Report center

Updated at: 2024-08-15 12:52

The new version of Log Audit Service provides visualization tools to aggregate and display the key performance metrics, important data, and data analysis results. You can click Cloud Security Audit, Runtime Security, or AccessKey Pair Security Audit below Report Center in Log Audit Service to view related data.

Entry point

  1. Log on to the Simple Log Service console. In the Log Application section, click the Audit & Security tab, and then click Log Audit Service (New Version).

  2. Click the project that you want to manage. In the left-side navigation pane of the page that appears, click Report Center.

Cloud Service Audit

Prerequisites

The log collection feature is enabled for your cloud service. For more information, see Enable the collection of cloud service logs.

Runtime Security

Prerequisites

The log collection feature is enabled for your runtime.

Falco

The Runtime Events Alert Overview dashboard displays alerts by alert level, alert type, alert rule, and pod. You can view charts such as Alert Event(by Priority), Alert Events(by event_type), and Alert Events(by rule).

image

Tetragon

Runtime Events Overview

The Runtime Events Overview dashboard displays runtime events by file, network, and process. You can view charts such as Total Runtime Events, File Events, and Network Events.

image

Runtime Events Trace

The Runtime Events Trace dashboard displays the details of event trace calling relationships during container runtime.

image

AccessKey Pair Security Audit

The AccessKey Pair Security Audit page provides the Cloud Service/Global Service - AK Audit, OSS-AK Audit, and SLS-AK Audit dashboards. The dashboards display AccessKey pair-related audit and statistical information for global cloud services, Object Storage Service (OSS), and Simple Log Service based on the collected logs. You can use filters such as User Identity ID, Sub Account AK, and Assumed Roles to obtain role-based information.

image

  • On this page (1, T)
  • Entry point
  • Cloud Service Audit
  • Prerequisites
  • Runtime Security
  • Prerequisites
  • Falco
  • Tetragon
  • AccessKey Pair Security Audit
Feedback