CloudLens for OSS provides various charts that display the analysis results for the logs of Object Storage Service (OSS) buckets by resource usage, access analysis, and security analysis.
Prerequisites
The log collection feature is enabled for detailed access logs. For more information, see Enable the log collection feature.
The Access Distribution and Object Operation Risk Analysis dashboards depend on detailed access logs.
Entry point
- Log on to the Log Service console.
In the Log Application section, click the Cloud Service Lens tab. Then, click CloudLens for OSS.
In the left-side navigation pane, click Report Center.
Resource Usage
The Resource Usage report provides the following dashboards: OSS Usage Overview, Storage Usage Details, Traffic Bandwidth Usage Details, and Request Statistics.
OSS Usage Overview
The OSS Usage Overview dashboard provides an overview of OSS resource usage in basic dimensions, such as storage and traffic.
Storage Usage Details
The Storage Usage Details dashboard provides storage usage details in each dimension. Billable storage usage indicates the size of data for which fees are generated.
In OSS, the billable storage usage of Standard objects is the same as the actual storage usage of Standard objects.
The minimum billable size is 64 KB for non-Standard objects. If the data size of a non-Standard object is less than 64 KB, the billable storage usage is 64 KB.
Traffic Bandwidth Usage Details
The Traffic Bandwidth Usage Details dashboard provides bandwidth usage details in each dimension.
Request Statistics
The Request Statistics dashboard provides request statistics in each dimension.
Access Analysis
The Access Analysis report provides the Top Analysis and Access Distribution dashboards.
Top Analysis
The Top Analysis dashboard provides the analysis results of each OSS bucket, including traffic distribution and top access distribution.
Access Distribution
The Access Distribution dashboard provides the overall operational statistics of OSS, including page views (PVs), unique visitors (UVs), traffic, and distribution of access over the Internet.
Security Analysis
The Security Analysis report provides the Bucket Configuration Health Analysis and Object Operation Risk Analysis dashboards.
Bucket Configuration Health Analysis
The Bucket Configuration Health Analysis dashboard provides the risks in OSS bucket configurations.
Object Operation Risk Analysis
The Object Operation Risk Analysis dashboard provides the high-risk operations that are performed on OSS objects.