All Products
Search
Document Center

Simple Log Service:Query and analysis

Last Updated:Aug 26, 2024

After you enable the log collection feature for cloud services in the new version of Log Audit Service, you can query and analyze the collected logs in the default Logstore to which logs are collected. For more information, see Usage notes of cloud service log collection. This topic describes the log types that are supported by cloud services and runtimes.

Cloud services

Prerequisites

The log collection feature is enabled for your cloud service. For more information, see Configure the collection of operational logs.

Entry point

  1. Log on to the Simple Log Service console. In the Log Application section, choose Audit & Security > Log Audit Service (New Version).

    image

  2. Click the project that you want to manage. In the left-side navigation pane of the page that appears, choose Query and Analysis > Cloud Services. On the Cloud Services page, click the cloud service that you want to manage. On the page that appears, query and analyze the logs that are collected from the cloud service.

    image

Log types

Cloud service category

Cloud service name

Log type

Cloud native

Simple Log Service

Audit logs

Error logs

Metrics

Detailed logs

Job operational logs

Storage

Object Storage Service (OSS)

Detailed access logs

Metering logs

Network

Application Load Balancer (ALB)

Access logs

Classic Load Balancer (CLB)

Access logs

Virtual Private Cloud (VPC)

Flow logs

Enterprise foundation service

Alibaba Cloud DNS (DNS)

Intranet private DNS logs

Security

Web Application Firewall 2.0 (WAF 2.0)

Access logs

WAF 3.0 (subscription) and WAF 3.0 (pay-as-you-go)

Access logs

Security Center and Security Center (pay-as-you-go)

Web access logs

DNS resolution logs

Network session logs

Local DNS logs

Logon logs

Network connection logs

Process startup logs

Brute-force attack logs

Account snapshot logs

Client event logs

Process snapshot logs

Network snapshot logs

DNS request logs

Security logs (For more information, see Vulnerability logs, Baseline logs, Alert logs, Configuration assessment logs, Network defense logs, Application defense logs, and Malicious file detection logs.)

Anti-DDoS Origin

Access logs

Anti-DDoS Proxy (Chinese Mainland) and Anti-DDoS Proxy (Outside Chinese Mainland)

Access logs

Cloud Firewall and Cloud Firewall (pay-as-you-go)

Firewall logs

Runtimes

Prerequisites

The log collection feature is enabled for your runtime. For more information, see Configure the log collection feature for runtimes.

Entry point

  1. Log on to the Simple Log Service console. In the Log Application section, choose Audit & Security > Log Audit Service (New Version).

    image

  2. Click the project that you want to manage. In the left-side navigation pane of the page that appears, choose Query and Analysis > Runtime. On the Runtime page, click the application tab that you want to manage. Then, query and analyze the logs that are collected from the application.

    image

Log types

Application

Log type

Tetragon

Runtime logs

Falco

Runtime logs

Systemd Journal

systemd journal logs