-sas-log Logstore in the drop-down list. This way, Security Center logs from the China (Hangzhou) and Singapore regions and two accounts are collected and stored in the central-sas-log Logstore of the a-multi-accounts-security-log-center project.

    image

    image

2.2 Verify collection results

  1. On the Policies tab, click the collection rule that is created.

    image

  2. In the left-side navigation pane, click Query and Analysis. Then, use search syntax to query and analyze logs. For more information, see Search syntax. For more information about the types of and fields in Security Center logs, see Log types and log fields.

    image

References