检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
You can use the logs to perform security analysis, track resource changes, audit compliance, and locate faults. After CTS is enabled, it can record VPC operations. If you want to enable and configure CTS, refer to CTS Getting Started.
Traffic mirroring: mirrors traffic that meets a mirror filter from an elastic network interface to a destination, where you can use the mirrored traffic for inspection, audit analysis, and troubleshooting. For details, see Traffic Mirroring Overview.
Resources can be centrally managed in one account, which helps enterprises configure service security policies in a centralized manner and better monitor and audit resource usage for higher security.
Traffic mirroring: mirrors traffic that meets a mirror filter from an elastic network interface to a destination, where you can use the mirrored traffic for inspection, audit analysis, and troubleshooting. For details, see Traffic Mirroring Overview.
You can then send the traffic for inspection, audit analysis, and troubleshooting. Traffic Mirroring Overview
Key Operations Recorded by CTS With CTS, you can record operations performed on the VPC service for further query, audit, and backtracking purposes. Table 1 lists the VPC operations that can be recorded by CTS.
You can then send the traffic for inspection, audit analysis, and troubleshooting. The following describes the working principles of traffic mirroring.
The value can contain a maximum of 255 characters. firewall_rules No Array of strings Specifies the firewall rules referenced by the network ACL policy. audited No Boolean Specifies the audit flag. The value can be true or false.
the network ACL policy. description String Provides supplementary information about the network ACL policy. tenant_id String Specifies the project ID. firewall_rules Array of strings Specifies the firewall rules referenced by the network ACL policy. audited Boolean Specifies the audit
The value can contain a maximum of 255 characters. firewall_rules No Array of strings Specifies the firewall rules referenced by the network ACL policy. audited No Boolean Specifies the audit flag. The value can be true or false.
You can then send the traffic for inspection, audit analysis, and troubleshooting. Currently, the Traffic Mirroring function is free. You will be notified in advance if the billing starts. Currently, Traffic Mirroring is available only in certain regions.
name of the network ACL policy. description String Provides supplementary information about the network ACL policy. tenant_id String Specifies the project ID. firewall_rules Array of strings Specifies the rules referenced by the network ACL policy. audited Boolean Specifies the audit