This topic explains how to query the operation logs for an Anti-DDoS Origin instance.
Query time range
Operation logs can be queried for up to 30 days.
Supported operation logs
Operation | Description |
Bind IP addresses | Add assets with public IP addresses to the protected objects of an Anti-DDoS Origin instance. |
Unbind IP addresses | Remove assets with public IP addresses from the protected objects of an Anti-DDoS Origin instance. |
Add asset group | Add WAF and GA to the protected objects of an Anti-DDoS Origin instance. |
Delete asset group | Remove WAF and GA from the protected objects of an Anti-DDoS Origin instance. |
Downgrade | Downgrade the specifications of an Anti-DDoS Origin instance. |
Deactivate blackhole filtering | Deactivate the blackhole filtering for an Anti-DDoS Origin instance. |
Reset quota on blackhole filtering deactivation | Reset the number of times that blackhole filtering can be deactivated for an Anti-DDoS Origin instance. |
Enable burstable best-effort protection | The Anti-DDoS Origin instance resumes best-effort protection after renewal. |
| Operations related to burstable clean bandwidth. |
View operation logs
Go to the Operation Logs page of the Traffic Security console.
In the top navigation bar, select the resource group to which the instances belong and the region in which the instances reside.
Anti-DDoS Origin 1.0 (Subscription) instances: Select the region in which the instance resides.
Anti-DDoS Origin 2.0 (Subscription) and Anti-DDoS Origin 2.0 (Pay-as-you-go) instances: Select All Regions.
Select the desired Anti-DDoS Origin instance and time range to view the operation log.