Updated on 2025-08-04 GMT+08:00

Overview

This document describes the following best practices of Log Tank Service (LTS):

Table 1 Best practice overview

Category

Best Practice

Scenario

Log ingestion

Collecting Host Logs from Third-Party Clouds, Internet Data Centers, and Other Huawei Cloud Regions to LTS

This practice describes how to collect Alibaba Cloud host logs to Huawei Cloud LTS. The method is similar to that of collecting logs from Internet Data Centers (IDCs) or across Huawei Cloud regions.

Log ingestion

Collecting Kubernetes Logs from Third-Party Clouds, IDCs, and Other Huawei Cloud Regions to LTS

This practice describes how to collect Alibaba Cloud Kubernetes logs to Huawei Cloud LTS. The method is similar to that of collecting logs from IDCs or across Huawei Cloud regions.

Log ingestion

Collecting Syslog Aggregation Server Logs to LTS

This practice describes how to use the syslog protocol to upload logs to LTS. You need to buy an Elastic Cloud Server (ECS) as a syslog aggregation server. Syslog comes preinstalled by default on Linux servers. However, Huawei Cloud ECSs do not receive remote syslog writes by default. You need to enable this function.

Log ingestion

Importing Logs of Self-built ELK to LTS

This practice describes how to use a custom Python script and ICAgent (LTS collector) to transfer logs from Elasticsearch to LTS.

Log ingestion

Using Flume to Report Logs to LTS

This practice describes how to collect logs using Flume and report logs using Kafka provided by LTS.

Log ingestion

Collecting Zabbix Data Through ECS Log Ingestion

This practice describes how to collect monitoring data from Zabbix to an LTS log stream.

Log ingestion

Collecting Logs from Multiple Channels to LTS

This practice describes how to collect log data from multiple channels to LTS.

Log search and analysis

Analyzing Huawei Cloud ELB Logs on LTS

This practice describes how to search for and analyze logs after Elastic Load Balance (ELB) logs are ingested to and structured in LTS.

Log search and analysis

Viewing ELB Log Analysis Results on the LTS Dashboards

This practice describes how to display logs in dashboards after ELB logs are ingested to and structured in LTS.

Log search and analysis

Analyzing Huawei Cloud WAF Logs on LTS

This practice describes how to search for and analyze logs after Web Application Firewall (WAF) logs are ingested to and structured in LTS.

Log search and analysis

Embedding the LTS Log Query Page into a User-built System

This practice describes how to use the federation proxy mechanism of Identity and Access Management (IAM) for custom identity broker and embed a login link to your systems so you can view LTS logs in your systems without logging in to the Huawei Cloud console.

Log search and analysis

Displaying Query and Analysis Results on Pages

This practice describes how to display query and analysis results on multiple pages.

Log search and analysis

Optimizing Regular Expressions for Faster Log Parsing

This practice describes how to optimize regular expressions to improve parsing efficiency.

Log transfer

Changing File Time Zones for Log Transfer in a Batch

This practice describes how to use Python scripts and LTS APIs to implement custom operations in a batch.

Log alarms

Using Multi-Chart Query Results for Alarm Detection and Notification

This practice describes how to use the query results of multiple charts to configure alarm rules.

Billing

Collecting Statistics on LTS Expenses of Different Departments Based on Log Stream Tags

This practice describes how to collect statistics on the LTS expenses of different departments in an enterprise. You can add tags to LTS log streams to distinguish business departments. LTS will add these tags to CDRs sent to the Billing Center.

Suggestions on LTS security configuration

Suggestions on LTS Security Configuration

This section provides actionable guidance for enhancing the overall security of LTS. You can continuously evaluate the security of your LTS resources and enhance their overall defensive capabilities by combining different security capabilities provided by LTS. By doing this, data stored in LTS can be protected from leakage and tampering both at rest and in transit.