You can use cloud service interaction for services that use Global Accelerator or other Alibaba Cloud resources that have public IP addresses. After you add your service to Anti-DDoS Pro or Anti-DDoS Premium, the cloud resources can be associated with Anti-DDoS Pro or Anti-DDoS Premium. If no attacks occur, traffic is not scrubbed by Anti-DDoS Pro or Anti-DDoS Premium and directly reaches the origin server. If attacks occur, traffic is automatically switched to Anti-DDoS Pro or Anti-DDoS Premium for scrubbing. Normal traffic is then forwarded to the origin server.
Prerequisites
- Your service uses Global Accelerator or Alibaba Cloud resources that have public IP addresses, such as an EIP, a WAF instance, or an ECS or SLB instance with a public IP address.
For more information about the limits of interaction between Global Accelerator and Anti-DDoS Pro or Anti-DDoS Premium, see Interaction between Global Accelerator and Anti-DDoS Pro or Anti-DDoS Premium.
- An Anti-DDoS Pro or Anti-DDoS Premium instance is purchased, and your service is added to Anti-DDoS Pro or Anti-DDoS Premium.
For more information, see Add a website (website service) and Create forwarding rules(non-website service).
Notice The bandwidth and QPS of the Anti-DDoS Pro or Anti-DDoS Premium instance must meet protection requirements of your service. This ensures that the instance can process service traffic after the traffic is switched to Anti-DDoS Pro or Anti-DDoS Premium.
- The Anti-DDoS Pro or Anti-DDoS Premium instance can properly forward traffic. For more information, see Verify the forwarding configuration on your local machine.
Background information
If you want to avoid additional latency, you can use Sec-Traffic Manager to create a cloud service interaction rule. This rule allows traffic to be directly sent to the origin server in normal periods and is switched to Anti-DDoS Pro or Anti-DDoS Premium only when an attack occurs. You can specify a time to automatically switch traffic back to the origin server or manually switch the traffic back.
Interaction between Global Accelerator and Anti-DDoS Pro or Anti-DDoS Premium
- Interaction between Global Accelerator and Anti-DDoS Pro
- When you add a domain name to Anti-DDoS Pro, in the Enter Site Information step, set Server IP to Origin Server Domain and enter the CNAME address provided by the Global Accelerator instance. For more
information, see Add a website.
Service traffic is scrubbed by Anti-DDoS Pro and then forwarded to Global Accelerator. The back-to-origin traffic of Anti-DDoS Pro is sent to the IP address of Global Accelerator by using a leased line and is not affected even if blackhole filtering is triggered for the IP address. This protects your service and implements network acceleration.
You can obtain the CNAME address on the instance details page in the Global Accelerator console. For more information, see Step 1: Obtain the CNAME of the accelerated domain. - When you add a port to Anti-DDoS Pro, set Origin Server IP to the IP address of your origin server in the port forwarding rule. Domain names
are not supported. For more information, see Create forwarding rules.
Note In this configuration, service access is not accelerated.
- When you add a domain name to Anti-DDoS Pro, in the Enter Site Information step, set Server IP to Origin Server Domain and enter the CNAME address provided by the Global Accelerator instance. For more
information, see Add a website.
- Interaction between Global Accelerator and Anti-DDoS Premium
When you add a domain name or port to Anti-DDoS Premium, set Server IP or Origin Server IP to the IP address of your origin server.Note In this configuration, service access is not accelerated.
Procedure
What to do next
- Switch traffic back: Assume that the general interaction rule takes effect and service
traffic is switched to Anti-DDoS Pro or Anti-DDoS Premium. If the waiting time of switching back has not arrived, you can click Switch back to manually switch the traffic back to the cloud resource.
Note The Switch back button appears only when service traffic is switched to Anti-DDoS or Anti-DDoS Premium and the waiting time of switching back does not arrive.The following exceptions may occur when you perform this operation:
- If all cloud resources are in blackhole filtering, the operation fails.
- If some cloud resources are in blackhole filtering and some are normal, traffic is switched to the normal cloud resources. After blackhole filtering is deactivated, traffic is automatically switched to other cloud resources.
- Edit an interaction rule: On the General tab, find the rule that you want to edit and click Edit in the Actions column. You can modify parameters except Interaction Scenario and Name.
- Delete an interaction rule: On the General tab, find the rule that you want to delete and click Delete in the Actions column.
Warning Before you delete an interaction rule, make sure that the service traffic is no longer directed to the CNAME address assigned by Sec-Traffic Manager. Otherwise, your service becomes unavailable after you delete the rule.