Product Advantages

  • Full Recording

    CTS records operations on cloud resources in real time. It covers most HUAWEI CLOUD services and all operations performed by calling APIs, recording complete information.
    CTS records operations on cloud resources in real time. It covers most HUAWEI CLOUD services and all operations performed by calling APIs, recording complete information.
  • Access Security

    System administrators allocate trace access permissions. Therefore, traces are managed in a centralized and strict way, minimizing unauthorized operations.
    System administrators allocate trace access permissions. Therefore, traces are managed in a centralized and strict way, minimizing unauthorized operations.
  • Data Security

    Traces are stored and transmitted using SSL encryption, and no function or interface for modifying or deleting traces is available. All these ensure data accuracy.
    Traces are stored and transmitted using SSL encryption, and no function or interface for modifying or deleting traces is available. All these ensure data accuracy.
  • Efficient Governance

    Traces enable highly available and low-cost IT governance based on centralized management, automatic collection, and secure governance.
    Traces enable highly available and low-cost IT governance based on centralized management, automatic collection, and secure governance.

Application Scenarios

  • Compliance Auditing

  • Resource Tracking

  • Fault Locating

  • Security Analysis

Compliance Auditing

Compliance Auditing

CTS provides a history of operation records, making it easy to comply with internal policies and regulatory standards. It also allows you to meet the requirements for IT compliance certification.

Advantages

Compliance
Traces are in a uniform format, and they conform to common standards.
Reliability
All traces are encrypted when they are generated, transmitted, and stored.
Low Cost
CTS can be enabled with a single click and requires no maintenance. It consolidates operation records for storage, which is cost-effective.

Related Services

Resource Tracking

Resource Tracking

CTS records and allows querying all operations on cloud resources throughout their lifecycle.

Advantages

Real Time
CTS records operations in real time and sends email or SMS message notifications when key operations are performed.
Integrity
Transferred traces can be verified against intentional alterations or deletions, ensuring accuracy and reliability of logs used for auditing.
Reliability
All traces are encrypted when they are generated, transmitted, and stored.

Related Services

Fault Locating

Fault Locating

When cloud resources become faulty, you can use filters to search for suspicious operations. This significantly shortens the time for locating faults and reduces labor costs.

Advantages

Real Time
CTS records operations in real time and permits multi-dimensional filtering of search results.
Comprehensiveness
Traces are in a uniform format and contain all necessary information.
High Efficiency
The visualized management console makes it easy to search for operations using one or more filters.

Related Services

Security Analysis

Security Analysis

CTS traces record the operator, time, and IP address of each operation, helping you better perform security analysis. Email or SMS text notifications can also be enabled to alert users to any key operations.

Advantages

Real Time
CTS records and allows you to query operations in real time. This ensures that the data is accurate and facilitates data analysis.
Integrity
Transferred traces can be verified against intentional alterations or deletions, ensuring accuracy and reliability of logs used for auditing.
Reliability
All traces are encrypted when they are generated, transmitted, and stored.

Related Services

Functions

  • Trace Recording

    CTS tracks and records operations on cloud resources from the management console, APIs, and system calls.
    CTS tracks and records operations on cloud resources from the management console, APIs, and system calls.
  • Tracker Management

    CTS can be enabled by creating a tracker to dump and encrypt traces and send notifications pertaining to key events.
    CTS can be enabled by creating a tracker to dump and encrypt traces and send notifications pertaining to key events.
  • Trace Querying

    CTS allows you to query traces by multiple filters. It also works with LTS to search for logs.
    CTS allows you to query traces by multiple filters. It also works with LTS to search for logs.
  • Notification Alerts

    CTS can alert users (via emails or SMS text) whenever key operations are made, for example, creating or deleting an ECS.
    CTS can alert users (via emails or SMS text) whenever key operations are made, for example, creating or deleting an ECS.
  • Encrypted Log Storage

    CTS works with DEW to encrypt traces before they are stored in OBS buckets, lowering the risk of unauthorized access.
    CTS works with DEW to encrypt traces before they are stored in OBS buckets, lowering the risk of unauthorized access.
  • Log Integrity Verification

    CTS verifies that traces are not tampered with or deleted to ensure accuracy and reliability of logs used for auditing.
    CTS verifies that traces are not tampered with or deleted to ensure accuracy and reliability of logs used for auditing.
Usage Guides

Provides Scalable, On-demand Computing Resources

Learn More