Product Advantages

  • Full Coverage

    With CTS, you can track operations on cloud services in your account. These operations include actions taken on console, API activities, and system calls. They are carefully recorded in detail so you can always find the information you need for troubleshooting or security analysis.

    With CTS, you can track operations on cloud services in your account. These operations include actions taken on console, API activities, and system calls. They are carefully recorded in detail so you can always find the information you need for troubleshooting or security analysis.

  • Data Security

    Data integrity is key to compliance. In CTS, traces are transmitted and stored encrypted, and traces cannot be deleted or modified on the console or using APIs.

    Data integrity is key to compliance. In CTS, traces are transmitted and stored encrypted, and traces cannot be deleted or modified on the console or using APIs.

  • Access Security

    Trace access is strictly controlled in a centralized manner. Only administrators can allocate permissions to access traces.

    Trace access is strictly controlled in a centralized manner. Only administrators can allocate permissions to access traces.

  • Efficient Governance

    With centralized, automated, and secure trace management, you can implement highly available and cost-effective IT governance.

    With centralized, automated, and secure trace management, you can implement highly available and cost-effective IT governance.

Application Scenarios

Compliance Auditing

CTS provides a history of operation records, making it easy to comply with internal policies and regulatory standards.


Advantages

  • Compliance

    Traces are in a uniform format and conform to common standards.

  • Reliability

    Traces are encrypted when they are generated, transmitted, and stored.

  • Cost-effectiveness

    CTS itself is free, and helps you save money in terms of maintenance too, but storage will generate some fees. However, traces can be merged to reduce storage costs.

Related Services

Resource Tracking

Get a comprehensive history of changes made on cloud resources throughout their lifecycle.


Advantages

  • Real Time

    Changes are recorded in real time. You can search for records and get results in seconds. You can also configure email or SMS notifications for certain operations.

  • Integrity

    All console and API operations are recorded. Any alteration to trace files can be detected by integrity verification.

  • Reliability

    Traces are encrypted when they are generated, transmitted, and stored.

Related Services

Fault Locating

If a fault occurs, you can use filters to quickly search for unusual operations. This accelerates troubleshooting and reduces manpower requirements.


Advantages

  • Multi-filters

    You can search for traces by combining multiple filters.

  • Full Details

    Traces contain necessary details about operations and are in a unified format, so you can quickly find whatever information you want.

  • Efficiency

    The search UI makes it easy to search for traces and gives you instant results.

Related Services

Security Analysis

Each trace records details on an operation. You can identify when an action was performed by which user, and the IP address from which a request was sent. This helps you detect unauthorized activities and analyze resource changes.


Advantages

  • Real Time

    Operations are recorded accurately and in real time. You can query traces at any time.

  • Full Coverage

    All operations are captured regardless of if they were performed on the console or triggered by an API.

  • Reliability

    Traces are encrypted when they are generated, transmitted, and stored.

Related Services

Functions

  • Real-Time Tracking

    CTS captures all operations on cloud resources in your account. You can have a complete view of actions made on consoles, API activities, and system calls.

    CTS captures all operations on cloud resources in your account. You can have a complete view of actions made on consoles, API activities, and system calls.

  • Tracker Management

    By configuring trackers, you can transfer traces to OBS buckets, encrypt trace files, and set key event notifications.

    By configuring trackers, you can transfer traces to OBS buckets, encrypt trace files, and set key event notifications.

  • Trace Search and Query

    You can search for traces by a set of filters, such as source, time, and operation type. You can also enable trace analysis to query traces in Log Tank Service (LTS).

    You can search for traces by a set of filters, such as source, time, and operation type. You can also enable trace analysis to query traces in Log Tank Service (LTS).

  • Key Event Notifications

    Integration with Simple Message Notification (SMN) allows you to configure email and SMS notifications, so you will be alerted right away when critical events, such as ECS server creations or deletions, occur.

    Integration with Simple Message Notification (SMN) allows you to configure email and SMS notifications, so you will be alerted right away when critical events, such as ECS server creations or deletions, occur.

  • Encrypted Trace Storage

    You can control access to traces by encrypting trace files stored in OBS buckets using keys created in Data Encryption Workshop (DEW).

    You can control access to traces by encrypting trace files stored in OBS buckets using keys created in Data Encryption Workshop (DEW).

  • Trace Integrity Verification

    Integrity verification is a simple way to make sure you can tell if traces have been tampered with.

    Integrity verification is a simple way to make sure you can tell if traces have been tampered with.

Sign up and start an amazing cloud journey

Try Free