Data types and collection process
- Last Updated: February 21, 2025
- 2 minute read
- LoadMaster
- LoadMaster 360
- Documentation
Progress Software is committed to upholding transparency and trust with our customers. We employ robust security measures and conform to industry standards when collecting and processing data. This section describes the different types of data collected by the LoadMaster and explains the process involved when the data is collected and transferred to our cloud infrastructure.
Review this section carefully to understand:
- The specific types of data that are processed.
- The purpose of collecting and transferring each type of data.
- Steps to secure the data transmission and storage.
Data Collection
The LoadMaster Connector uses the LoadMaster Application Programming Interface (API) to gather metrics and status information from managed LoadMasters. The Connector gathers metrics from managed LoadMasters using secure API keys. The data is then parsed and securely transferred to the cloud. To enable this, you must allow communication from the Connector to LoadMaster 360. This communication with the cloud uses HTTPS to ensure the connection is encrypted.
The Connector also acts as a syslog destination for LoadMasters. We perform some parsing of these logs on the Connector and send key information to the LoadMaster 360 Cloud.
Types of Data Collected
LoadMaster 360’s Connector collects the following information to provide insights and analytics necessary to maintain optimized application performance and deliver the best possible application experience for users:
- LoadMaster authentication API keys
- Certificates (only certificates installed on the LoadMaster.
Private keys are not collected):
- Public certificate meta data
- LoadMaster network configuration:
- IP addresses
- DNS
- Gateways
- LoadMaster license information
- LoadMaster connection information:
- Network bandwidth metrics
- SSL TPS/CPS utilization
- LoadMaster system metrics:
- CPU metrics
- Memory metrics
- Network interface metrics
- Disk information
- Virtual Service details:
- Configuration settings
- Web Application Firewall (WAF) rules
- SubVS settings
- Real Server IP address and port
- LoadMaster logs
- WAF logs
- Edge Security Pack (ESP) logs (when enabled):
- ESP user logs
- ESP security logs
- ESP connection logs
- User request logs (when enabled and on a supported firmware
version):
- Source IP addresses
- HTTP request methods
- HTTP headers
- Server response values
- LoadMaster(s) uptime status
- Virtual Service information:
- IP addresses and ports
- Health telemetry
- Connection metrics
- Health over time
- Real Server information:
- IP addresses and ports
- Health telemetry
- Connection metrics
- High Availability (HA) status information