Related Services
ECS
DBSS instances are created on ECSs. You can use the DBSS instances to audit databases built on ECS.
RDS
DBSS can audit RDS instances.
BMS
DBSS can audit databases built on BMSs.
CTS
Cloud Trace Service (CTS) provides you with a history of DBSS operations. After enabling CTS, you can view all generated traces to review and audit performed DBSS operations. For details, see the Cloud Trace Service User Guide.
Operation |
Resource Type |
Trace Name |
---|---|---|
Creating an instance |
dbss |
createInstance |
Deleting an Instance |
dbss |
deleteInstance |
Starting an Instance |
dbss |
startInstance |
Stopping an Instance |
dbss |
stopInstance |
Restarting an Instance |
dbss |
rebootInstance |
OBS
Object Storage Service (OBS) is an object-based cloud storage service. It provides massive, secure, highly reliable, and low-cost data storage capabilities. Database audit logs can be backed up to OBS buckets to achieve high availability for disaster recovery.
SMN
SMN is an extensible, high-performance message processing service.
- To enable notifications, you must configure SMN first.
- After enabling notifications, you can receive an email when an alarm is triggered or an audit report is generated.
- You can enable or disable alarm notifications on the Alarm Notifications tab of the Settings page.
- You can enable or disable report notifications on the Reports page.
For details about SMN, see Simple Message Notification User Guide.
Cloud Eye
Cloud Eye is a multi-dimensional monitoring platform for resources such as ECSs and bandwidth. With Cloud Eye, you can track the resource usage and running status of services on the cloud platform, receive alarm notifications about errors, and respond to changes immediately to keep your services running smoothly. For details about the alarm function, see Cloud Eye User Guide.
Metric Name |
Description |
Value Range |
Monitored Object |
|
---|---|---|---|---|
SQL Injection Alarms |
Collects the number of SQL injection alarms of a monitored object. |
≥0 count |
ECS |
4 min |
XSS Vulnerability Alarms |
Collects the number of XSS vulnerability alarms of a monitored object. |
≥0 count |
ECS |
4 min |
Webshell Upload Alarms |
Collects the number of webshell upload alarms of a monitored object. |
≥0 count |
ECS |
4 min |
Link Theft Alarms |
Collects the number of link theft alarms of a monitored object. |
≥0 count |
ECS |
4 min |
Blacklisted IP address alarms |
Collects the number of alarms on blacklisted IP addresses of a monitored object. |
≥0 count |
ECS |
4 min |
IP Address Whitelist Alarms |
Collects the number of alarms on whitelisted IP addresses of a monitored object. |
≥0 count |
ECS |
4 min |
IAM
Identity and Access Management (IAM) provides you with permission management for DBSS.
Only users who have the DBSS System Administrator permissions can use DBSS.
To obtain the permissions, contact users who have the Security Administrator permissions. For details, see the Identity and Access Management User Guide.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.