Data Security Center
Data Security Center
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- Change History
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Identification Templates Supported by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Data Watermarking
- Data Usage Audit
On this page
Show all
Adding a Log Stream
Updated on 2024-10-09 GMT+08:00
For details about how to add LTS assets, see section Adding a Log Stream.
Prerequisites
- DSC has been allowed to access the LTS assets. For details, see Allowing or Disallowing Access to Cloud Assets.
- LTS has been enabled and assets exist in LTS.
Adding a Log Stream
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation tree on the left, choose Asset Management > Asset Center. The Asset Center page is displayed.
- Choose Log < LTS. The Log Stream tab page is displayed.
Figure 1 LTS database list
- Click Add in the upper left corner of the database list. The Add Log Stream dialog box is displayed.
- Set parameters according to Table 1 and click OK.
Table 1 Parameters for adding a database Parameter
Description
Asset
Enter a user-defined asset name containing 4 to 255 characters.
Big Data Type
Select LTS from the drop-down list box.
Log Group
Select a log group from the drop-down list box.
Log Stream
Select the log stream to be added from the drop-down list box.
After the asset authorization is complete, the Connectivity of the asset is Checking, which means DSC is checking the asset connectivity.- If DSC can access the added asset, the Connectivity is Succeeded.
- If the DSC cannot access the added asset, the Connectivity is Failed. Move the cursor to Failed to view the failure cause or rectify the fault by referring to section How Do I Troubleshoot the Failure in Connecting to the Added Database?
Parent topic: Asset Center
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
The system is busy. Please try again later.