Cloud Trace Service (CTS)

Full Coverage

CTS records cloud resource operations and changes in real time. Trace coverage is comprehensive, diverse, and fine-grained.

Access Security

Only system administrators can authorize viewing and accessing traces. Strict permission control reduces the risks of unauthorized operations.

Data Security

Traces are stored and transmitted with enhanced encryption, and cannot be modified or deleted on the console or using APIs.

Efficient Governance

Centralized, automated, and secure trace management enables highly available and cost-effective IT governance.

Why Huawei Cloud CTS?

Operation Recording

Operation Recording

  • Logs operations performed on the console or by calling APIs

  • Logs operations triggered by system calls

Multi-dimensional, Flexible Query of Cloud Logs

Multi-dimensional, Flexible Query of Cloud Logs

  • Searches by log source, operation type, resource information, and time

  • Searches with Log Tank Service (LTS) flexibility

Trackers for Encrypted Storage

Trackers for Encrypted Storage

  • Enabling CTS by creating a tracker

  • Log transfer, encrypted storage, and key event notifications available with trackers

DEW for More Secure Access

DEW for More Secure Access

  • Working with Data Encryption Workshop (DEW) to encrypt trace files during transfer

  • Reduced risk of unauthorized access

Application Scenarios

Compliance Auditing
Compliance Auditing

CTS provides log audit and related security capabilities, making it easy to comply with common information system security and system building standards (such as standards of financial cloud and trusted cloud).

Advantages
Compliance

Traces are in a uniform format and conform to common standards.

Reliability

Traces are encrypted when they are generated, transmitted, and stored.

Cost-effectiveness

CTS itself is free, and helps you save money in terms of maintenance too. Traces can be merged to reduce storage costs.

Related Services
Resource Tracking
Resource Tracking

Query operations and changes made on cloud resources throughout their lifecycle.

Advantages
Real Time

Operations and changes are recorded and can be queried in real time. You can also get real-time email or SMS notifications for key events.

Integrity

All console and API operations are recorded. Any alteration to trace files can be detected by integrity verification.

Reliability

Traces are encrypted when they are generated, transmitted, and stored.

Related Services
Fault Locating
Fault Locating

In case of a fault, use filters to quickly search for unusual operations. This accelerates troubleshooting and reduces workforce costs.

Advantages
Multi-filters

Search for traces by combining multiple filters.

Full Details

Traces contain necessary details about operations and are in a unified format, so you can quickly find whatever information you want.

Efficiency

The search UI makes it easy to search for traces and gives you instant results.

Related Services
Security Analysis
Security Analysis

Each trace records details of an operation: when an action was performed by which user, and the IP address from which a request was sent. This helps you detect unauthorized activities and analyze resource changes. CTS can also send SMS and email notifications in real time.

Advantages
Real Time

Operations are recorded accurately and in real time. You can query traces at any time.

Full Coverage

All operations are captured: both those performed on the console and those triggered by an API.

Reliability

Traces are encrypted when they are generated, transmitted, and stored.

Related Services
Get

Free Trial Products

and
Start an Amazing Cloud Journey
Try Free

More Services

More Services