All Products
Search
Document Center

Anti-DDoS:Operation logs

Last Updated:Dec 16, 2024

This topic explains how to query the operation logs for an Anti-DDoS Origin instance.

Query time range

Operation logs can be queried for up to 30 days.

Supported operation logs

Operation

Description

Bind IP addresses

Add assets with public IP addresses to the protected objects of an Anti-DDoS Origin instance.

Unbind IP addresses

Remove assets with public IP addresses from the protected objects of an Anti-DDoS Origin instance.

Add asset group

Add WAF and GA to the protected objects of an Anti-DDoS Origin instance.

Delete asset group

Remove WAF and GA from the protected objects of an Anti-DDoS Origin instance.

Downgrade

Downgrade the specifications of an Anti-DDoS Origin instance.

Deactivate blackhole filtering

Deactivate the blackhole filtering for an Anti-DDoS Origin instance.

Reset quota on blackhole filtering deactivation

Reset the number of times that blackhole filtering can be deactivated for an Anti-DDoS Origin instance.

Enable burstable best-effort protection

The Anti-DDoS Origin instance resumes best-effort protection after renewal.

  • Enable daily 95th percentile bandwidth

  • Enable monthly 95th percentile bandwidth

  • Periodically switch between daily and monthly 95th percentile bandwidth

  • Disable daily 95th percentile bandwidth

  • Disable monthly 95th percentile bandwidth

  • Disable burstable clean bandwidth after payment becomes overdue

  • Disable burstable clean bandwidth after instance expires

Operations related to burstable clean bandwidth.

View operation logs

  1. Go to the Operation Logs page of the Traffic Security console.

  2. In the top navigation bar, select the resource group to which the instances belong and the region in which the instances reside.

    • Anti-DDoS Origin 1.0 (Subscription) instances: Select the region in which the instance resides.

    • Anti-DDoS Origin 2.0 (Subscription) and Anti-DDoS Origin 2.0 (Pay-as-you-go) instances: Select All Regions.

  3. Select the desired Anti-DDoS Origin instance and time range to view the operation log.