CTS Best Practices
This document summarizes practices in common application scenarios of Cloud Trace Service (CTS). Each practice case includes detailed solution description and operation guidance, helping you easily build your audit services based on CTS.
|
Practice |
Description |
|---|---|
|
This section takes Elastic Cloud Server (ECS) creation (operation name: createServer) as an example to describe how to store and query traces in Log Tank Service (LTS). |
|
|
This section describes how to use operation audit and key event notification of CTS to monitor the operation of creating an Identity and Access Management (IAM) user and send an alarm by email. |
|
|
This section describes how to use CTS's functions of operation audit and audit log transfer to LTS to monitor access key-related traces, and how to use the log alarm function of LTS to report alarms. |
|
|
This section describes how to monitor your Huawei Cloud account using CTS's functions of operation audit and audit log transfer to LTS, and how to use the log alarm function of LTS to report alarms. |
|
|
This section describes how to download traces from CTS, Object Storage Service (OBS), and LTS. |
|
|
This section describes how to use the operation audit and trace filtering and querying functions of CTS to monitor Data Encryption Workshop (DEW) key usage. |
|
|
This section describes how to continuously transfer traces from CTS to OBS and LTS. |
|
|
This section provides actionable guidance for enhancing the overall security of CTS. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.