Operation logs record key actions taken on your Anti-DDoS Proxy instance, such as instance purchases, blackhole filtering deactivations, and packet capture task management. You can query logs from the console for up to 180 days.
Covered operations
Not all actions are logged — only the following operation types are recorded.
| Type | Recorded operations |
|---|---|
| IP | Purchase and release of instances; deactivation of blackhole filtering; traffic blocking and unblocking; changes of the scrubbing mode for Layer 4 traffic; changes of the mitigation mode for HTTP flood attacks; changes of the burstable protection bandwidth |
| Anti-DDoS plan | Consumption of Anti-DDoS plans |
| ECS | Releases of the IP addresses of ECS instances |
| Burstable clean bandwidth | Enabling and disabling of the burstable clean bandwidth feature; changes of the metering method; changes of the burstable clean bandwidth |
| Burstable QPS | Enabling and disabling of the burstable QPS feature; changes of the metering method |
| Analysis on captured packets | Creation of packet capture tasks; deletion of packet capture tasks; deletion of packet capture files; automatic deletion of packet capture files upon expiration |
Prerequisites
Before you begin, ensure that you have:
An Anti-DDoS Proxy (Chinese Mainland) or Anti-DDoS Proxy (Outside Chinese Mainland) instance. For details, see Purchase an Anti-DDoS Proxy instance
View operation logs
Log on to the Anti-DDoS Proxy console.
In the top navigation bar, select the region of your instance.
Anti-DDoS Proxy (Chinese Mainland): select Chinese Mainland.
Anti-DDoS Proxy (Outside Chinese Mainland): select Outside Chinese Mainland.
In the left-side navigation pane, choose Investigation > Operation Logs.
On the Operation Logs page, specify a type and a time range, then click the search icon to view matching logs.