Overview
This document describes the following best practices of Log Tank Service (LTS):
Category |
Best Practice |
Scenario |
---|---|---|
Log ingestion |
This practice describes how to collect Alibaba Cloud host logs to Huawei Cloud LTS. The method is similar to that of collecting logs from Internet Data Centers (IDCs) or across Huawei Cloud regions. |
|
Log ingestion |
Collecting Kubernetes Logs from Third-Party Clouds, IDCs, and Other Huawei Cloud Regions to LTS |
This practice describes how to collect Alibaba Cloud Kubernetes logs to Huawei Cloud LTS. The method is similar to that of collecting logs from IDCs or across Huawei Cloud regions. |
Log ingestion |
This practice describes how to use the syslog protocol to upload logs to LTS. You need to buy an Elastic Cloud Server (ECS) as a syslog aggregation server. Syslog comes preinstalled by default on Linux servers. However, Huawei Cloud ECSs do not receive remote syslog writes by default. You need to enable this function. |
|
Log ingestion |
This practice describes how to use a custom Python script and ICAgent (LTS collector) to transfer logs from Elasticsearch to LTS. |
|
Log ingestion |
This practice describes how to collect logs using Flume and report logs using Kafka provided by LTS. |
|
Log ingestion |
This practice describes how to collect monitoring data from Zabbix to an LTS log stream. |
|
Log ingestion |
This practice describes how to collect log data from multiple channels to LTS. |
|
Log search and analysis |
This practice describes how to search for and analyze logs after Elastic Load Balance (ELB) logs are ingested to and structured in LTS. |
|
Log search and analysis |
This practice describes how to display logs in dashboards after ELB logs are ingested to and structured in LTS. |
|
Log search and analysis |
This practice describes how to search for and analyze logs after Web Application Firewall (WAF) logs are ingested to and structured in LTS. |
|
Log search and analysis |
This practice describes how to use the federation proxy mechanism of Identity and Access Management (IAM) for custom identity broker and embed a login link to your systems so you can view LTS logs in your systems without logging in to the Huawei Cloud console. |
|
Log search and analysis |
This practice describes how to display query and analysis results on multiple pages. |
|
Log search and analysis |
This practice describes how to optimize regular expressions to improve parsing efficiency. |
|
Log transfer |
This practice describes how to use Python scripts and LTS APIs to implement custom operations in a batch. |
|
Log alarms |
Using Multi-Chart Query Results for Alarm Detection and Notification |
This practice describes how to use the query results of multiple charts to configure alarm rules. |
Billing |
Collecting Statistics on LTS Expenses of Different Departments Based on Log Stream Tags |
This practice describes how to collect statistics on the LTS expenses of different departments in an enterprise. You can add tags to LTS log streams to distinguish business departments. LTS will add these tags to CDRs sent to the Billing Center. |
Suggestions on LTS security configuration |
This section provides actionable guidance for enhancing the overall security of LTS. You can continuously evaluate the security of your LTS resources and enhance their overall defensive capabilities by combining different security capabilities provided by LTS. By doing this, data stored in LTS can be protected from leakage and tampering both at rest and in transit. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot