Help Center/ Cloud Bastion Host/ Getting Started/ Getting Started with Common Practices
Updated on 2025-07-31 GMT+08:00

Getting Started with Common Practices

This section introduces a series of common practices to help you quickly use CBH.

Table 1 Common practices

Practices

Description

Changing Specifications of a CBH Instance

Changing Specifications of a CBH Instance

You can change specifications of a CBH instance to meet your business needs.

System policies

Enabling Secondary Authorization for High-Risk Database Operations

With CBH, you can securely delete, modify, and view your database instances by running commands. To secure sensitive database information and prevent key information from being lost or disclosed, CBH gives you the ability to configure an approval process for high-risk database operations and monitor key information.

System O&M

Centralized O&M of Cloud and On-Premises Resources Across Clouds and VPCs

If you have servers deployed across VPCs, in on-premises data centers, and across multiple clouds, CBH is always a good choice for centralized O&M. With CBH, you can manage scattered servers centrally without establishing dedicated lines, making O&M of all workloads efficiently and securely.

O&M audits

Using CBH to Locate Incident Causes

CBH can manage and control all operations and log all operations in detail. Audit logs of sessions can be viewed online, recorded and played online, and played offline after being downloaded. CBH allows you to audit operations performed over character protocols (SSH and TELNET), graphics protocol (RDP and VNC), file transfer protocols (FTP, SFTP, and SCP), and database protocols (DB2, MySQL, Oracle, and SQL Server), as well as application publishing. For operations over character and database protocols, their operation instructions can be parsed so that you can know what actions have been done. For file transfer actions, the name and destination path of a transferred file can be logged.