Updated on 2024-10-09 GMT+08:00

Protection Log Overview

This section describes the following content:

Log Storage Mode

Function

Storage Duration

Billing Mode

Access Mode

Log Field Description

Log query

7 days

Free

Automatic access

Querying Logs

Log management

1 – 360 days

Separate billing by traffic

You need to manually connect to LTS. For details, see Configuring Logs.

For details about how to use the LTS log function, see Log Management Description.

Log Field Description

Log Types

The following types of logs are provided:

Handling Improper Blocking

  • If improper blocking is recorded in access control logs, check whether your protection rules, blacklist, and whitelist configurations are correct.
  • If improper blocking is recorded in attack event logs, your normal workloads may be blocked by IPS.

Log Management Description

Function

Description

Configuration Method

Configuring logs

Interconnect logs with LTS and create a log group and a log stream.

Configuring Logs

Modifying log storage duration

(Optional) By default, logs are stored for seven days. You can set the storage duration in the range 1 to 360 days.

Changing the Log Storage Duration

Log search and analysis

(Optional) Use proper log collection functions, efficient search methods, and professional analysis tools to implement comprehensive monitoring and refined management of your system and applications.

For details, see Log Search and Analysis.

Log visualization

(Optional) Visualize log data in tables and charts.

See Log Visualization.

Configuring alarm rules

(Optional) Monitor keywords in logs. Collect statistics on the occurrences of keywords in logs within a specified period to monitor the service running status in real time.

For details, see Log Alarms.

Viewing log fields

Learn the meaning of fields in a log.

Log Field Description

References