Help Center> Cloud Bastion Host> Service Overview> CBH and Other Services
Updated on 2023-04-20 GMT+08:00

CBH and Other Services

CBH needs to work with other cloud services. Figure 1 shows the dependencies between CBH and other cloud services.

Figure 1 CBH and other services

VPC

Virtual Private Cloud (VPC) provides a virtual network environment for you to configure security groups, subnets, and Elastic IP Addresses (EIPs) for your CBH instances. This allows you to manage and configure internal networks. You can also customize access rules for security groups to enhance security.

ECS

Elastic Cloud Server (ECS) provides a deployment environment for CBH instances, and CBH provides security management services for resources on ECSs.

  • ECSs are used to deploy the CBH background environment, which uses the EulerOS operating system.
  • You can log in to resources, such as servers and databases, on ECSs through CBH to manage those resources and login credentials and audit O&M sessions in a more secure way.

EIP

Elastic IP Address (EIP) provides independent publicexternal IP addresses and egress bandwidth. Each public EIP can be used by only one cloud resource at a time. With an EIP bound to a CBH instance, users can access the Internet through the mapped CBH system. You can adjust the EIP bandwidth at any time to meet your business traffic changes.

RDS

You can log in to the Huawei Cloud Relational Database Service (RDS) databases through CBH to manage databases and login credentials and audit O&M sessions in a more secure way.

CTS

Cloud Trace Service (CTS) generates traces to enable you to get a history of operations performed on CBH instances, allowing you to query, audit, and backtrack resource operation requests initiated from the management console as well as the responses to those requests.

CTS records operations on CBH instances for later query, auditing, and backtracking. For details, see CBH Operations Supported by CTS.

IAM

Identity and Access Management (IAM) helps you to manage permissions and identity authentication for users of CBH instances. For more details, see Permissions Management.