Updated on 2025-11-14 GMT+08:00

CTS Best Practices

This document summarizes practices in common application scenarios of Cloud Trace Service (CTS). Each practice case includes detailed solution description and operation guidance, helping you easily build your audit services based on CTS.

Table 1 CTS best practices

Practice

Description

Using LTS to Store and Query Audit Traces

This section takes Elastic Cloud Server (ECS) creation (operation name: createServer) as an example to describe how to store and query traces in Log Tank Service (LTS).

Using CTS to Monitor the Operation of Creating an IAM User

This section describes how to use operation audit and key event notification of CTS to monitor the operation of creating an Identity and Access Management (IAM) user and send an alarm by email.

Using CTS to Monitor Access Key Usage

This section describes how to use CTS's functions of operation audit and audit log transfer to LTS to monitor access key-related traces, and how to use the log alarm function of LTS to report alarms.

Using CTS to Monitor Huawei Cloud Account Usage

This section describes how to monitor your Huawei Cloud account using CTS's functions of operation audit and audit log transfer to LTS, and how to use the log alarm function of LTS to report alarms.

Downloading Operation Traces from CTS

This section describes how to download traces from CTS, Object Storage Service (OBS), and LTS.

Monitoring DEW Key Usage Using CTS

This section describes how to use the operation audit and trace filtering and querying functions of CTS to monitor Data Encryption Workshop (DEW) key usage.

Continuously Transferring CTS Traces to Specified Services

This section describes how to continuously transfer traces from CTS to OBS and LTS.

Suggestions on CTS Security Configuration

This section provides actionable guidance for enhancing the overall security of CTS.