Alibaba Cloud Lens for OSS Best Practices

1、 Product introduction

As we all know, object storage is one of the most common forms of cloud storage. With the continuous deepening of customers' digital transformation, more application services and products begin to be deployed on the cloud, and the data stored on OSS also starts to grow rapidly, and data has become one of the most important assets of customers.

At the same time, users face a series of challenges when managing, operating and maintaining assets.

First, there is a lack of more sophisticated management of resources. For example, when customers use OSS, they can view the basic usage data through the Dashboard. However, there is a lack of usage monitoring, and automatic alerts and flexible cost management are not available.

Secondly, OSS is a natural Internet oriented storage. Customers need to pay close attention to the access situation and conduct multi-dimensional analysis to ensure correct access and use. Although the current OSS has basic access information, it lacks multi-dimensional analysis. Customers must analyze the logs themselves, which requires a high degree of professionalism.

Third, the current basic monitoring information of OSS is not real-time enough to slow down users' requirements for agile operation and maintenance.

Fourth, OSS provides customers with rich functional features that can flexibly meet business requirements. However, for users who are not highly professional in storage, problems such as improper use, improper configuration, and inability to quickly locate exceptions often occur, which require the guidance of best practices.

How to help customers realize the operation and maintenance management of object storage in an agile, professional and refined manner?

Alibaba Cloud Lens for OSS uses the analysis base of SLS storage to interface with data sources such as access logs, monitoring indicators, key configuration measurements, and multi account information. Through data association analysis such as logs, indicators, and measurements, it enables processing, query analysis, visualization, monitoring alerts, pre subscriptions, intelligent cruising, and suggestion guidance.

Users can use the Alibaba Cloud Lens unified portal on the SLS console or the embedded portal on the OSS console to achieve dual portals.

By understanding the usage of OSS, the product provides a scenario based inside market for access analysis, resource usage, exception detection, security analysis, and health analysis. In addition, it also provides data access module management, including access management, storage target library management, automatic collection configuration, general function modules, etc.

The current functional modules of Alibaba Cloud Lens for OSS mainly include resource usage, access analysis, exception monitoring and health analysis. Through resource usage, you can understand the usage of core resources such as storage and traffic, and view resource utilization in multiple dimensions; Through access analysis, you can intuitively view the analysis of access, and help the business to do operational analysis; Through anomaly monitoring, alarms and rules can be defined, and anomalies can be found in time and responded quickly; Through health analysis, you can quickly understand the current configuration security situation and avoid potential security risks and improper use.

The above functions enable users to better manage the basic resources of object storage, improve their self service ability, enable users to have a more comprehensive observation ability, and help users automatically complete data collection.

Scenario 1: Abnormal fault of real-time alarm.

When using OSS, many customers will encounter the situation that the external network traffic is stolen, resulting in a large number of unreasonable fees and public opinion risks. Therefore, a timely warning function is urgently needed.

Through Alibaba Cloud Lens for OSS, users can set monitoring point thresholds for monitoring indicator items such as external network traffic. In case of abnormal conditions, it can give a quick alarm to help users converge risks.

Scenario 2: Quickly view resource usage.

The resource usage panel of Alibaba Cloud Lens for OSS can quickly display the usage of core resources such as storage capacity and bandwidth. There are many dimensions to display. For example, it can be displayed in order of the top 20 bucket requests. The usage and measurement of various storage categories can be monitored.

Scenario 3: Show the usage behavior.

Enterprises using object storage to support core businesses need to perceive users' use behavior, such as users' access sources, access methods, hot spots, etc. Such information needs to be used to help with business operation analysis. Cloud Lens can help users display current OSS access, such as top analysis, hierarchical request analysis, status code trends, and the distribution of access traffic to the external network.

Scenario 4: Operation of finding hidden and high-risk configuration problems.

Many users need to use OSS for external services. High risk configurations can easily lead to data disclosure, privacy disclosure, etc. Cloud Lens for OSS can help users monitor whether the current configuration is safe, conduct health analysis, and detect whether the common configuration is operated according to best practices. Configuration can help users use OSS better and more securely.

2、 Demo Demo: Use and Operation of Cloud Lens for OSS

The access management page is an overall overview page, from which you can view the total number of buckets in the current OSS and the number of access detail logs. There is a detailed list at the bottom of the page, which details the bucket region and the status of access detail logs.

If the real-time query function is enabled on the OSS console, you can view the status of the collection in the access details log status. Data such as resource usage, access analysis and security analysis can be quickly obtained in the report center.

Query analysis includes access to detailed logs and measurement logs.

The access detail log is mainly based on the user's access log for analysis, and supports business presentation through tables or original methods. Use cases can be queried in the statistics chart. By executing the query statement, you can view the number of get requests, post requests, put requests, and delete requests corresponding to the user's bucket.

You can quickly obtain the metering information of metering items through metering logs, including common OSS metering items, storage, and get_ Request, etc.

Anomaly detection can help users create alarms and understand the alarm situation. Alarms can be created for specific buckets in alarm centers.

For example, if the user is very concerned about the sudden increase of 403 requests, he can select "403 request sudden increase" as the alarm rule, and set the corresponding threshold and growth rate threshold, severity, silent period, recovery notification, continuous trigger threshold and other indicators.

The alarm situation provides the ability to view the current OSS alarm situation from the perspective of the overall market.

The report center provides three dimensions: resource usage, access analysis, and security analysis to help users understand resource usage.

The resource usage includes the main storage types on the current OSS, the total capacity occupied, the distribution, the maximum storage capacity, and the maximum bucket.

In addition, because OSS is Internet oriented, traffic is also a very important indicator item. Users can view bandwidth, inflow traffic, inflow bandwidth and other multi-dimensional information to quickly grasp the current traffic situation.

The request analysis includes the distribution of requests, the number of requests, the distribution of the number of requests for large and small files, the distribution of the status code trend, and the traffic that takes up high resources, so that you can easily master the business status.

Security analysis can help users quickly understand the current OSS configuration. It includes the number of public read/write buckets, key data protection or data security configuration items, such as multi version configuration, security chain configuration, and data encryption configuration, to help users quickly master the current OSS security status.

In addition to bucket configuration health analysis, you can also select specific areas to view object level operational risk analysis.

Cloud Lens for OSS can help users achieve better observability through query analysis, anomaly detection, report center and other capabilities.

Related Articles

Explore More Special Offers

  1. Short Message Service(SMS) & Mail Service

    50,000 email package starts as low as USD 1.99, 120 short messages start at only USD 1.00

phone Contact Us