If your service IP address encounters volumetric DDoS attacks after your service IP
address is added to Anti-DDoS Origin Enterprise, blackhole filtering may still be
triggered. To avoid extended periods of service disruption, you must deactivate blackhole
filtering at the earliest opportunity. Anti-DDoS Origin Enterprise provides a solution
to configure alerts and automatically deactivate blackhole filtering.
Prerequisites
This solution requires you to call an API operation of Anti-DDoS Origin Enterprise.
Therefore, this solution is available only for Anti-DDoS Origin Enterprise instances.
Before you use this solution, make sure that your service IP address is added to an
Anti-DDoS Origin Enterprise instance. For more information, see
Add a cloud service to Anti-DDoS Origin Enterprise for protection.
Background information
You can manually deactivate blackhole filtering for Anti-DDoS Origin Enterprise instances
in the Anti-DDoS Basic console. For more information, see
Deactivate blackhole filtering. However, manual deactivation may result in delays and unexpected errors. If your
service requires a high level of stability and continuity, use the following method
to configure alerts and automatically deactivate blackhole filtering:
- Create an alert rule in the Cloud Monitor console to monitor blackhole filtering that
is triggered on an Anti-DDoS Origin Enterprise instance.
Note If blackhole filtering is triggered and detected on the IP addresses that are added
to Anti-DDoS Origin Enterprise, Cloud Monitor sends messages about blackhole filtering.
In other scenarios, no messages about blackhole filtering are sent.
- Create an alert rule to automatically deactivate blackhole filtering on Anti-DDoS
Origin Enterprise by calling the DeleteBlackhole operation. For more information,
see DeleteBlackhole.
Similarly, you can create rules to automatically call an API operation of Alibaba
Cloud DNS. The operation resolves your domain name to the IP address of an Anti-DDoS
Pro or Anti-DDoS Premium instance during DDoS attacks.
Procedure
- Log on to the Cloud Monitor console.
- In the left-side navigation pane, choose .
- On the Alert Rules page, click the Event Alert tab.
- Click Create Event Alert to create a rule for blackhole filtering.
- In the panel that appears, set Product Type to Anti-DDoS Origin.
- In the Event Name drop-down list, select ddosbgp_event_blackhole.

- Select the channel to push alert notifications based your service requirements and
click OK.
Cloud Monitor supports the following channels:
- MNS queue
- Function service
- URL callback
- Log Service

The event alert is created. When Cloud Monitor detects that blackhole filtering is
triggered on an IP address that is added to Anti-DDoS Origin Enterprise, Cloud Monitor
generates an alert and pushes the following message through the specified channel.
Sample alert message:
{
"action": "add", //The event status. The value add indicates that the event begins, and the value del indicates that the event ends.
"bps": 0, //The throughput when the event is triggered. Unit: Mbit/s.
"pps": 0, //The packet rate when the event is triggered. Unit: packets per second (PPS).
"instanceId": "ddosbgp-cn-78v17******", //The ID of the Anti-DDoS Origin Enterprise instance.
"ip": "47. *. *. *", //The IP address on which the event is triggered.
"regionId": "cn-hangzhou", //The ID of the region where the Anti-DDoS Origin Enterprise instance resides.
"time": 1564104493000, //The time when the event begins. The value is a timestamp. Unit: milliseconds.
"type": "blackhole" //The event type. The value defense indicates a traffic scrubbing event and the value blackhole indicates a blackhole filtering event.
}
- Specify an alert action that calls the DeleteBlackhole operation to automatically
deactivate blackhole filtering. For more information, see DeleteBlackhole.