diff --git a/docs/cts/umn/.placeholder b/docs/cts/umn/.placeholder deleted file mode 100644 index e69de29b..00000000 diff --git a/docs/cts/umn/ALL_META.TXT.json b/docs/cts/umn/ALL_META.TXT.json index b15299da..1ae198f4 100644 --- a/docs/cts/umn/ALL_META.TXT.json +++ b/docs/cts/umn/ALL_META.TXT.json @@ -5,124 +5,74 @@ "code":"1", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Overview", - "title":"Overview", - "githuburl":"" - }, - { - "uri":"en-us_topic_0043877274.html", - "product_code":"cts", - "code":"2", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Concepts", - "title":"Concepts", + "kw":"Service Overview", + "title":"Service Overview", "githuburl":"" }, { "uri":"en-us_topic_0030594187.html", "product_code":"cts", - "code":"3", - "des":"Log audit is core to information security audit. It is an essential part of security risk control for information systems in enterprises and public sectors. As more infor", + "code":"2", + "des":"The log audit module is a core component necessary for information security audit and an important part for the information systems of enterprises and public institutions", "doc_type":"usermanual", - "kw":"CTS,Concepts,CTS User Guide", - "title":"CTS", + "kw":"What Is Cloud Trace Service,Service Overview,User Guide", + "title":"What Is Cloud Trace Service", "githuburl":"" }, { - "uri":"en-us_topic_0043877275.html", + "uri":"en-us_topic_0030598498.html", + "product_code":"cts", + "code":"3", + "des":"When you enable CTS for the first time, a management tracker named system is created automatically.Th management tracker identifies and associates with all cloud services", + "doc_type":"usermanual", + "kw":"Basic Concepts,Service Overview,User Guide", + "title":"Basic Concepts", + "githuburl":"" + }, + { + "uri":"cts_01_0003.html", "product_code":"cts", "code":"4", - "des":"Before using CTS, you need to enable it. A tracker will be created automatically when CTS is enabled. The tracker will identify and associate with all cloud services used", + "des":"CTS connects to other cloud services on the cloud platform, records operations on cloud resources and the results, and stores these records in the form of trace files to ", "doc_type":"usermanual", - "kw":"Tracker,Concepts,CTS User Guide", - "title":"Tracker", + "kw":"How CTS Functions,Service Overview,User Guide", + "title":"How CTS Functions", "githuburl":"" }, { - "uri":"en-us_topic_0043877276.html", + "uri":"cts_01_0004.html", "product_code":"cts", "code":"5", - "des":"Traces, also referred to as management traces, are operation records of cloud services tracked by CTS. You can view traces to check what operations were performed, who st", + "des":"CTS can be used in the following four scenarios.CTS helps you obtain certifications for auditing in industry standards, such as PCI DSS and ISO 27001, for your service sy", "doc_type":"usermanual", - "kw":"Trace,Concepts,CTS User Guide", - "title":"Trace", - "githuburl":"" - }, - { - "uri":"en-us_topic_0043877277.html", - "product_code":"cts", - "code":"6", - "des":"The trace list displays traces generated in the last seven days. You can view the trace list to check details of operations on cloud service resources, including creation", - "doc_type":"usermanual", - "kw":"Trace List,Concepts,CTS User Guide", - "title":"Trace List", - "githuburl":"" - }, - { - "uri":"en-us_topic_0043877298.html", - "product_code":"cts", - "code":"7", - "des":"A trace file is a collection of traces and is in JSON format. CTS generates trace files based on services and transfer periods. Then the trace files are transferred to sp", - "doc_type":"usermanual", - "kw":"Trace File,Concepts,CTS User Guide", - "title":"Trace File", - "githuburl":"" - }, - { - "uri":"en-us_topic_0071359470.html", - "product_code":"cts", - "code":"8", - "des":"A region refers to a geographic area where the server for installing CTS is located. Availability zones (AZs) in the same geographic area can communicate with each other ", - "doc_type":"usermanual", - "kw":"Region,Concepts,CTS User Guide", - "title":"Region", - "githuburl":"" - }, - { - "uri":"en-us_topic_0071359471.html", - "product_code":"cts", - "code":"9", - "des":"A project is used to group and isolate resources, including computing, storage, and network resources. Multiple projects can be created by a tenant, and a project can be ", - "doc_type":"usermanual", - "kw":"Project,Concepts,CTS User Guide", - "title":"Project", - "githuburl":"" - }, - { - "uri":"en-us_topic_0043877299.html", - "product_code":"cts", - "code":"10", - "des":"CTS directly connects to other cloud services, records operations on the cloud resources and the results, and stores these records in the form of trace files to OBS bucke", - "doc_type":"usermanual", - "kw":"Working Principle,Overview,CTS User Guide", - "title":"Working Principle", - "githuburl":"" - }, - { - "uri":"en-us_topic_0043877300.html", - "product_code":"cts", - "code":"11", - "des":"CTS is used in the following scenarios:Compliance auditCTS tracks operations and allows you to query the records. This is essential for organizations, especially financia", - "doc_type":"usermanual", - "kw":"Application Scenarios,Overview,CTS User Guide", + "kw":"Application Scenarios,Service Overview,User Guide", "title":"Application Scenarios", "githuburl":"" }, { - "uri":"en-us_topic_0100236044.html", + "uri":"cts_01_0005.html", "product_code":"cts", - "code":"12", - "des":"Once you enable CTS, the system automatically identifies cloud services enabled on the cloud platform, captures key operations on the services, and reports audit logs of ", + "code":"6", + "des":"You can use the basic functions of CTS for free, including enabling a tracker, tracking traces, as well as storing and querying traces of the last seven days. In addition", "doc_type":"usermanual", - "kw":"Supported Services,Overview,CTS User Guide", - "title":"Supported Services", + "kw":"Billing,Service Overview,User Guide", + "title":"Billing", + "githuburl":"" + }, + { + "uri":"cts_01_0006.html", + "product_code":"cts", + "code":"7", + "des":"You can use Identity and Access Management (IAM) to manage CTS permissions and control access to your resources. IAM provides identity authentication, permissions managem", + "doc_type":"usermanual", + "kw":"Permissions Management,Service Overview,User Guide", + "title":"Permissions Management", "githuburl":"" }, { "uri":"en-us_topic_0030581457.html", "product_code":"cts", - "code":"13", + "code":"8", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Getting Started", @@ -130,79 +80,149 @@ "githuburl":"" }, { - "uri":"en-us_topic_0030598498.html", + "uri":"cts_02_0001.html", "product_code":"cts", - "code":"14", - "des":"You need to enable CTS before using it. A tracker is automatically created when CTS is enabled. All traces recorded by CTS are associated with the tracker. Currently, onl", + "code":"9", + "des":"You need to enable Cloud Trace Service (CTS) before using it. A management tracker named system is automatically created when CTS is enabled. All traces recorded by CTS a", "doc_type":"usermanual", - "kw":"Enabling CTS,Getting Started,CTS User Guide", + "kw":"Enabling CTS,Getting Started,User Guide", "title":"Enabling CTS", "githuburl":"" }, { "uri":"en-us_topic_0030598499.html", "product_code":"cts", - "code":"15", - "des":"When you enable CTS, the system starts recording operations on cloud resources. Operation records of the last seven days are stored on the CTS console.This section descri", + "code":"10", + "des":"After CTS is enabled, the tracker starts recording operations on cloud resources. CTS stores operation records for the last seven days.This section describes how to query", "doc_type":"usermanual", - "kw":"Querying Traces on the CTS Console,Getting Started,CTS User Guide", - "title":"Querying Traces on the CTS Console", + "kw":"Querying Real-Time Traces,Getting Started,User Guide", + "title":"Querying Real-Time Traces", "githuburl":"" }, { - "uri":"en-us_topic_0030598636.html", + "uri":"cts_02_0003.html", "product_code":"cts", - "code":"16", - "des":"CTS periodically compresses recorded traces into trace files and delivers them to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on ", + "code":"11", + "des":"CTS periodically sends trace files to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on services and transfer cycle, and adjusts the", "doc_type":"usermanual", - "kw":"Querying Archived Traces,Getting Started,CTS User Guide", + "kw":"Querying Archived Traces,Getting Started,User Guide", "title":"Querying Archived Traces", "githuburl":"" }, { - "uri":"en-us_cts_01_0001.html", + "uri":"cts_01_00011.html", "product_code":"cts", - "code":"17", - "des":"You can configure key event notifications on CTS so that Simple Message Notification (SMN) can send messages to notify you of key operations. This function is triggered b", + "code":"12", + "des":"You can create key event notifications on CTS so that Simple Message Notification (SMN) sends you notifications of key events. This function is triggered by CTS, and noti", "doc_type":"usermanual", - "kw":"Configuring Key Event Notifications,Getting Started,CTS User Guide", + "kw":"Configuring Key Event Notifications,Getting Started,User Guide", "title":"Configuring Key Event Notifications", "githuburl":"" }, { "uri":"en-us_topic_0030628003.html", "product_code":"cts", - "code":"18", + "code":"13", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Managing a Tracker", - "title":"Managing a Tracker", + "kw":"User Guide", + "title":"User Guide", "githuburl":"" }, { - "uri":"en-us_topic_0059288681.html", + "uri":"cts_031_001.html", + "product_code":"cts", + "code":"14", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Permissions Management", + "title":"Permissions Management", + "githuburl":"" + }, + { + "uri":"cts_031_002.html", + "product_code":"cts", + "code":"15", + "des":"For fine-grained management of CTS permissions, you can use Identity and Access Management (IAM). With IAM, you can:Create IAM users for employees based on your enterpris", + "doc_type":"usermanual", + "kw":"Creating a User and Granting Permissions,Permissions Management,User Guide", + "title":"Creating a User and Granting Permissions", + "githuburl":"" + }, + { + "uri":"cts_031_003.html", + "product_code":"cts", + "code":"16", + "des":"Custom policies can be created to supplement the system-defined policies of CTS. For the actions supported for custom policies, see \"Permissions Policies and Supported Ac", + "doc_type":"usermanual", + "kw":"Custom Policies,Permissions Management,User Guide", + "title":"Custom Policies", + "githuburl":"" + }, + { + "uri":"cts_03_01436.html", + "product_code":"cts", + "code":"17", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Trace Management", + "title":"Trace Management", + "githuburl":"" + }, + { + "uri":"cts_02_0005.html", + "product_code":"cts", + "code":"18", + "des":"After CTS is enabled, the tracker starts recording operations on cloud resources. CTS stores operation records for the last seven days.This section describes how to query", + "doc_type":"usermanual", + "kw":"Querying Real-Time Traces,Trace Management,User Guide", + "title":"Querying Real-Time Traces", + "githuburl":"" + }, + { + "uri":"cts_02_0006.html", "product_code":"cts", "code":"19", - "des":"You can configure parameters in the Transfer to OBS area for a created tracker on the Configure Tracker page.If you configure an OBS bucket for a tracker, CTS automatical", + "des":"CTS periodically sends trace files to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on services and transfer cycle, and adjusts the", "doc_type":"usermanual", - "kw":"Configuring a Tracker,Managing a Tracker,CTS User Guide", + "kw":"Querying Archived Traces,Trace Management,User Guide", + "title":"Querying Archived Traces", + "githuburl":"" + }, + { + "uri":"cts_03_0000.html", + "product_code":"cts", + "code":"20", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Tracker Management", + "title":"Tracker Management", + "githuburl":"" + }, + { + "uri":"cts_03_0002.html", + "product_code":"cts", + "code":"21", + "des":"You can configure the file prefix of trackers on the CTS console no matter whether the trackers are enabled or not. For enabled trackers, you can also configure OBS bucke", + "doc_type":"usermanual", + "kw":"Configuring a Tracker,Tracker Management,User Guide", "title":"Configuring a Tracker", "githuburl":"" }, { - "uri":"en-us_topic_0030930181.html", + "uri":"cts_03_0003.html", "product_code":"cts", - "code":"20", - "des":"This section describes how to disable or enable a tracker on the CTS console. After a tracker is disabled, it will stop recording operations, but you can still view opera", + "code":"22", + "des":"You can disable a tracker on the CTS console. After a tracker is disabled, it will stop recording operations, but you can still view operation records that have been coll", "doc_type":"usermanual", - "kw":"Disabling or Enabling a Tracker,Managing a Tracker,CTS User Guide", + "kw":"Disabling or Enabling a Tracker,Tracker Management,User Guide", "title":"Disabling or Enabling a Tracker", "githuburl":"" }, { - "uri":"en-us_topic_0043371376.html", + "uri":"cts_03_0005.html", "product_code":"cts", - "code":"21", + "code":"23", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Application Examples", @@ -210,39 +230,39 @@ "githuburl":"" }, { - "uri":"en-us_topic_0043371377.html", + "uri":"cts_03_0006.html", "product_code":"cts", - "code":"22", + "code":"24", "des":"You can query operation records matching specified conditions and check whether operations have been performed by authorized users for security analysis.You have enabled ", "doc_type":"usermanual", - "kw":"Security Auditing,Application Examples,CTS User Guide", + "kw":"Security Auditing,Application Examples,User Guide", "title":"Security Auditing", "githuburl":"" }, { - "uri":"en-us_topic_0043371379.html", + "uri":"cts_03_0007.html", "product_code":"cts", - "code":"23", - "des":"If a resource or an action encounters an exception, you can query operation records for the resource or action in a specified time period and view the requests and respon", + "code":"25", + "des":"If a resource or an action encounters an exception, you can query operation records of the resource or action in a specified time period and view the requests and respons", "doc_type":"usermanual", - "kw":"Fault Locating,Application Examples,CTS User Guide", + "kw":"Fault Locating,Application Examples,User Guide", "title":"Fault Locating", "githuburl":"" }, { - "uri":"en-us_topic_0043371378.html", + "uri":"cts_03_0008.html", "product_code":"cts", - "code":"24", - "des":"You can view operation records of a cloud resource throughout its lifecycle.You have enabled CTS and the tracker is running properly. For details on how to enable CTS, se", + "code":"26", + "des":"You can view operation records of a cloud resource throughout its lifecycle.You have enabled CTS and trackers are running properly.The following takes the records of all ", "doc_type":"usermanual", - "kw":"Resource Tracking,Application Examples,CTS User Guide", + "kw":"Resource Tracking,Application Examples,User Guide", "title":"Resource Tracking", "githuburl":"" }, { - "uri":"en-us_topic_0030581459.html", + "uri":"cts_03_0009.html", "product_code":"cts", - "code":"25", + "code":"27", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Trace References", @@ -250,652 +270,212 @@ "githuburl":"" }, { - "uri":"en-us_topic_0030598500.html", + "uri":"cts_03_0010.html", "product_code":"cts", - "code":"26", - "des":"Multiple key fields are included in CTS traces, as shown in Table 1.Formats of some fields displayed on the management console are optimized for easy understanding.This s", + "code":"28", + "des":"A trace consists of multiple key fields shown in Table 1.This section describes the key trace fields displayed on the CTS console.When some fields are displayed on the CT", "doc_type":"usermanual", - "kw":"Trace Structure,Trace References,CTS User Guide", + "kw":"Trace Structure,Trace References,User Guide", "title":"Trace Structure", "githuburl":"" }, { - "uri":"en-us_topic_0044019595.html", + "uri":"cts_03_0011.html", "product_code":"cts", - "code":"27", + "code":"29", "des":"This section provides two example traces and describes their key fields to help you better understand traces. You can read other traces in a similar way as shown below.Fo", "doc_type":"usermanual", - "kw":"Example Traces,Trace References,CTS User Guide", + "kw":"Example Traces,Trace References,User Guide", "title":"Example Traces", "githuburl":"" }, { - "uri":"en-us_topic_0100236045.html", - "product_code":"cts", - "code":"28", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Supported Services and Operation Lists", - "title":"Supported Services and Operation Lists", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139646.html", - "product_code":"cts", - "code":"29", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Computing", - "title":"Computing", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100236046.html", + "uri":"cts_03_0021_01.html", "product_code":"cts", "code":"30", - "des":"An ECS is a computing server that consists of CPUs, memory, images, and EVS disks and allows on-demand allocation and elastic scaling. ECS integrates VPC, virtual firewal", + "des":"Cloud Trace Service (CTS) provides records of operations performed on cloud service resources.With CTS, you can record operations associated with CTS itself for later que", "doc_type":"usermanual", - "kw":"Key Operations on ECS,Computing,CTS User Guide", - "title":"Key Operations on ECS", + "kw":"Auditing,User Guide,User Guide", + "title":"Auditing", "githuburl":"" }, { - "uri":"en-us_topic_0100236047.html", + "uri":"cts_03_0300.html", "product_code":"cts", "code":"31", - "des":"IMS provides easy-to-use and self-service image management. You can use a public or private image to create an ECS. You can also create a private image using an existing ", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Key Operations on IMS,Computing,CTS User Guide", - "title":"Key Operations on IMS", + "kw":"Supported Services and Operations,User Guide,User Guide", + "title":"Supported Services and Operations", "githuburl":"" }, { - "uri":"en-us_topic_0100236048.html", + "uri":"en-us_topic_0000001410799284.html", "product_code":"cts", "code":"32", - "des":"A Bare Metal Server (BMS) is a physical server dedicated for individual tenants. It provides remarkable compute performance and stability for running key applications. Th", - "doc_type":"usermanual", - "kw":"Key Operations on BMS,Computing,CTS User Guide", - "title":"Key Operations on BMS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273723.html", - "product_code":"cts", - "code":"33", - "des":"Cloud Container Engine (CCE) is a high-performance, high-reliability service through which enterprises can manage containerized applications. CCE supports native Kubernet", - "doc_type":"usermanual", - "kw":"Key Operations on CCE,Computing,CTS User Guide", - "title":"Key Operations on CCE", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100236049.html", - "product_code":"cts", - "code":"34", - "des":"Auto Scaling (AS) is a service that automatically adjusts computing resources based on your requirements and configured AS policies to ensure proper service running.With ", - "doc_type":"usermanual", - "kw":"Key Operations on AS,Computing,CTS User Guide", - "title":"Key Operations on AS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100363619.html", - "product_code":"cts", - "code":"35", - "des":"Dedicated Host (DeH) is a service that provides dedicated physical hosts. You can create ECSs on a DeH to enhance isolation, security, and performance of your ECSs. When ", - "doc_type":"usermanual", - "kw":"Key Operations on DeH,Computing,CTS User Guide", - "title":"Key Operations on DeH", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139647.html", - "product_code":"cts", - "code":"36", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Storage", - "title":"Storage", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273717.html", - "product_code":"cts", - "code":"37", - "des":"OBS is a stable, secure, efficient, and easy-to-use cloud storage service. With the Representational State Transfer (REST) application programming interface (API), OBS is", - "doc_type":"usermanual", - "kw":"Key Operations on OBS,Storage,CTS User Guide", - "title":"Key Operations on OBS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273731.html", - "product_code":"cts", - "code":"38", - "des":"An EVS disk is a virtual block storage service that is based on distributed architecture and can elastically scale up and down. EVS disks can be operated online. Using th", - "doc_type":"usermanual", - "kw":"Key Operations on EVS,Storage,CTS User Guide", - "title":"Key Operations on EVS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0000001317721642.html", - "product_code":"", - "code":"39", - "des":"Cloud Backup and Recovery (CBR) backup for Elastic Volume Service (EVS), Elastic Cloud Server (ECS), and Bare Metal Server (BMS), ensuring data security and correctness a", - "doc_type":"", - "kw":"Key Operations on CBR,Storage,CTS User Guide", - "title":"Key Operations on CBR", - "githuburl":"" - }, - { - "uri":"en-us_cts_01_0002.html", - "product_code":"cts", - "code":"40", - "des":"Storage Disaster Recovery Service (SDRS) provides disaster recovery (DR) services for many cloud services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS", - "doc_type":"usermanual", - "kw":"Key Operations on SDRS,Storage,CTS User Guide", - "title":"Key Operations on SDRS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139648.html", - "product_code":"cts", - "code":"41", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Network", - "title":"Network", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273725.html", - "product_code":"cts", - "code":"42", - "des":"VPC enables you to provision logically isolated, configurable, and manageable virtual networks for ECSs, improving the security of resources in enterprise clouds and simp", - "doc_type":"usermanual", - "kw":"Key Operations on VPC,Network,CTS User Guide", - "title":"Key Operations on VPC", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273726.html", - "product_code":"cts", - "code":"43", - "des":"Direct Connect (DC) allows you to establish a private, dedicated network connection from your data center, office, or collocation environment to the cloud platform. It re", - "doc_type":"usermanual", - "kw":"Key Operations on DC,Network,CTS User Guide", - "title":"Key Operations on DC", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273727.html", - "product_code":"cts", - "code":"44", - "des":"Elastic Load Balancing (ELB) is a service that automatically distributes access traffic to multiple ECSs to balance their service load. ELB enables you to achieve higher ", - "doc_type":"usermanual", - "kw":"Key Operations on ELB,Network,CTS User Guide", - "title":"Key Operations on ELB", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273730.html", - "product_code":"cts", - "code":"45", - "des":"Domain Name Service (DNS) provides highly available and scalable authoritative DNS services and domain name management services. It translates domain names or application", - "doc_type":"usermanual", - "kw":"Key Operations on DNS,Network,CTS User Guide", - "title":"Key Operations on DNS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0128329663.html", - "product_code":"cts", - "code":"46", - "des":"Content Delivery Network (CDN) is an intelligent virtual network layer based on the existing Internet infrastructure. It delivers network content from origin servers to e", - "doc_type":"usermanual", - "kw":"Key Operations on CDN,Network,CTS User Guide", - "title":"Key Operations on CDN", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139651.html", - "product_code":"cts", - "code":"47", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Management & Deployment", - "title":"Management & Deployment", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273718.html", - "product_code":"cts", - "code":"48", - "des":"CTS provides records of operations on cloud service resources. With CTS, you can query, audit, and backtrack these operations.With CTS, you can record operations associat", - "doc_type":"usermanual", - "kw":"Key Operations on CTS,Management & Deployment,CTS User Guide", - "title":"Key Operations on CTS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273719.html", - "product_code":"cts", - "code":"49", - "des":"Cloud Eye is an open monitoring platform. It provides monitoring, alarm reporting, and alarm notification for your resources in near-real time.With CTS, you can record op", - "doc_type":"usermanual", - "kw":"Key Operations on Cloud Eye,Management & Deployment,CTS User Guide", - "title":"Key Operations on Cloud Eye", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100273720.html", - "product_code":"cts", - "code":"50", - "des":"IAM enables you to centrally manage authentication information, including your authenticated email, phone number, and password. When you invoke an API to apply for an ECS", - "doc_type":"usermanual", - "kw":"Key Operations on IAM,Management & Deployment,CTS User Guide", - "title":"Key Operations on IAM", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100291677.html", - "product_code":"cts", - "code":"51", - "des":"Tag Management Service (TMS) is a visualized service for fast, unified tag management that enables you to control your resource permissions and billing more efficiently. ", - "doc_type":"usermanual", - "kw":"Key Operations on TMS,Management & Deployment,CTS User Guide", - "title":"Key Operations on TMS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139652.html", - "product_code":"cts", - "code":"52", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Application", - "title":"Application", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100291678.html", - "product_code":"cts", - "code":"53", - "des":"Simple Message Notification (SMN) is a type of web service that a user can easily construct and maintain. SMN sends notifications from a cloud.With CTS, you can record op", - "doc_type":"usermanual", - "kw":"Key Operations on SMN,Application,CTS User Guide", - "title":"Key Operations on SMN", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100291679.html", - "product_code":"cts", - "code":"54", - "des":"Distributed Message Service (DMS) is a Kafka-based and high-performance message service that allows multi-user and concurrent access and message queue isolation.With CTS,", - "doc_type":"usermanual", - "kw":"Key Operations on DMS,Application,CTS User Guide", - "title":"Key Operations on DMS", - "githuburl":"" - }, - { - "uri":"cts_0827.html", - "product_code":"cts", - "code":"55", - "des":"Software Repository for Container (SWR) provides easy, secure, and reliable management of container images throughout their lifecycles, facilitating quick deployment of c", - "doc_type":"usermanual", - "kw":"Key Operations on SWR,Application,CTS User Guide", - "title":"Key Operations on SWR", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139653.html", - "product_code":"cts", - "code":"56", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Database", - "title":"Database", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100363624.html", - "product_code":"cts", - "code":"57", - "des":"Distributed Cache Service (DCS) is an online distributed database service that is based on the cloud computing platform, available immediately after it is enabled, stable", - "doc_type":"usermanual", - "kw":"Key Operations on DCS,Database,CTS User Guide", - "title":"Key Operations on DCS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100363625.html", - "product_code":"cts", - "code":"58", - "des":"Relational Database Service (RDS) is a cloud-based web service that is reliable, scalable, easy to manage, and immediately ready for use.With CTS, you can record operatio", - "doc_type":"usermanual", - "kw":"Key Operations on RDS,Database,CTS User Guide", - "title":"Key Operations on RDS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100363627.html", - "product_code":"cts", - "code":"59", - "des":"Document Database Service (DDS) is compatible with the MongoDB protocol and is secure, highly available, reliable, scalable, and easy to use. It provides DB instance crea", - "doc_type":"usermanual", - "kw":"Key Operations on DDS,Database,CTS User Guide", - "title":"Key Operations on DDS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100363626.html", - "product_code":"cts", - "code":"60", - "des":"Data Replication Service (DRS) is an easy-to-use, stable, and efficient cloud service used for database migration and synchronization. DRS makes data flow between databas", - "doc_type":"usermanual", - "kw":"Key Operations on DRS,Database,CTS User Guide", - "title":"Key Operations on DRS", - "githuburl":"" - }, - { - "uri":"en-us_cts_03_0011.html", - "product_code":"", - "code":"61", - "des":"GaussDB(for MySQL) is a MySQL-compatible, enterprise-class distributed database service.With CTS, you can record operations associated with GaussDB(for MySQL) for future ", - "doc_type":"", - "kw":"Key Operations on GaussDB(for MySQL),Database,CTS User Guide", - "title":"Key Operations on GaussDB(for MySQL)", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139655.html", - "product_code":"cts", - "code":"62", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Security", - "title":"Security", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100291685.html", - "product_code":"cts", - "code":"63", - "des":"Key Management Service (KMS) is a secure and reliable key hosting service used to provide central management of users' masker keys.With CTS, you can record operations ass", - "doc_type":"usermanual", - "kw":"Key Operations on KMS,Security,CTS User Guide", - "title":"Key Operations on KMS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100291686.html", - "product_code":"cts", - "code":"64", - "des":"Anti-DDoS is a network security service that defends IP addresses against distributed denial of service (DDoS) attacks.Anti-DDoS monitors traffic directed to specified IP", - "doc_type":"usermanual", - "kw":"Key Operations on Anti-DDoS,Security,CTS User Guide", - "title":"Key Operations on Anti-DDoS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100291690.html", - "product_code":"cts", - "code":"65", - "des":"Web Application Firewall (WAF) is designed to keep web services stable and secure in combination with years of experience in security protection. It examines all HTTP and", - "doc_type":"usermanual", - "kw":"Key Operations on WAF,Security,CTS User Guide", - "title":"Key Operations on WAF", - "githuburl":"" - }, - { - "uri":"en-us_topic_0127139658.html", - "product_code":"cts", - "code":"66", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Data Analysis", - "title":"Data Analysis", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100363631.html", - "product_code":"cts", - "code":"67", - "des":"MapReduce Service (MRS) is a data processing and analysis service that is based on a cloud computing platform. It is stable, reliable, scalable, and easy to manage.With C", - "doc_type":"usermanual", - "kw":"Key Operations on MRS,Data Analysis,CTS User Guide", - "title":"Key Operations on MRS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100498013.html", - "product_code":"cts", - "code":"68", - "des":"Data Warehouse Service (DWS) is an online data processing database based on the cloud infrastructure and platform and helps you mine and analyze massive data.With CTS, yo", - "doc_type":"usermanual", - "kw":"Key Operations on DWS,Data Analysis,CTS User Guide", - "title":"Key Operations on DWS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100365438.html", - "product_code":"cts", - "code":"69", - "des":"Data Ingestion Service (DIS) solves the problems of transmitting external data into cloud services. With DIS, you can build customized applications to process or analyze ", - "doc_type":"usermanual", - "kw":"Key Operations on DIS,Data Analysis,CTS User Guide", - "title":"Key Operations on DIS", - "githuburl":"" - }, - { - "uri":"en-us_topic_0101676084.html", - "product_code":"cts", - "code":"70", - "des":"Cloud Search Service (CSS) is a fully hosted distributed search engine service based on the cloud infrastructure and platform. It provides structured and unstructured tex", - "doc_type":"usermanual", - "kw":"Key Operations on CSS,Data Analysis,CTS User Guide", - "title":"Key Operations on CSS", - "githuburl":"" - }, - { - "uri":"en-us_cts_03_0012.html", - "product_code":"", - "code":"71", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", - "kw":"Enterprise Intelligence", - "title":"Enterprise Intelligence", - "githuburl":"" - }, - { - "uri":"en-us_cts_03_0013.html", - "product_code":"", - "code":"72", - "des":"ModelArts is a one-stop development platform for AI developers. With data preprocessing, semi-automated data labeling, distributed training, automated model building, and", - "doc_type":"", - "kw":"Key Operations on ModelArts,Enterprise Intelligence,CTS User Guide", - "title":"Key Operations on ModelArts", - "githuburl":"" - }, - { - "uri":"en-us_topic_0100366885.html", - "product_code":"cts", - "code":"73", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Relationship Between Operations Triggered by IaaS OpenStack and Native OpenStack APIs,Supported Serv", - "title":"Relationship Between Operations Triggered by IaaS OpenStack and Native OpenStack APIs", - "githuburl":"" - }, - { - "uri":"en-us_topic_0030932518.html", - "product_code":"cts", - "code":"74", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"FAQs", "title":"FAQs", "githuburl":"" }, + { + "uri":"cts_faq_0040.html", + "product_code":"cts", + "code":"33", + "des":"No. You only need to ensure that you have the permissions for OBS buckets.", + "doc_type":"usermanual", + "kw":"Must I Use an IAM User (Sub Account) to Configure Transfer on CTS and Perform Operations on an OBS B", + "title":"Must I Use an IAM User (Sub Account) to Configure Transfer on CTS and Perform Operations on an OBS Bucket?", + "githuburl":"" + }, + { + "uri":"cts_faq_004.html", + "product_code":"cts", + "code":"34", + "des":"If your account is in arrears, CTS can still receive operation records from supported services, but the records can only be retained for 7 days. In most cases, records ca", + "doc_type":"usermanual", + "kw":"How Will CTS Be Affected If My Account Is in Arrears?,FAQs,User Guide", + "title":"How Will CTS Be Affected If My Account Is in Arrears?", + "githuburl":"" + }, { "uri":"cts_faq_001.html", "product_code":"cts", - "code":"75", - "des":"Currently, only one tracker can be created for each tenant.", + "code":"35", + "des":"It is highly recommended that cloud users should enable CTS.CTS is core to information security audit. It is an essential part of security risk control for information sy", "doc_type":"usermanual", - "kw":"Can I Create Multiple Trackers?,FAQs,CTS User Guide", - "title":"Can I Create Multiple Trackers?", - "githuburl":"" - }, - { - "uri":"cts_faq_002.html", - "product_code":"cts", - "code":"76", - "des":"The trace list displays details about operations, such as creation, configuration, and deletion of cloud service resources, in your account. The trace list does not recor", - "doc_type":"usermanual", - "kw":"Which Type of Information Is Displayed on the Trace List?,FAQs,CTS User Guide", - "title":"Which Type of Information Is Displayed on the Trace List?", - "githuburl":"" - }, - { - "uri":"cts_faq_003.html", - "product_code":"cts", - "code":"77", - "des":"No. Audit logs must be objective, complete, and accurate. Therefore, they cannot be deleted or modified.", - "doc_type":"usermanual", - "kw":"Can I Delete Traces from the Trace List?,FAQs,CTS User Guide", - "title":"Can I Delete Traces from the Trace List?", - "githuburl":"" - }, - { - "uri":"cts_faq_005.html", - "product_code":"cts", - "code":"78", - "des":"It is highly recommended that cloud users enable CTS.CTS is core to information security audit. It is an essential part of security risk control for information systems i", - "doc_type":"usermanual", - "kw":"What Are the Recommended Users of CTS?,FAQs,CTS User Guide", + "kw":"What Are the Recommended Users of CTS?,FAQs,User Guide", "title":"What Are the Recommended Users of CTS?", "githuburl":"" }, - { - "uri":"cts_faq_006.html", - "product_code":"cts", - "code":"79", - "des":"By default, trace files of the last seven days can be retained on the management console. Archived trace files stored in the OBS bucket can be permanently retained.", - "doc_type":"usermanual", - "kw":"How Long Can Trace Files Be Retained?,FAQs,CTS User Guide", - "title":"How Long Can Trace Files Be Retained?", - "githuburl":"" - }, { "uri":"cts_faq_007.html", "product_code":"cts", - "code":"80", - "des":"CTS will deliver trace files based on the existing OBS bucket policy. If the policy is incorrectly configured, CTS may not deliver trace files to the OBS bucket.If an OBS", + "code":"36", + "des":"CTS delivers trace files based on the OBS bucket policy. If the policy is configured incorrectly, trace files cannot be delivered.If an OBS bucket has been deleted or enc", "doc_type":"usermanual", - "kw":"What Will Happen If I Have Enabled CTS But Have Not Configured a Correct Policy for the OBS Bucket?,", - "title":"What Will Happen If I Have Enabled CTS But Have Not Configured a Correct Policy for the OBS Bucket?", + "kw":"What Will Happen If I Have Enabled Trace Transfer But Have Not Configured an Appropriate Policy for ", + "title":"What Will Happen If I Have Enabled Trace Transfer But Have Not Configured an Appropriate Policy for an OBS Bucket?", "githuburl":"" }, { - "uri":"cts_faq_009.html", + "uri":"cts_faq_008.html", "product_code":"cts", - "code":"81", - "des":"No. Enabling CTS does not affect the performance of other cloud resources.", + "code":"37", + "des":"Yes. The following fields must be included in trace files: time, service_type, resource_type, trace_name, trace_rating, and trace_type. Other fields can be added by the s", "doc_type":"usermanual", - "kw":"Will Performance of Other Cloud Service Resources Be Affected If I Enable CTS?,FAQs,CTS User Guide", - "title":"Will Performance of Other Cloud Service Resources Be Affected If I Enable CTS?", + "kw":"Does CTS Support Integrity Verification of Trace Files?,FAQs,User Guide", + "title":"Does CTS Support Integrity Verification of Trace Files?", "githuburl":"" }, { "uri":"cts_faq_010.html", "product_code":"cts", - "code":"82", - "des":"Fields resource_IP, code, request, response, and message can be null. These fields are not mandatory for CTS.resource_IP: If the value of trace_type is SystemAction, the ", + "code":"38", + "des":"Fields source_ip, code, request, response, and message can be null. These fields are not mandatory for CTS.source_ip: If the value of trace_type is SystemAction, the oper", "doc_type":"usermanual", - "kw":"Why Are Fields of Some Traces Displayed as Null on the View Trace Page?,FAQs,CTS User Guide", - "title":"Why Are Fields of Some Traces Displayed as Null on the View Trace Page?", - "githuburl":"" - }, - { - "uri":"cts_faq_011.html", - "product_code":"cts", - "code":"83", - "des":"For ECS, EVS, VBS, IMS, AS, Cloud Eye, and VPC, you can click Resource ID of some traces to go to the resource details page. The resource ID of such a trace is a hyperlin", - "doc_type":"usermanual", - "kw":"Why Are the Resource IDs of Some Traces in the Trace List Hyperlinks?,FAQs,CTS User Guide", - "title":"Why Are the Resource IDs of Some Traces in the Trace List Hyperlinks?", + "kw":"Why Are There Some Null Fields on the View Trace Page?,FAQs,User Guide", + "title":"Why Are There Some Null Fields on the View Trace Page?", "githuburl":"" }, { "uri":"cts_faq_012.html", "product_code":"cts", - "code":"84", - "des":"For an asynchronously invoked trace, two records with the same trace name, resource type, and resource name will be generated. The two records may seem to be the same. Ho", + "code":"39", + "des":"For an asynchronously invoked trace, such as deleteDesktop trace of Workspace, two records with the same trace name, resource type, and resource name will be generated. T", "doc_type":"usermanual", - "kw":"Why Is an Operation Recorded Twice in the Trace List?,FAQs,CTS User Guide", + "kw":"Why Is an Operation Recorded Twice in the Trace List?,FAQs,User Guide", "title":"Why Is an Operation Recorded Twice in the Trace List?", "githuburl":"" }, - { - "uri":"cts_faq_013.html", - "product_code":"cts", - "code":"85", - "des":"If you submit a request that calls operations requiring high permissions or calling of other services, you may not have the required permissions. In this case, your permi", - "doc_type":"usermanual", - "kw":"Why Are user_name and op_service Displayed When I Filter Traces by User?,FAQs,CTS User Guide", - "title":"Why Are user_name and op_service Displayed When I Filter Traces by User?", - "githuburl":"" - }, { "uri":"cts_faq_015.html", "product_code":"cts", - "code":"86", - "des":"Currently, CTS only sends notifications for some key operations on ECS, EVS, VPC, KMS, IAM, and native OpenStack. This feature currently supports creation, deletion, logi", + "code":"40", + "des":"CTS sends notifications of all key operations on services including ECS, EVS, VPC, DEW, native OpenStack, and IAM. These operations include creation, deletion, login, and", "doc_type":"usermanual", - "kw":"What Services Are Supported for Key Event Notification?,FAQs,CTS User Guide", - "title":"What Services Are Supported for Key Event Notification?", + "kw":"What Services Are Supported by Key Event Notifications?,FAQs,User Guide", + "title":"What Services Are Supported by Key Event Notifications?", "githuburl":"" }, { "uri":"cts_faq_017.html", "product_code":"cts", - "code":"87", - "des":"OBS provides three storage classes of buckets for storage, respectively standard access, infrequent access, or archive. You must select a standard OBS bucket because CTS ", + "code":"41", + "des":"CTS only retains traces for seven days. To store traces for a long time, configure your tracker to transfer traces to OBS buckets. For details, see Configuring a Tracker.", "doc_type":"usermanual", - "kw":"Which Type of OBS Buckets Is Suitable for CTS to Store Traces?,FAQs,CTS User Guide", - "title":"Which Type of OBS Buckets Is Suitable for CTS to Store Traces?", + "kw":"How Can I Store Trace Files for a Long Time?,FAQs,User Guide", + "title":"How Can I Store Trace Files for a Long Time?", "githuburl":"" }, { - "uri":"cts_faq_019.html", + "uri":"cts_faq_005.html", "product_code":"cts", - "code":"88", - "des":"The trace_type field indicates the request resource. This field can be ConsoleAction, ApiCall, and SystemAction.SystemAction indicates that the operations are not trigger", + "code":"42", + "des":"The trace_type field indicates the request source. This field can be ConsoleAction, ApiCall, and SystemAction.SystemAction indicates operations that are not triggered by ", "doc_type":"usermanual", - "kw":"Why Are user and source_ip Empty for Some Traces with trace_type as systemAction?,FAQs,CTS User Guid", - "title":"Why Are user and source_ip Empty for Some Traces with trace_type as systemAction?", + "kw":"Why Are user and source_ip Null for Some Traces with trace_type as SystemAction?,FAQs,User Guide", + "title":"Why Are user and source_ip Null for Some Traces with trace_type as SystemAction?", "githuburl":"" }, { - "uri":"cts_faq_020.html", + "uri":"cts_faq_0912.html", "product_code":"cts", - "code":"89", - "des":"The trace status is defined based on trace_status information recorded in a trace. Different fields have different meanings as follows:normal: indicates that this operati", + "code":"43", + "des":"To identify the user who created a specific ECS, you can view traces recorded by CTS.You have enabled CTS.You have obtained the resource ID of the ECS.Log in to the CTS c", "doc_type":"usermanual", - "kw":"What Are the Meanings of the Three Trace Statuses?,FAQs,CTS User Guide", - "title":"What Are the Meanings of the Three Trace Statuses?", + "kw":"How Can I Find Out Who Created a Specific ECS?,FAQs,User Guide", + "title":"How Can I Find Out Who Created a Specific ECS?", + "githuburl":"" + }, + { + "uri":"cts_faq_0913.html", + "product_code":"cts", + "code":"44", + "des":"If you want to check if there are security risks in your account by examining the login IP addresses and login time of IAM users, you can view traces recorded by CTS.You ", + "doc_type":"usermanual", + "kw":"How Can I Find Out the Login IP Address of an IAM User?,FAQs,User Guide", + "title":"How Can I Find Out the Login IP Address of an IAM User?", + "githuburl":"" + }, + { + "uri":"cts_faq_0915.html", + "product_code":"cts", + "code":"45", + "des":"During ECS creation, metadata is used to store temporary information. When the creation is finished, the information is automatically deleted. Thus, two traces named dele", + "doc_type":"usermanual", + "kw":"Why Are Two deleteMetadata Traces Generated When I Buy an ECS?,FAQs,User Guide", + "title":"Why Are Two deleteMetadata Traces Generated When I Buy an ECS?", + "githuburl":"" + }, + { + "uri":"cts_faq_0918.html", + "product_code":"cts", + "code":"46", + "des":"Traces cannot be queried on the CTS console.", + "doc_type":"usermanual", + "kw":"What Can I Do If I Cannot Query Traces?,FAQs,User Guide", + "title":"What Can I Do If I Cannot Query Traces?", + "githuburl":"" + }, + { + "uri":"cts_faq_0919.html", + "product_code":"cts", + "code":"47", + "des":"You can use the basic functions of CTS for free, including enabling a tracker, tracking traces, as well as storing and querying traces of the last seven days. Only value-", + "doc_type":"usermanual", + "kw":"Can I Disable CTS?,FAQs,User Guide", + "title":"Can I Disable CTS?", "githuburl":"" }, { "uri":"en-us_topic_0045053541.html", "product_code":"cts", - "code":"90", + "code":"48", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Change History,CTS User Guide", + "kw":"Change History,User Guide", "title":"Change History", "githuburl":"" } diff --git a/docs/cts/umn/CLASS.TXT.json b/docs/cts/umn/CLASS.TXT.json index d19ca6e0..6e85c5ef 100644 --- a/docs/cts/umn/CLASS.TXT.json +++ b/docs/cts/umn/CLASS.TXT.json @@ -2,111 +2,66 @@ { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", - "title":"Overview", + "title":"Service Overview", "uri":"en-us_topic_0030579718.html", "doc_type":"usermanual", "p_code":"", "code":"1" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "desc":"The log audit module is a core component necessary for information security audit and an important part for the information systems of enterprises and public institutions", "product_code":"cts", - "title":"Concepts", - "uri":"en-us_topic_0043877274.html", + "title":"What Is Cloud Trace Service", + "uri":"en-us_topic_0030594187.html", "doc_type":"usermanual", "p_code":"1", "code":"2" }, { - "desc":"Log audit is core to information security audit. It is an essential part of security risk control for information systems in enterprises and public sectors. As more infor", + "desc":"When you enable CTS for the first time, a management tracker named system is created automatically.Th management tracker identifies and associates with all cloud services", "product_code":"cts", - "title":"CTS", - "uri":"en-us_topic_0030594187.html", + "title":"Basic Concepts", + "uri":"en-us_topic_0030598498.html", "doc_type":"usermanual", - "p_code":"2", + "p_code":"1", "code":"3" }, { - "desc":"Before using CTS, you need to enable it. A tracker will be created automatically when CTS is enabled. The tracker will identify and associate with all cloud services used", + "desc":"CTS connects to other cloud services on the cloud platform, records operations on cloud resources and the results, and stores these records in the form of trace files to ", "product_code":"cts", - "title":"Tracker", - "uri":"en-us_topic_0043877275.html", + "title":"How CTS Functions", + "uri":"cts_01_0003.html", "doc_type":"usermanual", - "p_code":"2", + "p_code":"1", "code":"4" }, { - "desc":"Traces, also referred to as management traces, are operation records of cloud services tracked by CTS. You can view traces to check what operations were performed, who st", + "desc":"CTS can be used in the following four scenarios.CTS helps you obtain certifications for auditing in industry standards, such as PCI DSS and ISO 27001, for your service sy", "product_code":"cts", - "title":"Trace", - "uri":"en-us_topic_0043877276.html", + "title":"Application Scenarios", + "uri":"cts_01_0004.html", "doc_type":"usermanual", - "p_code":"2", + "p_code":"1", "code":"5" }, { - "desc":"The trace list displays traces generated in the last seven days. You can view the trace list to check details of operations on cloud service resources, including creation", + "desc":"You can use the basic functions of CTS for free, including enabling a tracker, tracking traces, as well as storing and querying traces of the last seven days. In addition", "product_code":"cts", - "title":"Trace List", - "uri":"en-us_topic_0043877277.html", + "title":"Billing", + "uri":"cts_01_0005.html", "doc_type":"usermanual", - "p_code":"2", + "p_code":"1", "code":"6" }, { - "desc":"A trace file is a collection of traces and is in JSON format. CTS generates trace files based on services and transfer periods. Then the trace files are transferred to sp", + "desc":"You can use Identity and Access Management (IAM) to manage CTS permissions and control access to your resources. IAM provides identity authentication, permissions managem", "product_code":"cts", - "title":"Trace File", - "uri":"en-us_topic_0043877298.html", + "title":"Permissions Management", + "uri":"cts_01_0006.html", "doc_type":"usermanual", - "p_code":"2", + "p_code":"1", "code":"7" }, - { - "desc":"A region refers to a geographic area where the server for installing CTS is located. Availability zones (AZs) in the same geographic area can communicate with each other ", - "product_code":"cts", - "title":"Region", - "uri":"en-us_topic_0071359470.html", - "doc_type":"usermanual", - "p_code":"2", - "code":"8" - }, - { - "desc":"A project is used to group and isolate resources, including computing, storage, and network resources. Multiple projects can be created by a tenant, and a project can be ", - "product_code":"cts", - "title":"Project", - "uri":"en-us_topic_0071359471.html", - "doc_type":"usermanual", - "p_code":"2", - "code":"9" - }, - { - "desc":"CTS directly connects to other cloud services, records operations on the cloud resources and the results, and stores these records in the form of trace files to OBS bucke", - "product_code":"cts", - "title":"Working Principle", - "uri":"en-us_topic_0043877299.html", - "doc_type":"usermanual", - "p_code":"1", - "code":"10" - }, - { - "desc":"CTS is used in the following scenarios:Compliance auditCTS tracks operations and allows you to query the records. This is essential for organizations, especially financia", - "product_code":"cts", - "title":"Application Scenarios", - "uri":"en-us_topic_0043877300.html", - "doc_type":"usermanual", - "p_code":"1", - "code":"11" - }, - { - "desc":"Once you enable CTS, the system automatically identifies cloud services enabled on the cloud platform, captures key operations on the services, and reports audit logs of ", - "product_code":"cts", - "title":"Supported Services", - "uri":"en-us_topic_0100236044.html", - "doc_type":"usermanual", - "p_code":"1", - "code":"12" - }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", @@ -114,691 +69,358 @@ "uri":"en-us_topic_0030581457.html", "doc_type":"usermanual", "p_code":"", + "code":"8" + }, + { + "desc":"You need to enable Cloud Trace Service (CTS) before using it. A management tracker named system is automatically created when CTS is enabled. All traces recorded by CTS a", + "product_code":"cts", + "title":"Enabling CTS", + "uri":"cts_02_0001.html", + "doc_type":"usermanual", + "p_code":"8", + "code":"9" + }, + { + "desc":"After CTS is enabled, the tracker starts recording operations on cloud resources. CTS stores operation records for the last seven days.This section describes how to query", + "product_code":"cts", + "title":"Querying Real-Time Traces", + "uri":"en-us_topic_0030598499.html", + "doc_type":"usermanual", + "p_code":"8", + "code":"10" + }, + { + "desc":"CTS periodically sends trace files to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on services and transfer cycle, and adjusts the", + "product_code":"cts", + "title":"Querying Archived Traces", + "uri":"cts_02_0003.html", + "doc_type":"usermanual", + "p_code":"8", + "code":"11" + }, + { + "desc":"You can create key event notifications on CTS so that Simple Message Notification (SMN) sends you notifications of key events. This function is triggered by CTS, and noti", + "product_code":"cts", + "title":"Configuring Key Event Notifications", + "uri":"cts_01_00011.html", + "doc_type":"usermanual", + "p_code":"8", + "code":"12" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cts", + "title":"User Guide", + "uri":"en-us_topic_0030628003.html", + "doc_type":"usermanual", + "p_code":"", "code":"13" }, { - "desc":"You need to enable CTS before using it. A tracker is automatically created when CTS is enabled. All traces recorded by CTS are associated with the tracker. Currently, onl", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", - "title":"Enabling CTS", - "uri":"en-us_topic_0030598498.html", + "title":"Permissions Management", + "uri":"cts_031_001.html", "doc_type":"usermanual", "p_code":"13", "code":"14" }, { - "desc":"When you enable CTS, the system starts recording operations on cloud resources. Operation records of the last seven days are stored on the CTS console.This section descri", + "desc":"For fine-grained management of CTS permissions, you can use Identity and Access Management (IAM). With IAM, you can:Create IAM users for employees based on your enterpris", "product_code":"cts", - "title":"Querying Traces on the CTS Console", - "uri":"en-us_topic_0030598499.html", + "title":"Creating a User and Granting Permissions", + "uri":"cts_031_002.html", "doc_type":"usermanual", - "p_code":"13", + "p_code":"14", "code":"15" }, { - "desc":"CTS periodically compresses recorded traces into trace files and delivers them to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on ", + "desc":"Custom policies can be created to supplement the system-defined policies of CTS. For the actions supported for custom policies, see \"Permissions Policies and Supported Ac", "product_code":"cts", - "title":"Querying Archived Traces", - "uri":"en-us_topic_0030598636.html", + "title":"Custom Policies", + "uri":"cts_031_003.html", "doc_type":"usermanual", - "p_code":"13", + "p_code":"14", "code":"16" }, { - "desc":"You can configure key event notifications on CTS so that Simple Message Notification (SMN) can send messages to notify you of key operations. This function is triggered b", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", - "title":"Configuring Key Event Notifications", - "uri":"en-us_cts_01_0001.html", + "title":"Trace Management", + "uri":"cts_03_01436.html", "doc_type":"usermanual", "p_code":"13", "code":"17" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "desc":"After CTS is enabled, the tracker starts recording operations on cloud resources. CTS stores operation records for the last seven days.This section describes how to query", "product_code":"cts", - "title":"Managing a Tracker", - "uri":"en-us_topic_0030628003.html", + "title":"Querying Real-Time Traces", + "uri":"cts_02_0005.html", "doc_type":"usermanual", - "p_code":"", + "p_code":"17", "code":"18" }, { - "desc":"You can configure parameters in the Transfer to OBS area for a created tracker on the Configure Tracker page.If you configure an OBS bucket for a tracker, CTS automatical", + "desc":"CTS periodically sends trace files to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on services and transfer cycle, and adjusts the", "product_code":"cts", - "title":"Configuring a Tracker", - "uri":"en-us_topic_0059288681.html", + "title":"Querying Archived Traces", + "uri":"cts_02_0006.html", "doc_type":"usermanual", - "p_code":"18", + "p_code":"17", "code":"19" }, { - "desc":"This section describes how to disable or enable a tracker on the CTS console. After a tracker is disabled, it will stop recording operations, but you can still view opera", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"cts", + "title":"Tracker Management", + "uri":"cts_03_0000.html", + "doc_type":"usermanual", + "p_code":"13", + "code":"20" + }, + { + "desc":"You can configure the file prefix of trackers on the CTS console no matter whether the trackers are enabled or not. For enabled trackers, you can also configure OBS bucke", + "product_code":"cts", + "title":"Configuring a Tracker", + "uri":"cts_03_0002.html", + "doc_type":"usermanual", + "p_code":"20", + "code":"21" + }, + { + "desc":"You can disable a tracker on the CTS console. After a tracker is disabled, it will stop recording operations, but you can still view operation records that have been coll", "product_code":"cts", "title":"Disabling or Enabling a Tracker", - "uri":"en-us_topic_0030930181.html", + "uri":"cts_03_0003.html", "doc_type":"usermanual", - "p_code":"18", - "code":"20" + "p_code":"20", + "code":"22" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", "title":"Application Examples", - "uri":"en-us_topic_0043371376.html", + "uri":"cts_03_0005.html", "doc_type":"usermanual", - "p_code":"", - "code":"21" + "p_code":"13", + "code":"23" }, { "desc":"You can query operation records matching specified conditions and check whether operations have been performed by authorized users for security analysis.You have enabled ", "product_code":"cts", "title":"Security Auditing", - "uri":"en-us_topic_0043371377.html", + "uri":"cts_03_0006.html", "doc_type":"usermanual", - "p_code":"21", - "code":"22" + "p_code":"23", + "code":"24" }, { - "desc":"If a resource or an action encounters an exception, you can query operation records for the resource or action in a specified time period and view the requests and respon", + "desc":"If a resource or an action encounters an exception, you can query operation records of the resource or action in a specified time period and view the requests and respons", "product_code":"cts", "title":"Fault Locating", - "uri":"en-us_topic_0043371379.html", + "uri":"cts_03_0007.html", "doc_type":"usermanual", - "p_code":"21", - "code":"23" + "p_code":"23", + "code":"25" }, { - "desc":"You can view operation records of a cloud resource throughout its lifecycle.You have enabled CTS and the tracker is running properly. For details on how to enable CTS, se", + "desc":"You can view operation records of a cloud resource throughout its lifecycle.You have enabled CTS and trackers are running properly.The following takes the records of all ", "product_code":"cts", "title":"Resource Tracking", - "uri":"en-us_topic_0043371378.html", + "uri":"cts_03_0008.html", "doc_type":"usermanual", - "p_code":"21", - "code":"24" + "p_code":"23", + "code":"26" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", "title":"Trace References", - "uri":"en-us_topic_0030581459.html", + "uri":"cts_03_0009.html", "doc_type":"usermanual", - "p_code":"", - "code":"25" + "p_code":"13", + "code":"27" }, { - "desc":"Multiple key fields are included in CTS traces, as shown in Table 1.Formats of some fields displayed on the management console are optimized for easy understanding.This s", + "desc":"A trace consists of multiple key fields shown in Table 1.This section describes the key trace fields displayed on the CTS console.When some fields are displayed on the CT", "product_code":"cts", "title":"Trace Structure", - "uri":"en-us_topic_0030598500.html", + "uri":"cts_03_0010.html", "doc_type":"usermanual", - "p_code":"25", - "code":"26" + "p_code":"27", + "code":"28" }, { "desc":"This section provides two example traces and describes their key fields to help you better understand traces. You can read other traces in a similar way as shown below.Fo", "product_code":"cts", "title":"Example Traces", - "uri":"en-us_topic_0044019595.html", + "uri":"cts_03_0011.html", "doc_type":"usermanual", - "p_code":"25", - "code":"27" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Supported Services and Operation Lists", - "uri":"en-us_topic_0100236045.html", - "doc_type":"usermanual", - "p_code":"", - "code":"28" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Computing", - "uri":"en-us_topic_0127139646.html", - "doc_type":"usermanual", - "p_code":"28", + "p_code":"27", "code":"29" }, { - "desc":"An ECS is a computing server that consists of CPUs, memory, images, and EVS disks and allows on-demand allocation and elastic scaling. ECS integrates VPC, virtual firewal", + "desc":"Cloud Trace Service (CTS) provides records of operations performed on cloud service resources.With CTS, you can record operations associated with CTS itself for later que", "product_code":"cts", - "title":"Key Operations on ECS", - "uri":"en-us_topic_0100236046.html", + "title":"Auditing", + "uri":"cts_03_0021_01.html", "doc_type":"usermanual", - "p_code":"29", + "p_code":"13", "code":"30" }, { - "desc":"IMS provides easy-to-use and self-service image management. You can use a public or private image to create an ECS. You can also create a private image using an existing ", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", - "title":"Key Operations on IMS", - "uri":"en-us_topic_0100236047.html", + "title":"Supported Services and Operations", + "uri":"cts_03_0300.html", "doc_type":"usermanual", - "p_code":"29", + "p_code":"13", "code":"31" }, - { - "desc":"A Bare Metal Server (BMS) is a physical server dedicated for individual tenants. It provides remarkable compute performance and stability for running key applications. Th", - "product_code":"cts", - "title":"Key Operations on BMS", - "uri":"en-us_topic_0100236048.html", - "doc_type":"usermanual", - "p_code":"29", - "code":"32" - }, - { - "desc":"Cloud Container Engine (CCE) is a high-performance, high-reliability service through which enterprises can manage containerized applications. CCE supports native Kubernet", - "product_code":"cts", - "title":"Key Operations on CCE", - "uri":"en-us_topic_0100273723.html", - "doc_type":"usermanual", - "p_code":"29", - "code":"33" - }, - { - "desc":"Auto Scaling (AS) is a service that automatically adjusts computing resources based on your requirements and configured AS policies to ensure proper service running.With ", - "product_code":"cts", - "title":"Key Operations on AS", - "uri":"en-us_topic_0100236049.html", - "doc_type":"usermanual", - "p_code":"29", - "code":"34" - }, - { - "desc":"Dedicated Host (DeH) is a service that provides dedicated physical hosts. You can create ECSs on a DeH to enhance isolation, security, and performance of your ECSs. When ", - "product_code":"cts", - "title":"Key Operations on DeH", - "uri":"en-us_topic_0100363619.html", - "doc_type":"usermanual", - "p_code":"29", - "code":"35" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Storage", - "uri":"en-us_topic_0127139647.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"36" - }, - { - "desc":"OBS is a stable, secure, efficient, and easy-to-use cloud storage service. With the Representational State Transfer (REST) application programming interface (API), OBS is", - "product_code":"cts", - "title":"Key Operations on OBS", - "uri":"en-us_topic_0100273717.html", - "doc_type":"usermanual", - "p_code":"36", - "code":"37" - }, - { - "desc":"An EVS disk is a virtual block storage service that is based on distributed architecture and can elastically scale up and down. EVS disks can be operated online. Using th", - "product_code":"cts", - "title":"Key Operations on EVS", - "uri":"en-us_topic_0100273731.html", - "doc_type":"usermanual", - "p_code":"36", - "code":"38" - }, - { - "desc":"Cloud Backup and Recovery (CBR) backup for Elastic Volume Service (EVS), Elastic Cloud Server (ECS), and Bare Metal Server (BMS), ensuring data security and correctness a", - "product_code":"cts", - "title":"Key Operations on CBR", - "uri":"en-us_topic_0000001317721642.html", - "doc_type":"usermanual", - "p_code":"36", - "code":"39" - }, - { - "desc":"Storage Disaster Recovery Service (SDRS) provides disaster recovery (DR) services for many cloud services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS", - "product_code":"cts", - "title":"Key Operations on SDRS", - "uri":"en-us_cts_01_0002.html", - "doc_type":"usermanual", - "p_code":"36", - "code":"40" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Network", - "uri":"en-us_topic_0127139648.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"41" - }, - { - "desc":"VPC enables you to provision logically isolated, configurable, and manageable virtual networks for ECSs, improving the security of resources in enterprise clouds and simp", - "product_code":"cts", - "title":"Key Operations on VPC", - "uri":"en-us_topic_0100273725.html", - "doc_type":"usermanual", - "p_code":"41", - "code":"42" - }, - { - "desc":"Direct Connect (DC) allows you to establish a private, dedicated network connection from your data center, office, or collocation environment to the cloud platform. It re", - "product_code":"cts", - "title":"Key Operations on DC", - "uri":"en-us_topic_0100273726.html", - "doc_type":"usermanual", - "p_code":"41", - "code":"43" - }, - { - "desc":"Elastic Load Balancing (ELB) is a service that automatically distributes access traffic to multiple ECSs to balance their service load. ELB enables you to achieve higher ", - "product_code":"cts", - "title":"Key Operations on ELB", - "uri":"en-us_topic_0100273727.html", - "doc_type":"usermanual", - "p_code":"41", - "code":"44" - }, - { - "desc":"Domain Name Service (DNS) provides highly available and scalable authoritative DNS services and domain name management services. It translates domain names or application", - "product_code":"cts", - "title":"Key Operations on DNS", - "uri":"en-us_topic_0100273730.html", - "doc_type":"usermanual", - "p_code":"41", - "code":"45" - }, - { - "desc":"Content Delivery Network (CDN) is an intelligent virtual network layer based on the existing Internet infrastructure. It delivers network content from origin servers to e", - "product_code":"cts", - "title":"Key Operations on CDN", - "uri":"en-us_topic_0128329663.html", - "doc_type":"usermanual", - "p_code":"41", - "code":"46" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Management & Deployment", - "uri":"en-us_topic_0127139651.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"47" - }, - { - "desc":"CTS provides records of operations on cloud service resources. With CTS, you can query, audit, and backtrack these operations.With CTS, you can record operations associat", - "product_code":"cts", - "title":"Key Operations on CTS", - "uri":"en-us_topic_0100273718.html", - "doc_type":"usermanual", - "p_code":"47", - "code":"48" - }, - { - "desc":"Cloud Eye is an open monitoring platform. It provides monitoring, alarm reporting, and alarm notification for your resources in near-real time.With CTS, you can record op", - "product_code":"cts", - "title":"Key Operations on Cloud Eye", - "uri":"en-us_topic_0100273719.html", - "doc_type":"usermanual", - "p_code":"47", - "code":"49" - }, - { - "desc":"IAM enables you to centrally manage authentication information, including your authenticated email, phone number, and password. When you invoke an API to apply for an ECS", - "product_code":"cts", - "title":"Key Operations on IAM", - "uri":"en-us_topic_0100273720.html", - "doc_type":"usermanual", - "p_code":"47", - "code":"50" - }, - { - "desc":"Tag Management Service (TMS) is a visualized service for fast, unified tag management that enables you to control your resource permissions and billing more efficiently. ", - "product_code":"cts", - "title":"Key Operations on TMS", - "uri":"en-us_topic_0100291677.html", - "doc_type":"usermanual", - "p_code":"47", - "code":"51" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Application", - "uri":"en-us_topic_0127139652.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"52" - }, - { - "desc":"Simple Message Notification (SMN) is a type of web service that a user can easily construct and maintain. SMN sends notifications from a cloud.With CTS, you can record op", - "product_code":"cts", - "title":"Key Operations on SMN", - "uri":"en-us_topic_0100291678.html", - "doc_type":"usermanual", - "p_code":"52", - "code":"53" - }, - { - "desc":"Distributed Message Service (DMS) is a Kafka-based and high-performance message service that allows multi-user and concurrent access and message queue isolation.With CTS,", - "product_code":"cts", - "title":"Key Operations on DMS", - "uri":"en-us_topic_0100291679.html", - "doc_type":"usermanual", - "p_code":"52", - "code":"54" - }, - { - "desc":"Software Repository for Container (SWR) provides easy, secure, and reliable management of container images throughout their lifecycles, facilitating quick deployment of c", - "product_code":"cts", - "title":"Key Operations on SWR", - "uri":"cts_0827.html", - "doc_type":"usermanual", - "p_code":"52", - "code":"55" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Database", - "uri":"en-us_topic_0127139653.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"56" - }, - { - "desc":"Distributed Cache Service (DCS) is an online distributed database service that is based on the cloud computing platform, available immediately after it is enabled, stable", - "product_code":"cts", - "title":"Key Operations on DCS", - "uri":"en-us_topic_0100363624.html", - "doc_type":"usermanual", - "p_code":"56", - "code":"57" - }, - { - "desc":"Relational Database Service (RDS) is a cloud-based web service that is reliable, scalable, easy to manage, and immediately ready for use.With CTS, you can record operatio", - "product_code":"cts", - "title":"Key Operations on RDS", - "uri":"en-us_topic_0100363625.html", - "doc_type":"usermanual", - "p_code":"56", - "code":"58" - }, - { - "desc":"Document Database Service (DDS) is compatible with the MongoDB protocol and is secure, highly available, reliable, scalable, and easy to use. It provides DB instance crea", - "product_code":"cts", - "title":"Key Operations on DDS", - "uri":"en-us_topic_0100363627.html", - "doc_type":"usermanual", - "p_code":"56", - "code":"59" - }, - { - "desc":"Data Replication Service (DRS) is an easy-to-use, stable, and efficient cloud service used for database migration and synchronization. DRS makes data flow between databas", - "product_code":"cts", - "title":"Key Operations on DRS", - "uri":"en-us_topic_0100363626.html", - "doc_type":"usermanual", - "p_code":"56", - "code":"60" - }, - { - "desc":"GaussDB(for MySQL) is a MySQL-compatible, enterprise-class distributed database service.With CTS, you can record operations associated with GaussDB(for MySQL) for future ", - "product_code":"cts", - "title":"Key Operations on GaussDB(for MySQL)", - "uri":"en-us_cts_03_0011.html", - "doc_type":"usermanual", - "p_code":"56", - "code":"61" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Security", - "uri":"en-us_topic_0127139655.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"62" - }, - { - "desc":"Key Management Service (KMS) is a secure and reliable key hosting service used to provide central management of users' masker keys.With CTS, you can record operations ass", - "product_code":"cts", - "title":"Key Operations on KMS", - "uri":"en-us_topic_0100291685.html", - "doc_type":"usermanual", - "p_code":"62", - "code":"63" - }, - { - "desc":"Anti-DDoS is a network security service that defends IP addresses against distributed denial of service (DDoS) attacks.Anti-DDoS monitors traffic directed to specified IP", - "product_code":"cts", - "title":"Key Operations on Anti-DDoS", - "uri":"en-us_topic_0100291686.html", - "doc_type":"usermanual", - "p_code":"62", - "code":"64" - }, - { - "desc":"Web Application Firewall (WAF) is designed to keep web services stable and secure in combination with years of experience in security protection. It examines all HTTP and", - "product_code":"cts", - "title":"Key Operations on WAF", - "uri":"en-us_topic_0100291690.html", - "doc_type":"usermanual", - "p_code":"62", - "code":"65" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Data Analysis", - "uri":"en-us_topic_0127139658.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"66" - }, - { - "desc":"MapReduce Service (MRS) is a data processing and analysis service that is based on a cloud computing platform. It is stable, reliable, scalable, and easy to manage.With C", - "product_code":"cts", - "title":"Key Operations on MRS", - "uri":"en-us_topic_0100363631.html", - "doc_type":"usermanual", - "p_code":"66", - "code":"67" - }, - { - "desc":"Data Warehouse Service (DWS) is an online data processing database based on the cloud infrastructure and platform and helps you mine and analyze massive data.With CTS, yo", - "product_code":"cts", - "title":"Key Operations on DWS", - "uri":"en-us_topic_0100498013.html", - "doc_type":"usermanual", - "p_code":"66", - "code":"68" - }, - { - "desc":"Data Ingestion Service (DIS) solves the problems of transmitting external data into cloud services. With DIS, you can build customized applications to process or analyze ", - "product_code":"cts", - "title":"Key Operations on DIS", - "uri":"en-us_topic_0100365438.html", - "doc_type":"usermanual", - "p_code":"66", - "code":"69" - }, - { - "desc":"Cloud Search Service (CSS) is a fully hosted distributed search engine service based on the cloud infrastructure and platform. It provides structured and unstructured tex", - "product_code":"cts", - "title":"Key Operations on CSS", - "uri":"en-us_topic_0101676084.html", - "doc_type":"usermanual", - "p_code":"66", - "code":"70" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Enterprise Intelligence", - "uri":"en-us_cts_03_0012.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"71" - }, - { - "desc":"ModelArts is a one-stop development platform for AI developers. With data preprocessing, semi-automated data labeling, distributed training, automated model building, and", - "product_code":"cts", - "title":"Key Operations on ModelArts", - "uri":"en-us_cts_03_0013.html", - "doc_type":"usermanual", - "p_code":"71", - "code":"72" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"cts", - "title":"Relationship Between Operations Triggered by IaaS OpenStack and Native OpenStack APIs", - "uri":"en-us_topic_0100366885.html", - "doc_type":"usermanual", - "p_code":"28", - "code":"73" - }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"cts", "title":"FAQs", - "uri":"en-us_topic_0030932518.html", + "uri":"en-us_topic_0000001410799284.html", "doc_type":"usermanual", "p_code":"", - "code":"74" + "code":"32" }, { - "desc":"Currently, only one tracker can be created for each tenant.", + "desc":"No. You only need to ensure that you have the permissions for OBS buckets.", "product_code":"cts", - "title":"Can I Create Multiple Trackers?", - "uri":"cts_faq_001.html", + "title":"Must I Use an IAM User (Sub Account) to Configure Transfer on CTS and Perform Operations on an OBS Bucket?", + "uri":"cts_faq_0040.html", "doc_type":"usermanual", - "p_code":"74", - "code":"75" + "p_code":"32", + "code":"33" }, { - "desc":"The trace list displays details about operations, such as creation, configuration, and deletion of cloud service resources, in your account. The trace list does not recor", + "desc":"If your account is in arrears, CTS can still receive operation records from supported services, but the records can only be retained for 7 days. In most cases, records ca", "product_code":"cts", - "title":"Which Type of Information Is Displayed on the Trace List?", - "uri":"cts_faq_002.html", + "title":"How Will CTS Be Affected If My Account Is in Arrears?", + "uri":"cts_faq_004.html", "doc_type":"usermanual", - "p_code":"74", - "code":"76" + "p_code":"32", + "code":"34" }, { - "desc":"No. Audit logs must be objective, complete, and accurate. Therefore, they cannot be deleted or modified.", - "product_code":"cts", - "title":"Can I Delete Traces from the Trace List?", - "uri":"cts_faq_003.html", - "doc_type":"usermanual", - "p_code":"74", - "code":"77" - }, - { - "desc":"It is highly recommended that cloud users enable CTS.CTS is core to information security audit. It is an essential part of security risk control for information systems i", + "desc":"It is highly recommended that cloud users should enable CTS.CTS is core to information security audit. It is an essential part of security risk control for information sy", "product_code":"cts", "title":"What Are the Recommended Users of CTS?", - "uri":"cts_faq_005.html", + "uri":"cts_faq_001.html", "doc_type":"usermanual", - "p_code":"74", - "code":"78" + "p_code":"32", + "code":"35" }, { - "desc":"By default, trace files of the last seven days can be retained on the management console. Archived trace files stored in the OBS bucket can be permanently retained.", + "desc":"CTS delivers trace files based on the OBS bucket policy. If the policy is configured incorrectly, trace files cannot be delivered.If an OBS bucket has been deleted or enc", "product_code":"cts", - "title":"How Long Can Trace Files Be Retained?", - "uri":"cts_faq_006.html", - "doc_type":"usermanual", - "p_code":"74", - "code":"79" - }, - { - "desc":"CTS will deliver trace files based on the existing OBS bucket policy. If the policy is incorrectly configured, CTS may not deliver trace files to the OBS bucket.If an OBS", - "product_code":"cts", - "title":"What Will Happen If I Have Enabled CTS But Have Not Configured a Correct Policy for the OBS Bucket?", + "title":"What Will Happen If I Have Enabled Trace Transfer But Have Not Configured an Appropriate Policy for an OBS Bucket?", "uri":"cts_faq_007.html", "doc_type":"usermanual", - "p_code":"74", - "code":"80" + "p_code":"32", + "code":"36" }, { - "desc":"No. Enabling CTS does not affect the performance of other cloud resources.", + "desc":"Yes. The following fields must be included in trace files: time, service_type, resource_type, trace_name, trace_rating, and trace_type. Other fields can be added by the s", "product_code":"cts", - "title":"Will Performance of Other Cloud Service Resources Be Affected If I Enable CTS?", - "uri":"cts_faq_009.html", + "title":"Does CTS Support Integrity Verification of Trace Files?", + "uri":"cts_faq_008.html", "doc_type":"usermanual", - "p_code":"74", - "code":"81" + "p_code":"32", + "code":"37" }, { - "desc":"Fields resource_IP, code, request, response, and message can be null. These fields are not mandatory for CTS.resource_IP: If the value of trace_type is SystemAction, the ", + "desc":"Fields source_ip, code, request, response, and message can be null. These fields are not mandatory for CTS.source_ip: If the value of trace_type is SystemAction, the oper", "product_code":"cts", - "title":"Why Are Fields of Some Traces Displayed as Null on the View Trace Page?", + "title":"Why Are There Some Null Fields on the View Trace Page?", "uri":"cts_faq_010.html", "doc_type":"usermanual", - "p_code":"74", - "code":"82" + "p_code":"32", + "code":"38" }, { - "desc":"For ECS, EVS, VBS, IMS, AS, Cloud Eye, and VPC, you can click Resource ID of some traces to go to the resource details page. The resource ID of such a trace is a hyperlin", - "product_code":"cts", - "title":"Why Are the Resource IDs of Some Traces in the Trace List Hyperlinks?", - "uri":"cts_faq_011.html", - "doc_type":"usermanual", - "p_code":"74", - "code":"83" - }, - { - "desc":"For an asynchronously invoked trace, two records with the same trace name, resource type, and resource name will be generated. The two records may seem to be the same. Ho", + "desc":"For an asynchronously invoked trace, such as deleteDesktop trace of Workspace, two records with the same trace name, resource type, and resource name will be generated. T", "product_code":"cts", "title":"Why Is an Operation Recorded Twice in the Trace List?", "uri":"cts_faq_012.html", "doc_type":"usermanual", - "p_code":"74", - "code":"84" + "p_code":"32", + "code":"39" }, { - "desc":"If you submit a request that calls operations requiring high permissions or calling of other services, you may not have the required permissions. In this case, your permi", + "desc":"CTS sends notifications of all key operations on services including ECS, EVS, VPC, DEW, native OpenStack, and IAM. These operations include creation, deletion, login, and", "product_code":"cts", - "title":"Why Are user_name and op_service Displayed When I Filter Traces by User?", - "uri":"cts_faq_013.html", - "doc_type":"usermanual", - "p_code":"74", - "code":"85" - }, - { - "desc":"Currently, CTS only sends notifications for some key operations on ECS, EVS, VPC, KMS, IAM, and native OpenStack. This feature currently supports creation, deletion, logi", - "product_code":"cts", - "title":"What Services Are Supported for Key Event Notification?", + "title":"What Services Are Supported by Key Event Notifications?", "uri":"cts_faq_015.html", "doc_type":"usermanual", - "p_code":"74", - "code":"86" + "p_code":"32", + "code":"40" }, { - "desc":"OBS provides three storage classes of buckets for storage, respectively standard access, infrequent access, or archive. You must select a standard OBS bucket because CTS ", + "desc":"CTS only retains traces for seven days. To store traces for a long time, configure your tracker to transfer traces to OBS buckets. For details, see Configuring a Tracker.", "product_code":"cts", - "title":"Which Type of OBS Buckets Is Suitable for CTS to Store Traces?", + "title":"How Can I Store Trace Files for a Long Time?", "uri":"cts_faq_017.html", "doc_type":"usermanual", - "p_code":"74", - "code":"87" + "p_code":"32", + "code":"41" }, { - "desc":"The trace_type field indicates the request resource. This field can be ConsoleAction, ApiCall, and SystemAction.SystemAction indicates that the operations are not trigger", + "desc":"The trace_type field indicates the request source. This field can be ConsoleAction, ApiCall, and SystemAction.SystemAction indicates operations that are not triggered by ", "product_code":"cts", - "title":"Why Are user and source_ip Empty for Some Traces with trace_type as systemAction?", - "uri":"cts_faq_019.html", + "title":"Why Are user and source_ip Null for Some Traces with trace_type as SystemAction?", + "uri":"cts_faq_005.html", "doc_type":"usermanual", - "p_code":"74", - "code":"88" + "p_code":"32", + "code":"42" }, { - "desc":"The trace status is defined based on trace_status information recorded in a trace. Different fields have different meanings as follows:normal: indicates that this operati", + "desc":"To identify the user who created a specific ECS, you can view traces recorded by CTS.You have enabled CTS.You have obtained the resource ID of the ECS.Log in to the CTS c", "product_code":"cts", - "title":"What Are the Meanings of the Three Trace Statuses?", - "uri":"cts_faq_020.html", + "title":"How Can I Find Out Who Created a Specific ECS?", + "uri":"cts_faq_0912.html", "doc_type":"usermanual", - "p_code":"74", - "code":"89" + "p_code":"32", + "code":"43" + }, + { + "desc":"If you want to check if there are security risks in your account by examining the login IP addresses and login time of IAM users, you can view traces recorded by CTS.You ", + "product_code":"cts", + "title":"How Can I Find Out the Login IP Address of an IAM User?", + "uri":"cts_faq_0913.html", + "doc_type":"usermanual", + "p_code":"32", + "code":"44" + }, + { + "desc":"During ECS creation, metadata is used to store temporary information. When the creation is finished, the information is automatically deleted. Thus, two traces named dele", + "product_code":"cts", + "title":"Why Are Two deleteMetadata Traces Generated When I Buy an ECS?", + "uri":"cts_faq_0915.html", + "doc_type":"usermanual", + "p_code":"32", + "code":"45" + }, + { + "desc":"Traces cannot be queried on the CTS console.", + "product_code":"cts", + "title":"What Can I Do If I Cannot Query Traces?", + "uri":"cts_faq_0918.html", + "doc_type":"usermanual", + "p_code":"32", + "code":"46" + }, + { + "desc":"You can use the basic functions of CTS for free, including enabling a tracker, tracking traces, as well as storing and querying traces of the last seven days. Only value-", + "product_code":"cts", + "title":"Can I Disable CTS?", + "uri":"cts_faq_0919.html", + "doc_type":"usermanual", + "p_code":"32", + "code":"47" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -807,6 +429,6 @@ "uri":"en-us_topic_0045053541.html", "doc_type":"usermanual", "p_code":"", - "code":"90" + "code":"48" } ] \ No newline at end of file diff --git a/docs/cts/umn/cts_01_00011.html b/docs/cts/umn/cts_01_00011.html new file mode 100644 index 00000000..a10fb4b1 --- /dev/null +++ b/docs/cts/umn/cts_01_00011.html @@ -0,0 +1,37 @@ + + +
The Key Event Notifications page is displayed.
+Notification Name: Identifies key event notifications. This parameter is mandatory. The name can contain up to 64 characters. Only letters, digits, and underscores (_) are allowed.
+Select the operations that will trigger notifications. Up to 1000 operations of 100 services can be added for each notification. For details, see Supported Services and Operations.
+SMN messages will be sent to subscribers when the specified users perform key operations.
+CTS can trigger key event notifications only after SMN is configured.
+CTS connects to other cloud services on the cloud platform, records operations on cloud resources and the results, and stores these records in the form of trace files to OBS buckets in real time.
+You can use CTS to create trackers to record trace files. If trace transfer has been configured, trace files will be stored in the OBS bucket that you have specified.
+You can perform the following operations on a trace file:
+For example, if you create an image using IMS, the service will report the creation operation to CTS. Then, CTS will deliver the trace to an OBS bucket for storage if trace transfer has been configured. You can view trace files in the trace list. Figure 1 shows the working principle of CTS.
+CTS can be used in the following four scenarios.
+CTS helps you obtain certifications for auditing in industry standards, such as PCI DSS and ISO 27001, for your service systems.
+If you want to migrate your services to the cloud, you will need to ensure the compliance of your own service systems, and the cloud vendor you choose will need to ensure the compliance of your service systems and resources.
+CTS plays an important role in compliance. The service records operations of almost all services and resources, and carries out security measures such as encryption, disaster recovery, and anti-tampering to ensure the integrity of traces during their transmission and storage. In addition, you can use CTS to design and implement solutions that help you obtain compliance certifications for your service systems.
+CTS works with FunctionGraph to send notifications to natural persons or service APIs when any key operation is performed. The following are real application examples:
+CTS mines data in traces to facilitate service health analysis, risk analysis, resource tracking, and cost analysis. You can also obtain the data from CTS and explore the data value yourself.
+A trace contains up to fields, recording when an operation was performed by a specific user on a specific resource and the IP address from which the operation was performed.
+By configuring HTTP or HTTPS notifications, you can synchronize traces to your own system for analysis. In addition, CTS is connected to Cloud Eye and Log Tank Service (LTS) to help you monitor high-risk operations, detect unauthorized operations, and analyze resource usage.
+You can configure filters to pinpoint the faulty operation and its details when a fault occurs, reducing the time and manpower required for detecting, locating, and fixing faults.
+CTS provides the following search dimensions: trace type, trace source, resource type, filter, operator and trace status. Each trace contains the request and response of an operation. Querying traces is one of the most efficient methods for locating a fault.
+If a problem occurs on the cloud, you can configure filters to search for all suspicious operations in a specified time period. You can then synchronize the relevant traces to O&M and customer service personnel who will handle the problem.
+You can use the basic functions of CTS for free, including enabling a tracker, tracking traces, as well as storing and querying traces of the last seven days. In addition, CTS works with other services to provide you with value-added functions such as trace file transfer and encryption.
+Value-added functions:
+You can use Identity and Access Management (IAM) to manage CTS permissions and control access to your resources. IAM provides identity authentication, permissions management, and access control.
+With IAM, you can use your account to create IAM users for your employees, and assign permissions to the users to control their access to resource types. For example, you can create IAM users for software developers and assign specific permissions to allow them to use CTS resources but prevent them from deleting resources or performing any high-risk operations.
+If your account does not require individual IAM users for permissions management, skip this section.
+IAM can be used free of charge. You pay only for the resources in your account. For details, see IAM Service Overview.
+By default, new IAM users do not have any permissions assigned. To assign permissions to these new users, add them to one or more groups, and attach permissions policies or roles to these groups.
+CTS is a project-level service deployed and accessed in specific physical regions. When assigning CTS permissions to a user group, specify region-specific projects where the permissions will take effect. If you select All projects, the permissions will be granted for all region-specific projects. When accessing CTS, the users need to switch to a region where they have been authorized to use this service.
+You can grant users permissions by using roles and policies.
+For the API actions supported by CTS, see Table 1.
+ +Role/Policy Name + |
+Description + |
+Type + |
+Dependency + |
+
---|---|---|---|
CTS FullAccess + |
+Full permissions for CTS. + |
+System-defined policy + |
+None + |
+
CTS ReadOnlyAccess + |
+Read-only permissions for CTS. + |
+System-defined policy + |
+None + |
+
CTS Administrator + |
+Administrator permissions for CTS. Users granted these permissions can perform all operations on CTS. +Users with this permission can perform read-only operations on all services except IAM. + |
+System-defined role + |
+This role must be used together with the Tenant Guest and OBS Administrator roles in the same project. + |
+
Operation + |
+CTS FullAccess + |
+CTS ReadOnlyAccess + |
+CTS Administrator + |
+
---|---|---|---|
Querying traces + |
+√ + |
+√ + |
+√ + |
+
Querying quotas + |
+√ + |
+√ + |
+√ + |
+
Creating a tracker + |
+√ + |
+× + |
+√ + |
+
Modifying a tracker + |
+√ + |
+× + |
+√ + |
+
Disabling a tracker + |
+√ + |
+× + |
+√ + |
+
Enabling a tracker + |
+√ + |
+× + |
+√ + |
+
Querying a tracker + |
+√ + |
+√ + |
+√ + |
+
Deleting a tracker + |
+√ + |
+× + |
+√ + |
+
Creating a key event notification + |
+√ + |
+× + |
+√ + |
+
Modifying a key event notification + |
+√ + |
+× + |
+√ + |
+
Disabling a key event notification + |
+√ + |
+× + |
+√ + |
+
Enabling a key event notification + |
+√ + |
+× + |
+√ + |
+
Querying a key event notification + |
+√ + |
+√ + |
+√ + |
+
Deleting a key event notification + |
+√ + |
+× + |
+√ + |
+
You can create custom permissions policies to supplement the system-defined policies.
+You need to enable Cloud Trace Service (CTS) before using it. A management tracker named system is automatically created when CTS is enabled. All traces recorded by CTS are associated with the tracker.
+Trace files must be stored in an Object Storage Service (OBS) bucket. Ensure that you have enabled OBS and have full permissions for the OBS bucket you are going to use. By default, only the owner of OBS buckets can access the buckets and all objects contained in the buckets, but the owner can grant access permissions to other services and users by configuring access policies.
+This section describes how to enable CTS.
+You have enabled OBS.
+ +You can view the tracker information on the Tracker List page.
+The tracker records operations on cloud resources performed by the tenant who creates the tracker. For details about the cloud services supported by CTS, see section "Supported Services and Operations" in the User Guide.
+CTS periodically sends trace files to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on services and transfer cycle, and adjusts the number of traces contained in each trace file as needed.
+This section describes how to obtain historical operation records from trace files downloaded from the OBS bucket.
+You have configured a tracker. For details, see Configuring a Tracker.
+OBS bucket name > CloudTraces > Region > Year > Month > Day > Tracker name > Service directory
+An example is User-defined name > CloudTraces > region > 2016 > 5 > 19 > system > ECS.
+Trace file prefix_CloudTrace_Region/Region-project_Time when the trace file was uploaded to OBS: Year-Month-DayTHour-Minute-SecondZ_Random characters.json.gz
+An example is File Prefix_CloudTrace_region-project_2016-05-30T16-20-56Z_21d36ced8c8af71e.json.gz.
+The OBS bucket name and trace file prefix are user-defined, and other parameters are automatically generated.
+For details about key fields in the CTS trace structure, see Trace Structure and Example Traces.
+After CTS is enabled, the tracker starts recording operations on cloud resources. CTS stores operation records for the last seven days.
+This section describes how to query operation records of the last seven days on the CTS console.
+Select a filter from the drop-down list.
+If you select Resource ID for Search By, specify a resource ID.
+For details about key fields in the trace structure, see Trace Structure and Example Traces.
+CTS periodically sends trace files to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on services and transfer cycle, and adjusts the number of traces contained in each trace file as needed.
+This section describes how to obtain historical operation records from trace files downloaded from the OBS bucket.
+You have configured a tracker. For details, see Configuring a Tracker.
+OBS bucket name > CloudTraces > Region > Year > Month > Day > Tracker name > Service directory
+An example is User-defined name > CloudTraces > region > 2016 > 5 > 19 > system > ECS.
+Trace file prefix_CloudTrace_Region/Region-project_Time when the trace file was uploaded to OBS: Year-Month-DayTHour-Minute-SecondZ_Random characters.json.gz
+An example is File Prefix_CloudTrace_region-project_2016-05-30T16-20-56Z_21d36ced8c8af71e.json.gz.
+The OBS bucket name and trace file prefix are user-defined, and other parameters are automatically generated.
+For details about key fields in the CTS trace structure, see Trace Structure and Example Traces.
+For fine-grained management of CTS permissions, you can use Identity and Access Management (IAM). With IAM, you can:
+If your account does not require individual IAM users, skip this section.
+Learn about the permissions (see Permissions) supported by CTS and choose policies or roles according to your requirements.
+Create a user group on the IAM console, and attach the CTS Administrator policy to the group.
+Create a user on the IAM console and add the user to the user group created in 1.
+Log in to the console by using the created user and verify permissions in the authorized region.
+Custom policies can be created to supplement the system-defined policies of CTS. For the actions supported for custom policies, see "Permissions Policies and Supported Actions" in the API Reference.
+You can create custom policies in either of the following ways:
+For details about how to create custom policies, see Creating a Custom Policy. The following section contains examples of common CTS custom policies.
+{ + "Version": "1.1", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "cts:trace:list" + ] + } + ] +}+
A policy with only "Deny" permissions must be used in conjunction with other policies. If the permissions assigned to a user contain both "Allow" and "Deny", the "Deny" permissions take precedence over the "Allow" permissions.
+The following method can be used if you need to assign permissions of the CTS FullAccess policy to a user but also forbid the user from modifying or deleting trackers. Create a custom policy to disallow tracker deletion or modifying and assign both policies to the group the user belongs to. Then the user can perform all operations on CTS except deleting or modifying trackers. The following is an example of a deny policy:
+{ + "Version": "1.1", + "Statement": [ + { + "Effect": "Deny", + "Action": [ + "cts:tracker:delete", + "cts:tracker:update" + ] + } + ] +}+
A custom policy can contain the actions of multiple services that are of the same type: global or project-level. The following is a policy with multiple statements:
+{{ + "Version": "1.1", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "cts:tracker:list", + "cts:trace:list", + "lts:groups:get", + "lts:logs:list", + "lts:logstreams:list" + ] + } + ] +}+
You can configure the file prefix of trackers on the CTS console no matter whether the trackers are enabled or not. For enabled trackers, you can also configure OBS buckets for trace transfer and LTS dumps.
+There are three storage classes of OBS buckets, Standard, Infrequent Access, and Archive. You must use Standard OBS buckets for trace transfer because CTS needs to frequently access the OBS buckets.
+The configuration will take effect immediately after it is complete.
+You have enabled CTS.
+Parameter + |
+Description + |
+
---|---|
Transfer to OBS + |
+If you select Yes, select an existing OBS bucket and set File Prefix. +When Transfer to OBS is disabled, no operation is required. + |
+
OBS Bucket + |
+New: If this function is enabled, an OBS bucket will be created automatically with the name you enter. +Select Existing: Select an existing OBS bucket. + |
+
Select Bucket + |
+When you select New, enter an OBS bucket name. The OBS bucket name cannot be empty. It can contain 3 to 63 characters, including only lowercase letters, digits, hyphens (-), and periods (.). It cannot contain two consecutive periods (..). For example, my..bucket is not allowed. +When you select Existing, select an existing OBS bucket. + |
+
Retention Period + |
+The duration for storing traces in the OBS bucket. This configuration will apply to the selected bucket and all files in it. Different compliance standards require different trace retention periods. You are advised to set the retention period to at least 180 days. + |
+
File Prefix + |
+A prefix is used to mark a transferred trace file. Your specified prefix will be automatically added to the beginning of the name of a transferred file, helping you quickly filter files. Enter 0 to 64 characters. Only letters, digits, hyphens (-), underscores (_), and periods (.) are allowed. + |
+
Transfer to LTS + |
+When Transfer to LTS is enabled, traces are transferred to the log stream. + |
+
Log group name + |
+When Transfer to LTS is enabled, the default log group name is CTS. When Transfer to LTS is disabled, no operation is required. + |
+
You can then view the tracker details on the Tracker List page.
+Traces recorded by CTS are delivered periodically to the OBS bucket for storage. If you configure an OBS bucket for a tracker, traces generated during the current cycle (usually several minutes) will be delivered to the configured OBS bucket. For example, if the current cycle is from 12:00:00 to 12:05:00 and you configure an OBS bucket for a tracker at 12:02:00, traces received from 12:00:00 to 12:02:00 will also be delivered to the configured OBS bucket for storage at 12:05:00.
+You can disable a tracker on the CTS console. After a tracker is disabled, it will stop recording operations, but you can still view operation records that have been collected.
+You have created a tracker on the CTS console.
+After the tracker is disabled, the Disable button changes to Enable. To enable the tracker, click Enable and then click Yes. The tracker will start recording operations again.
+You can query operation records matching specified conditions and check whether operations have been performed by authorized users for security analysis.
+You have enabled CTS and trackers are running properly.
+The following takes the records of EVS disk creation and deletion in the last two weeks as an example.
+Select Management for Trace Type, EVS for Trace Source, evs for Resource Type, Trace name for Search By, select createVolume or deleteVolume, and click Query. By default, all EVS disk creation or deletion operations in the last hour are queried. You can also set the time range to query all EVS creation or deletion operations performed in the last 7 days at most.
+If a resource or an action encounters an exception, you can query operation records of the resource or action in a specified time period and view the requests and responses to facilitate fault locating.
+You have enabled CTS and trackers are running properly.
+The following shows how to locate an ECS fault which occurred in a morning.
+Select Management for Trace Type, ecs for Trace Source, ecs for Resource Type, Resource ID for Search By, and enter the ID of the faulty virtual machine (VM). In the upper right corner, select a time range from 06:00:00 to 12:00:00 on the day when the fault occurred. Then, click Query to view the result.
+You can view operation records of a cloud resource throughout its lifecycle.
+You have enabled CTS and trackers are running properly.
+The following takes the records of all operations on an ECS server as an example.
+Select Management for Trace Type, ecs for Trace Source, ecs for Resource Type, Resource ID for Search By, enter the ID of the faulty VM, and click Query. By default, the matching traces generated in the last hour are returned. You can also set the time range to view the matching traces in the last 7 days at most.
+A trace consists of multiple key fields shown in Table 1.
+Field + |
+Mandatory + |
+Type + |
+Description + |
+
---|---|---|---|
time + |
+Yes + |
+Date + |
+Time when a trace occurred +When the field is displayed on the console, its value is the local standard time (in GMT time), for example, 1660927593570. However, this field is transmitted and stored as a timestamp in APIs. In this case, the value is the number of milliseconds since 00:00:00 on January 1, 1970 (GMT). + |
+
user + |
+Yes + |
+Structure + |
+Cloud account used to perform an operation +The value is also displayed in the Operator column on the Trace List page. +This field is transmitted and stored as a string in APIs. + |
+
request + |
+No + |
+Structure + |
+Requested operation +This field is transmitted and stored as a string in APIs. + |
+
response + |
+No + |
+Structure + |
+Response to a request +This field is transmitted and stored as a string in APIs. + |
+
service_type + |
+Yes + |
+String + |
+Operation source + |
+
resource_type + |
+Yes + |
+String + |
+Resource type + |
+
resource_name + |
+No + |
+String + |
+Resource name + |
+
resource_id + |
+No + |
+String + |
+Unique resource ID + |
+
source_ip + |
+Yes + |
+String + |
+IP address of the user that performed an operation +The value of this field is empty if the operation was triggered by system. + |
+
trace_name + |
+Yes + |
+String + |
+Operation name + |
+
trace_rating + |
+Yes + |
+String + |
+Trace status. The value can be normal, warning, or incident. +
|
+
trace_type + |
+Yes + |
+String + |
+Operation type +There are types of operations: +
|
+
api_version + |
+No + |
+String + |
+Version of the cloud service API which was called to perform an operation + |
+
message + |
+No + |
+Structure + |
+Remarks + |
+
record_time + |
+Yes + |
+Number + |
+Time when the operation was recorded, in the form of a timestamp + |
+
trace_id + |
+Yes + |
+String + |
+Unique operation ID + |
+
This section provides two example traces and describes their key fields to help you better understand traces. You can read other traces in a similar way as shown below.
+For details on the fields in a trace file, see Trace Structure.
+{ + "time": "2016/12/08 11:07:28 GMT+08:00", + "user": { + "name": "aaa/op_service", + "id": "f2fe9fac63414a35a7d03108d5f1ea73", + "domain": { + "name": "aaa", + "id": "1f9b9ba51f6b4061bd5c1736b28469f8" + } + }, + "request": { + "server": { + "name": "as-config-15f1_XWO68TFC", + "imageRef": "b2b2c7dc-bbb0-4d6b-81dd-f0904023d54f", + "flavorRef": "m1.tiny", + "personality": [], + "vpcid": "e4c374b9-3675-482c-9b81-4acd59745c2b", + "nics": [ + { + "subnet_id": "fff89132-88d4-4e5b-9e27-d9001167d24f", + "nictype": null, + "ip_address": null, + "binding:profile": null, + "extra_dhcp_opts": null + } + ], + "adminPass": "********", + "count": 1, + "metadata": { + "op_svc_userid": "26e96eda18034ae9a44130bacb967b96" + }, + "availability_zone": "az1.dc1", + "root_volume": { + "volumetype": "SATA", + "extendparam": { + "resourceSpecCode": "SATA" + }, + "size": 40 + }, + "data_volumes": [], + "security_groups": [ + { + "id": "dd597fd7-d119-4994-a22c-891fcfc54be1" + } + ], + "key_name": "KeyPair-3e51" + } + }, + "response": { + "status": "SUCCESS", + "entities": { + "server_id": "42d39b4a-19b7-4ee2-b01b-a9f1353b4c54" + }, + "job_id": "4010b39d58b855980158b8574b270018", + "job_type": "createSingleServer", + "begin_time": "2016-12-01T03:04:38.437Z", + "end_time": "2016-12-01T03:07:26.871Z", + "error_code": null, + "fail_reason": null + }, + "service_type": "ECS", + "resource_type": "ecs", + "resource_name": "as-config-15f1_XWO68TFC", + "resource_id": "42d39b4a-19b7-4ee2-b01b-a9f1353b4c54", + "source_ip": "", + "trace_name": "createSingleServer", + "trace_rating": "normal", + "trace_type": "SystemAction", + "api_version": "1.0", + "record_time": "2016/12/08 11:07:28 GMT+08:00", + "trace_id": "4abc3a67-b773-11e6-8412-8f0ed3cc97c6" +}+
You can pay special attention to the following fields:
+{ + "time": "2016/12/08 11:24:04 GMT+08:00", + "user": { + "name": "aaa", + "id": "26e96eda18034ae9a44130bacb967b96", + "domain": { + "name": "aaa", + "id": "1f9b9ba51f6b4061bd5c1736b28469f8" + } + }, + "request": "", + "response": "", + "service_type": "EVS", + "resource_type": "evs", + "resource_name": "volume-39bc", + "resource_id": "229142c0-2c2e-4f01-a1b4-2dfdf1c678c7", + "source_ip": "10.146.230.124", + "trace_name": "deleteVolume", + "trace_rating": "normal", + "trace_type": "ConsoleAction", + "api_version": "1.0", + "record_time": "2016/12/08 11:24:04 GMT+08:00", + "trace_id": "c529254f-bcf5-11e6-a89a-7fc778a6c92c" +}+
You can pay special attention to the following fields:
+Cloud Trace Service (CTS) provides records of operations performed on cloud service resources.
+With CTS, you can record operations associated with CTS itself for later query, audit, and backtracking.
+ +Operation + |
+Resource Type + |
+Trace Name + |
+
---|---|---|
Creating a tracker + |
+tracker + |
+createTracker + |
+
Modifying a tracker + |
+tracker + |
+updateTracker + |
+
Disabling a tracker + |
+tracker + |
+updateTracker + |
+
Enabling a tracker + |
+tracker + |
+updateTracker + |
+
Deleting a tracker + |
+tracker + |
+deleteTracker + |
+
Creating a key event notification + |
+notification + |
+createNotification + |
+
Deleting a key event notification + |
+notification + |
+deleteNotification + |
+
Modifying a key event notification + |
+notification + |
+updateNotification + |
+
Changing the status of a key event notification + |
+notification + |
+updateNotificationStatus + |
+
Disabling a key event notification + |
+notification + |
+updateNotification + |
+
Enabling a key event notification + |
+notification + |
+updateNotification + |
+
Exporting traces + |
+trace + |
+getTrace + |
+
Category + |
+Cloud Service + |
+Operations + |
+
---|---|---|
Computing + + + |
+Image Management Service (IMS) + |
++ | +
Bare Metal Server (BMS) + |
++ | +|
Auto Scaling (AS) + |
++ | +|
Dedicated Host (DeH) + |
++ | +|
Elastic Cloud Server (ECS) + |
+- + |
+|
Storage + |
+Scalable File Service (SFS) + |
++ | +
Storage Disaster Recovery Service (SDRS) + |
++ | +|
Cloud Backup and Recovery (CBR) + |
++ | +|
Network + + + + + |
+Elastic Load Balance (ELB) + |
+- + |
+
Domain Name Service (DNS) + |
++ | +|
Direct Connec (DC) + |
+- + |
+|
Private Link Access Service (Plas) + |
+- + |
+|
Virtual Private Cloud (VPC) + |
+- + |
+|
Container + + |
+Cloud Container Engine (CCE) + |
++ | +
Software Repository for Container (SWR) + |
+- + |
+|
Management & Deployment + + + |
+Cloud Trace Service (CTS) + |
++ | +
Identity and Access Management (IAM) + |
++ | +|
Tag Management Service (TMS) + |
++ | +|
Resource Template Service (RTS) + |
++ | +|
Cloud Eye (CES) + |
+- + |
+|
Log Tank Service (LTS) + |
+- + |
+|
Application Services + + + |
+Distributed Message Service (DMS) + |
++ | +
Distributed Cache Service (DCS) + |
++ | +|
Simple Message Notification (SMN) + |
++ | +|
Application Operations Management (AOM) + |
+- + |
+|
Database + + |
+Relational Database Service (RDS) + |
++ | +
+ | +||
+ | +||
Document Database Service (DDS) + |
++ | +|
Data Replication Service (DRS) + |
+- + |
+|
Security & Compliance + |
+Key Management Service (KMS) + |
++ | +
Web Application Firewall (WAF) + |
++ | +|
AI + |
+ModelArts + |
++ | +
Big Data and Data Analysis + + |
+MapReduce Service (MRS) + |
++ | +
GaussDB(DWS) + |
++ | +|
Cloud Search Service (CSS) + |
++ | +|
Data Ingestion Service (DIS) + |
+- + |
+
Software Repository for Container (SWR) provides easy, secure, and reliable management of container images throughout their lifecycles, facilitating quick deployment of containerized services.
-With CTS, you can record operations associated with SWR for future query, audit, and backtrack operations.
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating an image repository - |
-imagerepository - |
-createImageRepository - |
-
Modifying an image repository - |
-imagerepository - |
-updateImageRepository - |
-
Deleting an image repository - |
-imagerepository - |
-deleteImageRepository - |
-
Uploading an image package - |
-image - |
-uploadImagePackage - |
-
Deleting an image tag - |
-imagetag - |
-deleteImageTag - |
-
Granting permissions for an image repository - |
-userrepositoryauth - |
-createUserRepositoryAuth - |
-
Modifying permissions for an image repository - |
-userrepositoryauth - |
-updateUserRepositoryAuth - |
-
Deleting permissions for an image repository - |
-userrepositoryauth - |
-deleteUserRepositoryAuth - |
-
Creating an organization - |
-usernamespace - |
-createUserNamespace - |
-
Deleting an organization - |
-usernamespace - |
-deleteUserNamesapce - |
-
Granting permissions for an organization - |
-usernamespaceauth - |
-createUserNamespaceAuth - |
-
Modifying permissions for an organization - |
-usernamespaceauth - |
-updateUserNamespaceAuth - |
-
Deleting permissions for an organization - |
-usernamespaceauth - |
-deleteUserNamespaceAuth - |
-
Generating login command - |
-dockerlogincmd - |
-createDockerConfig - |
-
Currently, only one tracker can be created for each tenant.
+It is highly recommended that cloud users should enable CTS.
+The trace list displays details about operations, such as creation, configuration, and deletion of cloud service resources, in your account. The trace list does not record information about query operations.
-No. Audit logs must be objective, complete, and accurate. Therefore, they cannot be deleted or modified.
-If your account is in arrears, CTS can still receive operation records from supported services, but the records can only be retained for 7 days. In most cases, records can be merged into trace files and transferred to OBS buckets for long term storage. Trace file storage in OBS buckets generates fees and this function cannot work when your account is in arrears.
+In addition, the only action you can perform on trackers is to delete them.
+No. You only need to ensure that you have the permissions for OBS buckets.
+It is highly recommended that cloud users enable CTS.
-The trace_type field indicates the request source. This field can be ConsoleAction, ApiCall, and SystemAction.
+SystemAction indicates operations that are not triggered by users, such as alarms, elastic scaling, regular backup, or secondary invocations by systems to complete a user's request. In this case, user and source_ip are both null.
By default, trace files of the last seven days can be retained on the management console. Archived trace files stored in the OBS bucket can be permanently retained.
-CTS will deliver trace files based on the existing OBS bucket policy. If the policy is incorrectly configured, CTS may not deliver trace files to the OBS bucket.
-If an OBS bucket has been deleted or encounters an exception, an error message will be displayed on the management console. In this case, you can choose to create an OBS bucket or reconfigure the access permissions of the OBS bucket. For detailed operations, see the "Bucket Management" section in the Object Storage Service User Guide.
+CTS delivers trace files based on the OBS bucket policy. If the policy is configured incorrectly, trace files cannot be delivered.
+If an OBS bucket has been deleted or encounters an exception, an error message will be displayed on the management console.
Yes. The following fields must be included in trace files: time, service_type, resource_type, trace_name, trace_rating, and trace_type. Other fields can be added by the services from which traces are collected.
+No. Enabling CTS does not affect the performance of other cloud resources.
-Fields resource_IP, code, request, response, and message can be null. These fields are not mandatory for CTS.
-Fields source_ip, code, request, response, and message can be null. These fields are not mandatory for CTS.
+For ECS, EVS, VBS, IMS, AS, Cloud Eye, and VPC, you can click Resource ID of some traces to go to the resource details page. The resource ID of such a trace is a hyperlink. More traces will be supported in future.
-For an asynchronously invoked trace, two records with the same trace name, resource type, and resource name will be generated. The two records may seem to be the same. However, they are generated at different times and document different details.
+For an asynchronously invoked trace, such as deleteDesktop trace of Workspace, two records with the same trace name, resource type, and resource name will be generated. The two records may seem to be the same. However, they are generated at different times and document different details.
The two records together give a full view of the operation.
If you submit a request that calls operations requiring high permissions or calling of other services, you may not have the required permissions. In this case, your permissions will be elevated temporarily on condition that security requirements are met. Your permissions will be resumed after the request is processed, but the permissions elevation will be recorded in CTS logs and the operation user is recorded as user_name or op_service.
-Currently, CTS only sends notifications for some key operations on ECS, EVS, VPC, KMS, IAM, and native OpenStack. This feature currently supports creation, deletion, login, and native OpenStack API operations. This function is still being improved and will support more services and operation types in the future. For details, see Configuring a Tracker.
- +CTS sends notifications of all key operations on services including ECS, EVS, VPC, DEW, native OpenStack, and IAM. These operations include creation, deletion, login, and native OpenStack API calls.
OBS provides three storage classes of buckets for storage, respectively standard access, infrequent access, or archive. You must select a standard OBS bucket because CTS needs to frequently access the OBS bucket that stores traces.
+CTS only retains traces for seven days. To store traces for a long time, configure your tracker to transfer traces to OBS buckets. For details, see Configuring a Tracker.
The trace_type field indicates the request resource. This field can be ConsoleAction, ApiCall, and SystemAction.
-SystemAction indicates that the operations are not triggered by users, such as automatic alarms, elastic scaling, scheduled backup tasks, and secondary invocations generated within the system to respond to the user's request. In this case, no user or device that triggers an operation exists. Therefore, user and source_ip are both empty.
-To identify the user who created a specific ECS, you can view traces recorded by CTS.
+Log in to the CTS console, choose Trace List, and select ECS for Trace Source. In the displayed traces, look for the createServer trace with the obtained resource ID, and expand the trace details.
+The user field shows details of the IAM user who created the ECS. The format is {"name": "Account name", "id": "Account ID", "domain"{"name": "IAM user name", "id": "IAM user ID"}}. If the ECS was created by an account, the IAM user name and the account name are the same.
+ +If you want to check if there are security risks in your account by examining the login IP addresses and login time of IAM users, you can view traces recorded by CTS.
+You have enabled CTS.
+During ECS creation, metadata is used to store temporary information. When the creation is finished, the information is automatically deleted. Thus, two traces named deleteMetadata are generated.
+Traces cannot be queried on the CTS console.
+You can use the basic functions of CTS for free, including enabling a tracker, tracking traces, as well as storing and querying traces of the last seven days. Only value-added services, such as trace transfer, are charged. If you only use the basic services, you do not need to disable CTS since no fees are generated.
+If you do need to disable CTS, you can do it in the following two ways:
+ +Notification Name: Identifies key event notifications. This parameter is mandatory. The value contains a maximum of 64 characters, and only letters, numbers, and underscores (_) are allowed.
-Specify users. SMN messages will be sent to subscribers when specified users perform key operations.
-Storage Disaster Recovery Service (SDRS) provides disaster recovery (DR) services for many cloud services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS), and Dedicated Distributed Storage Service (DSS). SDRS uses multiple technologies, such as storage replication, data redundancy, and cache acceleration, to provide high data reliability and service continuity for users.
-With CTS, you can record operations associated with SDRS for later query, audit, and backtracking.
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating a protection group - |
-protectionGroup - |
-createProtectionGroup - |
-
Deleting a protection group - |
-protectionGroup - |
-deleteProtectionGroup - |
-
Updating a protection group - |
-protectionGroup - |
-updateProtectionGroup - |
-
Enabling protection for a protection group (when the protection group is in the available state) - |
-protectionGroup - |
-startProtectionGroup - |
-
Enabling protection for a protection group (when the protection group is in the failed-over state) - |
-protectionGroup - |
-reprotectProtectionGroup - |
-
Disabling protection for a protection group - |
-protectionGroup - |
-stopProtectionGroup - |
-
Performing a failover for a protection group - |
-protectionGroup - |
-failoverProtectionGroup - |
-
Performing a planned failover - |
-protectionGroup - |
-reverseProtectionGroup - |
-
An action performed when a job is not submitted by a protection group - |
-protectionGroup - |
-protectionGroupAction - |
-
Creating a protected instance - |
-protectedInstance - |
-createProtectedInstance - |
-
Deleting a protected instance - |
-protectedInstance - |
-deleteProtectedInstance - |
-
Updating a protected instance - |
-protectedInstance - |
-updateProtectedInstance - |
-
Attaching a replication pair to a protected instance - |
-protectedInstance - |
-attachReplicationPair - |
-
Detaching a replication pair from a protected instance - |
-protectedInstance - |
-detachReplicationPair - |
-
Adding a NIC to a protected instance - |
-protectedInstance - |
-addNic - |
-
Deleting a NIC from a protected instance - |
-protectedInstance - |
-deleteNic - |
-
Modifying the specifications of a protected instance - |
-protectedInstance - |
-resizeProtectedInstance - |
-
Creating a replication pair - |
-replicationPair - |
-createReplicationPair - |
-
Deleting a replication pair - |
-replicationPair - |
-deleteReplicationPair - |
-
Updating a replication pair - |
-replicationPair - |
-updateReplicationPair - |
-
Expanding the capacity of a replication pair - |
-replicationPair - |
-expandReplicationPair - |
-
Creating a DR drill - |
-disasterRecoveryDrill - |
-createDrDrill - |
-
Deleting a DR drill - |
-disasterRecoveryDrill - |
-deleteDrDrill - |
-
Updating a DR drill - |
-disasterRecoveryDrill - |
-updateDrDrill - |
-
GaussDB(for MySQL) is a MySQL-compatible, enterprise-class distributed database service.
-With CTS, you can record operations associated with GaussDB(for MySQL) for future query, audit, and backtracking.
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating a DB instance - |
-instance - |
-createInstance - |
-
Creating a read replica - |
-instance - |
-addNodes - |
-
Deleting a read replica - |
-instance - |
-deleteNode - |
-
Rebooting a DB instance - |
-instance - |
-restartInstance - |
-
Changing a database port - |
-instance - |
-changeInstancePort - |
-
Changing a security group - |
-instance - |
-modifySecurityGroup - |
-
Promoting a read replica to the primary node - |
-instance - |
-instanceSwitchOver - |
-
Binding or unbinding an EIP - |
-instance - |
-setOrResetPublicIP - |
-
Deleting a DB instance - |
-instance - |
-deleteInstance - |
-
Renaming a DB instance - |
-instance - |
-renameInstance - |
-
Changing a failover priority - |
-instance - |
-modifyPriority - |
-
Modifying specifications - |
-instance - |
-instanceAction - |
-
Resetting a password - |
-instance - |
-resetPassword - |
-
Restoring data to a new DB instance - |
-instance - |
-restoreInstance - |
-
Creating a backup - |
-backup - |
-createManualSnapshot - |
-
Deleting a backup - |
-backup - |
-deleteManualSnapshot - |
-
Creating a parameter template - |
-parameterGroup - |
-createParameterGroup - |
-
Modifying parameters in a parameter template - |
-parameterGroup - |
-updateParameterGroup - |
-
Deleting a parameter template - |
-parameterGroup - |
-deleteParameterGroup - |
-
Replicating a parameter template - |
-parameterGroup - |
-copyParameterGroup - |
-
Resetting a parameter template - |
-parameterGroup - |
-resetParameterGroup - |
-
Comparing parameter templates - |
-parameterGroup - |
-compareParameterGroup - |
-
Applying a parameter template - |
-parameterGroup - |
-applyParameterGroup - |
-
ModelArts is a one-stop development platform for AI developers. With data preprocessing, semi-automated data labeling, distributed training, automated model building, and model deployment on the device, edge, and cloud, ModelArts helps AI developers build models quickly and manage the lifecycle of AI development.
-With CTS, you can record operations associated with ModelArts for later query, audit, and backtracking.
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating a dataset - |
-dataset - |
-createDataset - |
-
Deleting a dataset - |
-dataset - |
-deleteDataset - |
-
Updating a dataset - |
-dataset - |
-updateDataset - |
-
Publishing a version of a dataset - |
-dataset - |
-publishDatasetVersion - |
-
Deleting a dataset version - |
-dataset - |
-deleteDatasetVersion - |
-
Synchronizing the data source - |
-dataset - |
-syncDataSource - |
-
Exporting a dataset - |
-dataset - |
-exportDataFromDataset - |
-
Importing samples to a dataset - |
-dataset - |
-importSamplesToDataset - |
-
Creating a dataset label - |
-dataset - |
-createLabel - |
-
Updating a dataset label - |
-dataset - |
-updateLabel - |
-
Deleting a dataset label - |
-dataset - |
-deleteLabel - |
-
Deleting a dataset label and its samples - |
-dataset - |
-deleteLabelWithSamples - |
-
Adding samples - |
-dataset - |
-uploadSamples - |
-
Deleting samples - |
-dataset - |
-deleteSamples - |
-
Key Operations Recorded for Development Environments
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating a notebook instance - |
-Notebook - |
-create_instance - |
-
Deleting a notebook instance - |
-Notebook - |
-delete_instance - |
-
Starting a notebook instance - |
-Notebook - |
-change_instance_status - |
-
Stopping a notebook instance - |
-Notebook - |
-change_instance_status - |
-
Key Operations Recorded for Training Jobs
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating a training job - |
-ModelArtsTrainJob - |
-createModelArtsTrainJob - |
-
Creating a version of a training job - |
-ModelArtsTrainJob - |
-createModelArtsTrainVersion - |
-
Stopping a training job - |
-ModelArtsTrainJob - |
-stopModelArtsTrainVersion - |
-
Modifying the description of a training job - |
-ModelArtsTrainJob - |
-updateModelArtsTrainDesc - |
-
Deleting a training job version - |
-ModelArtsTrainJob - |
-deleteModelArtsTrainVersion - |
-
Deleting a training job - |
-ModelArtsTrainJob - |
-deleteModelArtsTrainJob - |
-
Creating a training job configuration - |
-ModelArtsTrainConfig - |
-createModelArtsTrainConfig - |
-
Modifying a training job configuration - |
-ModelArtsTrainConfig - |
-updateModelArtsTrainConfig - |
-
Deleting a training job configuration - |
-ModelArtsTrainConfig - |
-deleteModelArtsTrainConfig - |
-
Creating a visualization job - |
-ModelArtsTensorboardJob - |
-createModelArtsTensorboardJob - |
-
Deleting a visualization job - |
-ModelArtsTensorboardJob - |
-deleteModelArtsTensorboardJob - |
-
Modifying the description of a visualization job - |
-ModelArtsTensorboardJob - |
-updateModelArtsTensorboardDesc - |
-
Stopping a visualization job - |
-ModelArtsTensorboardJob - |
-stopModelArtsTensorboardJob - |
-
Restarting a visualization job - |
-ModelArtsTensorboardJob - |
-restartModelArtsgTensorboardJob - |
-
Key Operations Recorded for AI Application Management
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating an AI Application - |
-model - |
-addModel - |
-
Updating an AI application - |
-model - |
-updateModel - |
-
Deleting an AI application - |
-model - |
-deleteModel - |
-
Adding a model conversion task - |
-convert - |
-addConvert - |
-
Updating a model conversion task - |
-convert - |
-updateConvert - |
-
Deleting a model conversion task - |
-convert - |
-deleteConvert - |
-
Key Operations Recorded for Service Management
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Deploying a model as a service - |
-service - |
-addService - |
-
Deleting a service - |
-service - |
-deleteService - |
-
Updating a service - |
-service - |
-updateService - |
-
Starting/stopping a service - |
-service - |
-startOrStopService - |
-
Adding an access key - |
-service - |
-addAkSk - |
-
Deleting an access key - |
-service - |
-deleteAkSk - |
-
Creating a dedicated resource pool - |
-cluster - |
-createCluster - |
-
Deleting a dedicated resource pool - |
-cluster - |
-deleteCluster - |
-
Adding a node to a dedicated resource pool - |
-cluster - |
-addClusterNode - |
-
Deleting a node from a dedicated resource pool - |
-cluster - |
-deleteClusterNode - |
-
Getting a result from the dedicated resource pool creation - |
-cluster - |
-createClusterResult - |
-
Cloud Backup and Recovery (CBR) backup for Elastic Volume Service (EVS), Elastic Cloud Server (ECS), and Bare Metal Server (BMS), ensuring data security and correctness as well as service security.
-With CTS, you can record operations associated with CBR for later query, audit, and backtracking.
- -Operation - |
-Resource Type - |
-Trace Name - |
-
---|---|---|
Creating a policy - |
-policy - |
-createPolicy - |
-
Updating a policy - |
-policy - |
-updatePolicy - |
-
Deleting a policy - |
-policy - |
-deletePolicy - |
-
Setting a vault policy - |
-vault - |
-associatePolicy - |
-
Removing a policy from a vault - |
-vault - |
-dissociatePolicy - |
-
Creating a vault - |
-vault - |
-createVault - |
-
Modifying a vault - |
-vault - |
-updateVault - |
-
Deleting a vault - |
-vault - |
-deleteVault - |
-
Removing resources - |
-vault - |
-removeResources - |
-
Adding resources - |
-vault - |
-addResources - |
-
Performing a backup - |
-vault - |
-createVaultBackup - |
-
Creating a backup - |
-backup - |
-createBackup - |
-
Deleting a backup - |
-backup - |
-deleteBackup - |
-
Restoring a backup - |
-backup - |
-restoreBackup - |
-
Log audit is core to information security audit. It is an essential part of security risk control for information systems in enterprises and public sectors. As more information systems are migrating to the cloud, standards on information security have been released around the globe, such as ISO/IEC 27000, GB/T 20945-2013, ITIL, and NIST SP 800.
-Cloud Trace Service (CTS) is a log audit service for cloud security. It allows you to collect, store, and query resource operation records. You can use these records to perform security analysis, track resource changes, audit compliance, and locate faults.
-The log audit module is a core component necessary for information security audit and an important part for the information systems of enterprises and public institutions to provide security risk management and control.
+Cloud Trace Service (CTS) is a log audit service for security. It allows you to collect, store, and query resource operation records. You can use these records to perform security analysis, track resource changes, audit compliance, and locate faults.
+You need to enable CTS before using it. A tracker is automatically created when CTS is enabled. All traces recorded by CTS are associated with the tracker. Currently, only one tracker is available in a project for a tenant.
-Trace files must be stored in OBS buckets. Therefore, before enabling CTS, you must enable OBS and have full permissions of the OBS bucket you are going to use. By default, only the owner who has enabled OBS can access OBS buckets and all objects contained, but the owner can grant permissions to other services and users by configuring an access policy.
-A tracker created in a multi-project scenario can only track resources under the current project. If tracking cloud resources under another project is required, you need to create a tracker under the project.
-This section describes how to enable CTS.
+When you enable CTS for the first time, a management tracker named system is created automatically.
+Th management tracker identifies and associates with all cloud services your tenant account is using, and records all operations of your tenant account.
+Currently, only one tracker can be created for each tenant.
You have created an OBS bucket and have the required permissions.
+Traces are operation logs of cloud service resources and are captured and stored by CTS. You can view traces to get to know details of operations performed on specific resources.
+Traces: management traces reported by cloud services.
Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
OBS Bucket - |
-Name of the OBS bucket in which trace files are to be stored. - |
-bucket-001 - |
-
File Prefix - |
-Used for identifying the trace files stored in the OBS bucket. This parameter is optional. The value can contain 0 to 64 characters. Only letters, numbers, hyphens (-), underscores (_), and periods (.) are supported. If a tracker is created, a value will be generated automatically in the same way as you specify the value manually. - |
-None - |
-
The trace list displays traces generated in the last seven days. These traces record operations (in the last hour by default) on cloud service resources, including creation, modification, and deletion, but do not record query operations.
+After CTS is enabled, you can view details of the created tracker on the Tracker page.
+A trace file is a collection of traces. CTS generates trace files based on services and transfer cycle and send these files to your specified OBS bucket in real time. In most cases, all traces of a service generated in a transfer cycle are compressed into one trace file. However, if there are a large number of traces, CTS will adjust the number of traces contained in each trace file.
+Traces files are in JSON format. Figure 1 shows an example of a trace file.
+ +The authenticity of operation records during a security incident investigation is often affected by trace files being deleted or tampered with. The records therefore cannot be used as an effective basis for investigation. Therefore, CTS provides trace file integrity verification to help you ensure the authenticity of trace files.
+The verification function for trace file integrity adopts industry standard algorithms and generates a Hash value for each trace file. This Hash value changes when the trace file is modified or deleted. Therefore, by tracking the Hash value, you can confirm whether the trace file is modified. In addition, the RSA algorithm is used to sign on the digest file to ensure that the file is not modified. In this way, any operations of modifying or deleting trace files are recorded by CTS.
+After the verification function for trace file integrity is enabled, CTS generates a digest file for Hash values of all trace files recorded in the past hour and synchronizes the digest file to an OBS bucket configured for the current tracker.
+CTS signs on each digest file using public and private keys. You can verify the digest file using the public key after the file is stored to the OBS bucket.
When you enable CTS, the system starts recording operations on cloud resources. Operation records of the last seven days are stored on the CTS console.
-This section describes how to query or export operation records of the last seven days on the CTS console.
+After CTS is enabled, the tracker starts recording operations on cloud resources. CTS stores operation records for the last seven days.
+This section describes how to query operation records of the last seven days on the CTS console.
Select the desired content from the drop-down lists one by one.
-When you select Trace name for Search By, you need to select a trace name.
-When you select Resource ID for Search By, you need to enter a resource ID.
-When you select Resource name, you also need to select or enter a resource name.
-Options are available in the Search By drop-down list only when Trace Source and Resource Type are specified.
-For details on key fields in traces, see Trace Structure and Example Traces.
+Select a filter from the drop-down list.
+If you select Resource ID for Search By, specify a resource ID.
+For details about key fields in the trace structure, see Trace Structure and Example Traces.
Multiple key fields are included in CTS traces, as shown in Table 1.
-Field - |
-Mandatory - |
-Type - |
-Description - |
-
---|---|---|---|
time - |
-Yes - |
-Date - |
-The time when a trace occurred. The time is displayed in the local standard time (GMT+local time zone). In the API, this field is transmitted and stored in the timestamp format. The timestamp is the number of seconds elapsed since January 1, 1970 (midnight UTC/GMT), regardless of leap seconds. -For example, 2022-08-19 18:46:33 GMT+02:00, is displayed as 1660927593570. - |
-
user - |
-Yes - |
-Structure - |
-Cloud account used to perform the recorded operation. -The value is also displayed in the Operator column on the Trace List page. -This field is transmitted and stored in the API in the form of a string. - |
-
request - |
-No - |
-Structure - |
-Requested operation. -This field is transmitted and stored in the API in the form of a string. - |
-
response - |
-No - |
-Structure - |
-Response to the request. -This field is transmitted and stored in the API in the form of a string. - |
-
service_type - |
-Yes - |
-String - |
-Operation source. - |
-
resource_type - |
-Yes - |
-String - |
-Resource type. - |
-
resource_name - |
-No - |
-String - |
-Resource name. - |
-
resource_id - |
-No - |
-String - |
-Unique resource ID. - |
-
source_ip - |
-Yes - |
-String - |
-IP address of the user that performed the operation. -The value of this field is empty if the operation was triggered by system. - |
-
trace_name - |
-Yes - |
-String - |
-Operation name. - |
-
trace_rating - |
-Yes - |
-String - |
-Trace status. The value can be normal, warning, or incident. - |
-
trace_type - |
-Yes - |
-String - |
-Operation type. -There are three types of operations: -
|
-
api_version - |
-No - |
-String - |
-Version of the cloud service API which was called to perform the operation. - |
-
message - |
-No - |
-StructureString - |
-Supplementary information. - |
-
record_time - |
-Yes - |
-Number - |
-Time when the operation was recorded, in the form of a timestamp. - |
-
trace_id - |
-Yes - |
-String - |
-Unique operation ID. - |
-
code - |
-No - |
-Number - |
-HTTP return code, for example, 200 or 400. - |
-
request_id - |
-No - |
-String - |
-ID of the recorded request. - |
-
location_info - |
-No - |
-String - |
-Additional information required for fault locating after a request error. - |
-
endpoint - |
-No - |
-String - |
-Endpoint of the page that displays details of cloud resources involved in this operation. - |
-
resource_url - |
-No - |
-String - |
-Access link (excluding the endpoint) of the page that displays details of cloud resources involved in this operation. - |
-
CTS periodically compresses recorded traces into trace files and delivers them to OBS buckets. A trace file is a collection of traces. CTS generates trace files based on services and transfer periods. If there are a large number of traces, the system will adjust the number of traces contained in each trace file as needed.
-This section describes how to obtain historical operation records from the trace files downloaded from OBS buckets.
-OBS bucket name > CloudTraces > Region > Year > Month > Day > Tracker name > Service directory
-An example is User-defined name > CloudTraces > region > 2016 > 5 > 19 > system > ECS.
-Trace file prefix_CloudTrace_Region/Region-project_Time when the trace file was uploaded to OBS: Year-Month-DayTHour-Minute-SecondZ_Character randomly generated.json.gz
-Example: File Prefix_CloudTrace_region_2016-05-30T16-20-56Z_21d36ced8c8af71e.json.gz
-The OBS bucket name and trace file prefix are customized and other parameters are automatically generated.
-For details on key fields in traces, see Trace Structure and Example Traces.
-A tracker is used to record management traces, which are logs of operations on all cloud resources, such as creation, login, and deletion. When you enable CTS, a tracker is created automatically.
-This section describes how to disable or enable a tracker on the CTS console. After a tracker is disabled, it will stop recording operations, but you can still view operation records that have been collected.
-This section describes how to disable or enable a tracker.
-You have created a tracker on the CTS console.
-After the tracker is disabled, the Disable button changes to Enable. To enable the tracker, click Enable and then click Yes. The tracker will start recording operations again.
-You can query operation records matching specified conditions and check whether operations have been performed by authorized users for security analysis.
-You have enabled CTS and the tracker is running properly. For details on how to enable CTS, see Enabling CTS.
-The following shows how you can review records of EVS disk creation and deletion over the last two weeks.
-Select evs for Trace Source, evs for Resource Type, Trace name for Search By, and select createVolume or deleteVolume. Then, click Query to search for all EVS creation or deletion operations of the last seven days.
-You can view operation records of a cloud resource throughout its lifecycle.
-You have enabled CTS and the tracker is running properly. For details on how to enable CTS, see Enabling CTS.
-The following takes the records of all operations on an ECS as an example.
-Select ecs for Trace Source, ecs for Resource Type, Resource ID for Search By, and enter the ID of the VM. Click Query to obtain the traces generated in the last seven days.
-If a resource or an action encounters an exception, you can query operation records for the resource or action in a specified time period and view the requests and responses to facilitate troubleshooting.
-You have enabled CTS and the tracker is running properly. For details on how to enable CTS, see Enabling CTS.
-To locate an ECS fault which occurred in the morning:
-Select ecs for Trace Source, ecs for Resource Type, and Resource ID for Search By. Enter the ID of the faulty virtual machine (VM), and select a time range from 06:00:00 to 12:00:00 on the day when the fault occurred in the upper right corner. Then click Query.
-Before using CTS, you need to enable it. A tracker will be created automatically when CTS is enabled. The tracker will identify and associate with all cloud services used, and record all operations on the cloud services.
-Traces, also referred to as management traces, are operation records of cloud services tracked by CTS. You can view traces to check what operations were performed, who started the operations, and what resources were involved.
-The trace list displays traces generated in the last seven days. You can view the trace list to check details of operations on cloud service resources, including creation, modification, and deletion.
-A trace file is a collection of traces and is in JSON format. CTS generates trace files based on services and transfer periods. Then the trace files are transferred to specified OBS buckets.
-Generally, all traces generated by a service during a transfer period are compressed into a trace file. However, if there are a large number of traces, the system will adjust the number of traces contained in each trace file as needed.
-Trace files can be obtained only from OBS. For details about how to obtain, see Querying Archived Traces. For details about key fields in traces, see Trace Structure.
-CTS directly connects to other cloud services, records operations on the cloud resources and the results, and stores these records in the form of trace files to OBS buckets in real time.
-Before enabling CTS, you need to create an OBS bucket. When CTS is enabled, a tracker is created automatically. The tracker will generate trace files and send them to your specified OBS bucket.
-The following operations can be performed on trace files:
-Let's use image creation as an example to show how CTS works. If you create an image in IMS, IMS will report a trace that records the operation to CTS. You can then view the trace on the CTS console. For long-term storage, CTS will transfer the trace to an OBS bucket.
-CTS is used in the following scenarios:
-CTS tracks operations and allows you to query the records. This is essential for organizations, especially financial and payment enterprises, to obtain certifications such as PCI DSS and COSO certificate.
-CTS allows you to mine data in audit logs to provide support for service health analysis, risk analysis, resource tracking, and cost analysis. In addition, you can obtain audit data from CTS and explore data value yourself.
-An audit log contains 19 fields, including time, operator, operation device IP address, operated resource, operation details, and other information. Each audit log is worth mining.
-CTS allows you to synchronize audit logs to your own system for analysis by configuring HTTP or HTTPS notifications. CTS has been interconnected with Cloud Eye and Log Tank Service (LTS) to help you track high-risk operations, analyze unauthorized operations, and check resource usage. The interconnection also provides data for analysis of service health and costs. For details on Cloud Eye, see Cloud Eye User Guide.
-CTS works with FunctionGraph to send notifications to natural persons or service APIs when any key operation is performed. The following are some usage examples:
-If a fault occurs when you use cloud services, you can use filters to quickly search for unusual operations, and send the related traces to customer service or O&M engineers to handle the issue. This accelerates troubleshooting and reduces manpower requirements.
-You can search by filters such as trace source, resource type, operator, and trace status. Each trace contains the request and response of an operation.
-This section provides two example traces and describes their key fields to help you better understand traces. You can read other traces in a similar way as shown below.
-For details on the fields in a trace, see Trace Structure.
-{ - "time": "12/01/2016 11:07:28 GMT+08:00", - "user": { - "name": "aaa/op_service", - "id": "f2fe9fac63414a35a7d03108d5f1ea73", - "domain": { - "name": "aaa", - "id": "1f9b9ba51f6b4061bd5c1736b28469f8" - } - }, - "request": "{\"server\":{\"name\":\"as-config-15f1_XWO68TFC\",\"imageRef\":\"b2b2c7dc-bbb0-4d6b-81dd-f0904023d54f\",\"flavorRef\":\"m1.tiny\",\"personality\":[],\"vpcid\":\"e4c374b9-3675-482c-9b81-4acd59745c2b\",\"nics\":[{\"subnet_id\":\"fff89132-88d4-4e5b-9e27-d9001167d24f\",\"nictype\":null,\"ip_address\":null,\"binding:profile\":null,\"extra_dhcp_opts\":null}],\"adminPass\":\"********\",\"count\":1,\"metadata\":{\"op_svc_userid\":\"26e96eda18034ae9a44130bacb967b96\"},\"availability_zone\":\"az1.dc1\",\"root_volume\":{\"volumetype\":\"SATA\",\"extendparam\":{\"resourceSpecCode\":\"SATA\"},\"size\":40},\"data_volumes\":[],\"security_groups\":[{\"id\":\"dd597fd7-d119-4994-a22c-891fcfc54be1\"}],\"key_name\":\"KeyPair-3e51\"}}", - "response": "{\"status\":\"SUCCESS\",\"entities\":{\"server_id\":\"42d39b4a-19b7-4ee2-b01b-a9f1353b4c54\"},\"job_id\":\"4010b39d58b855980158b8574b270018\",\"job_type\":\"createSingleServer\",\"begin_time\":\"2016-12-01T03:04:38.437Z\",\"end_time\":\"2016-12-01T03:07:26.871Z\",\"error_code\":null,\"fail_reason\":null}", - "service_type": "ECS", - "resource_type": "ecs", - "resource_name": "as-config-15f1_XWO68TFC", - "resource_id": "42d39b4a-19b7-4ee2-b01b-a9f1353b4c54", - "source_ip": "", - "trace_name": "createSingleServer", - "trace_status": "normal", - "trace_type": "SystemAction", - "api_version": "1.0", - "record_time": "12/01/2016 11:07:28 GMT+08:00", - "trace_id": "4abc3a67-b773-11e6-8412-8f0ed3cc97c6" -}-
Note the following fields:
-{ - "time": "12/01/2016 11:24:04 GMT+08:00", - "user": { - "name": "aaa", - "id": "26e96eda18034ae9a44130bacb967b96", - "domain": { - "name": "aaa", - "id": "1f9b9ba51f6b4061bd5c1736b28469f8" - } - }, - "request": "{\"volumes\":[{\"id\":\"49b52508-7cd1-4642-ade5-dfecb853c8a0\"},{\"id\":\"8aa423db-052b-4ecf-a748-53eab02d4cf0\"},{\"id\":\"4b1ee16f-a469-47eb-9433-4fac2a2f959a\"},{\"id\":\"edc7f193-8fd8-44b3-812b-63cb57fd7932\"},{\"id\":\"4094a2c3-9d62-4a24-bb2e-0f417d27834a\"}]}",, - "response": "{\"job_id\":\"ff808082814cc2ee01828d0a608067c7\",\"job_type\":\"deleteVolume\",\"begin_time\":\"2022-08-11T13:14:03.775Z\",\"end_time\":\"2022-08-11T13:14:07.458Z\",\"status\":\"SUCCESS\",\"error_code\":null,\"fail_reason\":null,\"entities\":{\"volume_type\":\"SAS\",\"volume_id\":\"edc7f193-8fd8-44b3-812b-63cb57fd7932\",\"size\":10,\"name\":\"volume-8631-lxrtest-0002\"}}", - "service_type": "EVS", - "resource_type": "evs", - "resource_name": "volume-39bc", - "resource_id": "229142c0-2c2e-4f01-a1b4-2dfdf1c678c7", - "source_ip": "10.146.230.124", - "trace_name": "deleteVolume", - "trace_status": "normal", - "trace_type": "ConsoleAction", - "api_version": "1.0", - "record_time": "1660223647458765184", - "trace_id": "c529254f-bcf5-11e6-a89a-7fc778a6c92c" -}-
Note the following fields:
-Released On +
+
-
-
diff --git a/docs/cts/umn/en-us_topic_0100236047.html b/docs/cts/umn/en-us_topic_0100236047.html
deleted file mode 100644
index 636df382..00000000
--- a/docs/cts/umn/en-us_topic_0100236047.html
+++ /dev/null
@@ -1,80 +0,0 @@
-
-
-
-
-Parent topic: Computing
-Key Operations on IMS-IMS provides easy-to-use and self-service image management. You can use a public or private image to create an ECS. You can also create a private image using an existing ECS or an external image file. -With CTS, you can record operations associated with IMS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100236048.html b/docs/cts/umn/en-us_topic_0100236048.html
deleted file mode 100644
index 39a1f53f..00000000
--- a/docs/cts/umn/en-us_topic_0100236048.html
+++ /dev/null
@@ -1,59 +0,0 @@
-
-
-
-
-Parent topic: Computing
-Key Operations on BMS-A Bare Metal Server (BMS) is a physical server dedicated for individual tenants. It provides remarkable compute performance and stability for running key applications. The BMS service can be used in conjunction with other cloud services, such as Virtual Private Cloud (VPC), allowing you to enjoy the stable performance of server hosting and the high scalability of cloud resources together. -With CTS, you can record operations associated with BMS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100236049.html b/docs/cts/umn/en-us_topic_0100236049.html
deleted file mode 100644
index d8d03782..00000000
--- a/docs/cts/umn/en-us_topic_0100236049.html
+++ /dev/null
@@ -1,157 +0,0 @@
-
-
-
-
-Parent topic: Computing
-Key Operations on AS-Auto Scaling (AS) is a service that automatically adjusts computing resources based on your requirements and configured AS policies to ensure proper service running. -With CTS, you can record operations associated with AS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273717.html b/docs/cts/umn/en-us_topic_0100273717.html
deleted file mode 100644
index 4644e2a3..00000000
--- a/docs/cts/umn/en-us_topic_0100273717.html
+++ /dev/null
@@ -1,185 +0,0 @@
-
-
-
-
-Parent topic: Computing
-Key Operations on OBS-OBS is a stable, secure, efficient, and easy-to-use cloud storage service. With the Representational State Transfer (REST) application programming interface (API), OBS is able to store any amount and form of unstructured data. -With CTS, you can record operations associated with OBS for future query, audit, and backtrack operations.
-
-
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273718.html b/docs/cts/umn/en-us_topic_0100273718.html
deleted file mode 100644
index fb55e7b2..00000000
--- a/docs/cts/umn/en-us_topic_0100273718.html
+++ /dev/null
@@ -1,87 +0,0 @@
-
-
-
-
-Parent topic: Storage
-Key Operations on CTS-CTS provides records of operations on cloud service resources. With CTS, you can query, audit, and backtrack these operations. -With CTS, you can record operations associated with CTS itself for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273719.html b/docs/cts/umn/en-us_topic_0100273719.html
deleted file mode 100644
index e4904f5b..00000000
--- a/docs/cts/umn/en-us_topic_0100273719.html
+++ /dev/null
@@ -1,143 +0,0 @@
-
-
-
-
-Parent topic: Management & Deployment
-Key Operations on Cloud Eye-Cloud Eye is an open monitoring platform. It provides monitoring, alarm reporting, and alarm notification for your resources in near-real time. -With CTS, you can record operations associated with Cloud Eye for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273720.html b/docs/cts/umn/en-us_topic_0100273720.html
deleted file mode 100644
index 30a743a7..00000000
--- a/docs/cts/umn/en-us_topic_0100273720.html
+++ /dev/null
@@ -1,367 +0,0 @@
-
-
-
-
-Parent topic: Management & Deployment
-Key Operations on IAM-IAM enables you to centrally manage authentication information, including your authenticated email, phone number, and password. When you invoke an API to apply for an ECS, manage cloud resources, or log in to the cloud platform in multi-tenant mode, you can query the required project ID, AK/SK, and username in real time. -With CTS, you can record operations associated with IAM for later query, audit, and backtracking. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273723.html b/docs/cts/umn/en-us_topic_0100273723.html
deleted file mode 100644
index 7d9623ef..00000000
--- a/docs/cts/umn/en-us_topic_0100273723.html
+++ /dev/null
@@ -1,598 +0,0 @@
-
-
-
-
-Parent topic: Management & Deployment
-Key Operations on CCE-Cloud Container Engine (CCE) is a high-performance, high-reliability service through which enterprises can manage containerized applications. CCE supports native Kubernetes applications and tools, allowing you to easily set up a container runtime environment on the cloud. -With CTS, you can record operations associated with CCE for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273725.html b/docs/cts/umn/en-us_topic_0100273725.html
deleted file mode 100644
index f5735890..00000000
--- a/docs/cts/umn/en-us_topic_0100273725.html
+++ /dev/null
@@ -1,199 +0,0 @@
-
-
-
-
-Parent topic: Computing
-Key Operations on VPC-VPC enables you to provision logically isolated, configurable, and manageable virtual networks for ECSs, improving the security of resources in enterprise clouds and simplifying network deployment. -With CTS, you can record operations associated with VPC for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273726.html b/docs/cts/umn/en-us_topic_0100273726.html
deleted file mode 100644
index 07e1108a..00000000
--- a/docs/cts/umn/en-us_topic_0100273726.html
+++ /dev/null
@@ -1,31 +0,0 @@
-
-
-
-
-Parent topic: Network
-Key Operations on DC-Direct Connect (DC) allows you to establish a private, dedicated network connection from your data center, office, or collocation environment to the cloud platform. It reduces your network latency and provides a more consistent network experience than Internet-based connections. -With CTS, you can record operations associated with DC for later query, audit, and backtracking. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273727.html b/docs/cts/umn/en-us_topic_0100273727.html
deleted file mode 100644
index 7d31d038..00000000
--- a/docs/cts/umn/en-us_topic_0100273727.html
+++ /dev/null
@@ -1,193 +0,0 @@
-
-
-
-
-Parent topic: Network
-Key Operations on ELB-Elastic Load Balancing (ELB) is a service that automatically distributes access traffic to multiple ECSs to balance their service load. ELB enables you to achieve higher levels of fault tolerance in your applications and expand application service capabilities. -With a web-based console, you can create load balancers, configure the ports required for listening, and add backend ECSs for load balancers. ELB helps eliminate single points of failure (SPOFs), improving availability of the whole system. -With CTS, you can record operations associated with ELB for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273730.html b/docs/cts/umn/en-us_topic_0100273730.html
deleted file mode 100644
index c9770173..00000000
--- a/docs/cts/umn/en-us_topic_0100273730.html
+++ /dev/null
@@ -1,219 +0,0 @@
-
-
-
-
-Parent topic: Network
-Key Operations on DNS-Domain Name Service (DNS) provides highly available and scalable authoritative DNS services and domain name management services. It translates domain names or application resources into IP addresses required for network connection. By doing so, visitors' access requests are directed to the desired resources. -With CTS, you can record operations associated with DNS for future query, audit, and backtrack operations. -DNS operations that can be recorded by CTS are listed in Table 1 and Table 2. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100273731.html b/docs/cts/umn/en-us_topic_0100273731.html
deleted file mode 100644
index c65bc2c5..00000000
--- a/docs/cts/umn/en-us_topic_0100273731.html
+++ /dev/null
@@ -1,52 +0,0 @@
-
-
-
-
-Parent topic: Network
-Key Operations on EVS-An EVS disk is a virtual block storage service that is based on distributed architecture and can elastically scale up and down. EVS disks can be operated online. Using them is similar to using common server hard disks. Compared with common server hard disks, EVS disks have higher data reliability and I/O throughput capabilities. They are also easier to use. EVS disks apply to file systems, databases, or system software or other applications that require block storage devices. -With CTS, you can record operations associated with EVS for future query, audit, and backtrack operations.
-
-
-
-
diff --git a/docs/cts/umn/en-us_topic_0100291677.html b/docs/cts/umn/en-us_topic_0100291677.html
deleted file mode 100644
index 432248f2..00000000
--- a/docs/cts/umn/en-us_topic_0100291677.html
+++ /dev/null
@@ -1,59 +0,0 @@
-
-
-
-
-Parent topic: Storage
-Key Operations on TMS-Tag Management Service (TMS) is a visualized service for fast, unified tag management that enables you to control your resource permissions and billing more efficiently. It allows you to tag and categorize cloud services across regions, and it can be accessed through the TMS console or using APIs. -With CTS, you can record operations associated with TMS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100291678.html b/docs/cts/umn/en-us_topic_0100291678.html
deleted file mode 100644
index 3e805f62..00000000
--- a/docs/cts/umn/en-us_topic_0100291678.html
+++ /dev/null
@@ -1,110 +0,0 @@
-
-
-
-
-Parent topic: Management & Deployment
-Key Operations on SMN-Simple Message Notification (SMN) is a type of web service that a user can easily construct and maintain. SMN sends notifications from a cloud. -With CTS, you can record operations associated with SMN for future query, audit, and backtrack operations. -![]() In SMN, deleting a topic will delete all subscription information associated with the topic, and the subscription information deletion operation will not be recorded by CTS. -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100291679.html b/docs/cts/umn/en-us_topic_0100291679.html
deleted file mode 100644
index 4f41dcb4..00000000
--- a/docs/cts/umn/en-us_topic_0100291679.html
+++ /dev/null
@@ -1,276 +0,0 @@
-
-
-
-
-Parent topic: Application
-Key Operations on DMS-Distributed Message Service (DMS) is a Kafka-based and high-performance message service that allows multi-user and concurrent access and message queue isolation. -With CTS, you can record operations associated with DMS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100291685.html b/docs/cts/umn/en-us_topic_0100291685.html
deleted file mode 100644
index adae9d41..00000000
--- a/docs/cts/umn/en-us_topic_0100291685.html
+++ /dev/null
@@ -1,13 +0,0 @@
-
-
-
-
-Parent topic: Application
-Key Operations on KMS-Key Management Service (KMS) is a secure and reliable key hosting service used to provide central management of users' masker keys. -With CTS, you can record operations associated with KMS for later query, audit, and backtracking. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100291686.html b/docs/cts/umn/en-us_topic_0100291686.html
deleted file mode 100644
index 46b894ad..00000000
--- a/docs/cts/umn/en-us_topic_0100291686.html
+++ /dev/null
@@ -1,46 +0,0 @@
-
-
-
-
-Parent topic: Security
-Key Operations on Anti-DDoS-Anti-DDoS is a network security service that defends IP addresses against distributed denial of service (DDoS) attacks. -Anti-DDoS monitors traffic directed to specified IP addresses in real time and detects access traffic at network egresses to discover DDoS attacks as soon as possible. It then cleans abnormal traffic according to user-configured defense policies so that services run as normal. It also generates reports to present users with a clear evaluation of network security. -With CTS, you can record operations associated with Anti-DDoS for future query, audit, and backtrack operations.
-
-
-
-
diff --git a/docs/cts/umn/en-us_topic_0100291690.html b/docs/cts/umn/en-us_topic_0100291690.html
deleted file mode 100644
index ac77d864..00000000
--- a/docs/cts/umn/en-us_topic_0100291690.html
+++ /dev/null
@@ -1,235 +0,0 @@
-
-
-
-
-Parent topic: Security
-Key Operations on WAF-Web Application Firewall (WAF) is designed to keep web services stable and secure in combination with years of experience in security protection. It examines all HTTP and HTTPS requests to detect and block attacks such as Structure Query Language (SQL) injections, cross-site scripting (XSS), webshell upload, third-party vulnerability exploits, CC attacks, and malicious crawlers. -With CTS, you can record operations associated with WAF for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100363619.html b/docs/cts/umn/en-us_topic_0100363619.html
deleted file mode 100644
index ac569e40..00000000
--- a/docs/cts/umn/en-us_topic_0100363619.html
+++ /dev/null
@@ -1,45 +0,0 @@
-
-
-
-
-Parent topic: Security
-Key Operations on DeH-Dedicated Host (DeH) is a service that provides dedicated physical hosts. You can create ECSs on a DeH to enhance isolation, security, and performance of your ECSs. When you migrate services to a DeH, you can continue to use your server software licenses used before the migration. That is, you can use the Bring Your Own License (BYOL) feature on the DeH to reduce costs and independently manage your ECSs. -With CTS, you can record operations associated with DeH for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100363624.html b/docs/cts/umn/en-us_topic_0100363624.html
deleted file mode 100644
index 559cf83d..00000000
--- a/docs/cts/umn/en-us_topic_0100363624.html
+++ /dev/null
@@ -1,220 +0,0 @@
-
-
-
-
-Parent topic: Computing
-Key Operations on DCS-Distributed Cache Service (DCS) is an online distributed database service that is based on the cloud computing platform, available immediately after it is enabled, stable and reliable, scalable online, and easy to manage. -With CTS, you can record operations associated with DCS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100363625.html b/docs/cts/umn/en-us_topic_0100363625.html
deleted file mode 100644
index 25f28b28..00000000
--- a/docs/cts/umn/en-us_topic_0100363625.html
+++ /dev/null
@@ -1,220 +0,0 @@
-
-
-
-
-Parent topic: Database
-Key Operations on RDS-Relational Database Service (RDS) is a cloud-based web service that is reliable, scalable, easy to manage, and immediately ready for use. -With CTS, you can record operations associated with RDS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100363626.html b/docs/cts/umn/en-us_topic_0100363626.html
deleted file mode 100644
index 70c0c2b5..00000000
--- a/docs/cts/umn/en-us_topic_0100363626.html
+++ /dev/null
@@ -1,66 +0,0 @@
-
-
-
-
-Parent topic: Database
-Key Operations on DRS-Data Replication Service (DRS) is an easy-to-use, stable, and efficient cloud service used for database migration and synchronization. DRS makes data flow between databases simple, greatly reducing data transfer costs. DRS enables you to quickly transfer data between databases in different scenarios. -With CTS, you can record operations associated with DRS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100363627.html b/docs/cts/umn/en-us_topic_0100363627.html
deleted file mode 100644
index 13c6c45a..00000000
--- a/docs/cts/umn/en-us_topic_0100363627.html
+++ /dev/null
@@ -1,178 +0,0 @@
-
-
-
-
-Parent topic: Database
-Key Operations on DDS-Document Database Service (DDS) is compatible with the MongoDB protocol and is secure, highly available, reliable, scalable, and easy to use. It provides DB instance creation, scaling, redundancy, backup, restoration, monitoring, and alarm reporting functions with just a few clicks on the DDS console. -With CTS, you can record operations associated with DDS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100363631.html b/docs/cts/umn/en-us_topic_0100363631.html
deleted file mode 100644
index e14f95e4..00000000
--- a/docs/cts/umn/en-us_topic_0100363631.html
+++ /dev/null
@@ -1,52 +0,0 @@
-
-
-
-
-Parent topic: Database
-Key Operations on MRS-MapReduce Service (MRS) is a data processing and analysis service that is based on a cloud computing platform. It is stable, reliable, scalable, and easy to manage. -With CTS, you can record operations associated with MRS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100365438.html b/docs/cts/umn/en-us_topic_0100365438.html
deleted file mode 100644
index 26b58aec..00000000
--- a/docs/cts/umn/en-us_topic_0100365438.html
+++ /dev/null
@@ -1,52 +0,0 @@
-
-
-
-
-Parent topic: Data Analysis
-Key Operations on DIS-Data Ingestion Service (DIS) solves the problems of transmitting external data into cloud services. With DIS, you can build customized applications to process or analyze stream data to meet specific demands. -With CTS, you can record operations associated with DIS for future query, audit, and backtrack operations. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0100366885.html b/docs/cts/umn/en-us_topic_0100366885.html
deleted file mode 100644
index 12905687..00000000
--- a/docs/cts/umn/en-us_topic_0100366885.html
+++ /dev/null
@@ -1,1918 +0,0 @@
-
-
-
-
-Parent topic: Data Analysis
-Relationship Between Operations Triggered by IaaS OpenStack and Native OpenStack APIs-
-
-
-
-
diff --git a/docs/cts/umn/en-us_topic_0100498013.html b/docs/cts/umn/en-us_topic_0100498013.html
deleted file mode 100644
index 6cd5dcc2..00000000
--- a/docs/cts/umn/en-us_topic_0100498013.html
+++ /dev/null
@@ -1,94 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Key Operations on DWS-Data Warehouse Service (DWS) is an online data processing database based on the cloud infrastructure and platform and helps you mine and analyze massive data. -With CTS, you can record operations associated with DWS for later query, audit, and backtracking. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0101676084.html b/docs/cts/umn/en-us_topic_0101676084.html
deleted file mode 100644
index 1e124bc9..00000000
--- a/docs/cts/umn/en-us_topic_0101676084.html
+++ /dev/null
@@ -1,87 +0,0 @@
-
-
-
-
-Parent topic: Data Analysis
-Key Operations on CSS-Cloud Search Service (CSS) is a fully hosted distributed search engine service based on the cloud infrastructure and platform. It provides structured and unstructured text search, statistics, and report capabilities. -With CTS, you can record operations associated with CSS for later query, audit, and backtracking. - -
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139646.html b/docs/cts/umn/en-us_topic_0127139646.html
deleted file mode 100644
index c0759234..00000000
--- a/docs/cts/umn/en-us_topic_0127139646.html
+++ /dev/null
@@ -1,25 +0,0 @@
-
-
-
-
-Parent topic: Data Analysis
-Computing- -
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139647.html b/docs/cts/umn/en-us_topic_0127139647.html
deleted file mode 100644
index e1f79b9a..00000000
--- a/docs/cts/umn/en-us_topic_0127139647.html
+++ /dev/null
@@ -1,21 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Storage- -
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139648.html b/docs/cts/umn/en-us_topic_0127139648.html
deleted file mode 100644
index 6542c4fe..00000000
--- a/docs/cts/umn/en-us_topic_0127139648.html
+++ /dev/null
@@ -1,23 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Network- -
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139651.html b/docs/cts/umn/en-us_topic_0127139651.html
deleted file mode 100644
index c12a96e4..00000000
--- a/docs/cts/umn/en-us_topic_0127139651.html
+++ /dev/null
@@ -1,25 +0,0 @@
-
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Management & Deployment- -
-
-
-
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139652.html b/docs/cts/umn/en-us_topic_0127139652.html
deleted file mode 100644
index 6ba8145f..00000000
--- a/docs/cts/umn/en-us_topic_0127139652.html
+++ /dev/null
@@ -1,19 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Application- -
-
-
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139653.html b/docs/cts/umn/en-us_topic_0127139653.html
deleted file mode 100644
index 05371f26..00000000
--- a/docs/cts/umn/en-us_topic_0127139653.html
+++ /dev/null
@@ -1,23 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Database- -
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139655.html b/docs/cts/umn/en-us_topic_0127139655.html
deleted file mode 100644
index 773dbd06..00000000
--- a/docs/cts/umn/en-us_topic_0127139655.html
+++ /dev/null
@@ -1,19 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Security- -
-
-
-
-
diff --git a/docs/cts/umn/en-us_topic_0127139658.html b/docs/cts/umn/en-us_topic_0127139658.html
deleted file mode 100644
index 8fb0fa3f..00000000
--- a/docs/cts/umn/en-us_topic_0127139658.html
+++ /dev/null
@@ -1,21 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Data Analysis- -
-
-
diff --git a/docs/cts/umn/en-us_topic_0128329663.html b/docs/cts/umn/en-us_topic_0128329663.html
deleted file mode 100644
index bc3dcbd3..00000000
--- a/docs/cts/umn/en-us_topic_0128329663.html
+++ /dev/null
@@ -1,108 +0,0 @@
-
-
-
-
-Parent topic: Supported Services and Operation Lists
-Key Operations on CDN-Content Delivery Network (CDN) is an intelligent virtual network layer based on the existing Internet infrastructure. It delivers network content from origin servers to edge node servers distributed across a country, enabling end users to obtain desired content from the proximal node. -With CTS, you can record operations associated with CDN for future query, audit, and backtrack operations.
-
-
-
-
diff --git a/docs/cts/umn/public_sys-resources/imageclose.gif b/docs/cts/umn/public_sys-resources/imageclose.gif
new file mode 100644
index 00000000..3a3344af
Binary files /dev/null and b/docs/cts/umn/public_sys-resources/imageclose.gif differ
diff --git a/docs/cts/umn/public_sys-resources/imageclosehover.gif b/docs/cts/umn/public_sys-resources/imageclosehover.gif
new file mode 100644
index 00000000..8699d5e3
Binary files /dev/null and b/docs/cts/umn/public_sys-resources/imageclosehover.gif differ
diff --git a/docs/cts/umn/public_sys-resources/imagemax.gif b/docs/cts/umn/public_sys-resources/imagemax.gif
new file mode 100644
index 00000000..99c07dc2
Binary files /dev/null and b/docs/cts/umn/public_sys-resources/imagemax.gif differ
diff --git a/docs/cts/umn/public_sys-resources/imagemaxhover.gif b/docs/cts/umn/public_sys-resources/imagemaxhover.gif
new file mode 100644
index 00000000..d01d77d6
Binary files /dev/null and b/docs/cts/umn/public_sys-resources/imagemaxhover.gif differ
diff --git a/docs/cts/umn/public_sys-resources/macFFBgHack.png b/docs/cts/umn/public_sys-resources/macFFBgHack.png
new file mode 100644
index 00000000..ec811470
Binary files /dev/null and b/docs/cts/umn/public_sys-resources/macFFBgHack.png differ
-
-Parent topic: Network
- |
---|