Product Advantages
-
With CTS, you can track operations on cloud services in your account. These operations include actions taken on console, API activities, and system calls. They are carefully recorded in detail so you can always find the information you need for troubleshooting or security analysis.
With CTS, you can track operations on cloud services in your account. These operations include actions taken on console, API activities, and system calls. They are carefully recorded in detail so you can always find the information you need for troubleshooting or security analysis.
-
Data integrity is key to compliance. In CTS, traces are transmitted and stored encrypted, and traces cannot be deleted or modified on the console or using APIs.
Data integrity is key to compliance. In CTS, traces are transmitted and stored encrypted, and traces cannot be deleted or modified on the console or using APIs.
-
Trace access is strictly controlled in a centralized manner. Only administrators can allocate permissions to access traces.
Trace access is strictly controlled in a centralized manner. Only administrators can allocate permissions to access traces.
-
With centralized, automated, and secure trace management, you can implement highly available and cost-effective IT governance.
With centralized, automated, and secure trace management, you can implement highly available and cost-effective IT governance.
Application Scenarios
Functions
-
CTS captures all operations on cloud resources in your account. You can have a complete view of actions made on consoles, API activities, and system calls.
CTS captures all operations on cloud resources in your account. You can have a complete view of actions made on consoles, API activities, and system calls.
-
By configuring trackers, you can transfer traces to OBS buckets, encrypt trace files, and set key event notifications.
By configuring trackers, you can transfer traces to OBS buckets, encrypt trace files, and set key event notifications.
-
You can search for traces by a set of filters, such as source, time, and operation type. You can also enable trace analysis to query traces in Log Tank Service (LTS).
You can search for traces by a set of filters, such as source, time, and operation type. You can also enable trace analysis to query traces in Log Tank Service (LTS).
-
Integration with Simple Message Notification (SMN) allows you to configure email and SMS notifications, so you will be alerted right away when critical events, such as ECS server creations or deletions, occur.
Integration with Simple Message Notification (SMN) allows you to configure email and SMS notifications, so you will be alerted right away when critical events, such as ECS server creations or deletions, occur.
-
You can control access to traces by encrypting trace files stored in OBS buckets using keys created in Data Encryption Workshop (DEW).
You can control access to traces by encrypting trace files stored in OBS buckets using keys created in Data Encryption Workshop (DEW).
-
Integrity verification is a simple way to make sure you can tell if traces have been tampered with.
Integrity verification is a simple way to make sure you can tell if traces have been tampered with.