After you configure alert notifications for your Anti-DDoS Origin instance, Alibaba Cloud notifies you of the most recent DDoS attack events that occur on your workloads. This way, you can handle exceptions and restore workloads at the earliest opportunity. This topic describes how to configure alert notifications for DDoS attack events.
Alert notification channels
Alert notification channels | Message Center | CloudMonitor | Log Service | |
---|---|---|---|---|
Supported editions of Anti-DDoS Origin instances | Anti-DDoS Origin Basic | Anti-DDoS Origin Enterprise | Anti-DDoS Origin Enterprise | Anti-DDoS Origin Enterprise |
Scenarios | General alerting scenarios in which you need to only be notified of attacks | General alerting scenarios in which you need to only be notified of attacks | General alerting scenarios in which you can use simple filter conditions to send alert notifications of important events | Enterprise-level alerting scenarios in which you can configure items such as service metrics, alert policies, notification methods, and content and generate statistical reports based on different combinations of the items |
Configuration complexity | Low | Low | Medium | High |
Flexibility | Low Alerts can be reported at the beginning and end of an event. |
Low Alerts can be reported at the beginning and end of an event. |
Medium Alerts can be reported at the beginning and end of a filtered important event. |
High Alerts can be reported at the beginning and end of an event based on traffic thresholds or on a combination of conditions. |
Notification methods |
|
|
||
Reliability and timeliness | The reliability and timeliness cannot be ensured. If a large number of highly concurrent requests are sent, rate limiting may be triggered.
Note We recommend that you deploy a self-managed traffic monitoring system. For example, you can monitor sudden increases and decreases in the number of requests that are sent to IP addresses of specific assets. You can also use external tools to check whether IP addresses of specific assets can be accessed.
|
The reliability is high. An alert notification is sent within 5 minutes after the alert is generated. | The reliability is high. An alert notification is sent 5 to 10 minutes after the alert is generated. | The reliability is high. An alert notification is sent 5 to 10 minutes after the alert is generated. |
Configure alert notifications in Message Center (supported for Anti-DDoS Origin Basic and Anti-DDoS Origin Enterprise)
Alibaba Cloud sends alert notifications to the specified contacts when DDoS attack events occur on an Anti-DDoS Origin instance.
- Log on to the Message Center console.
- On the Common Settings page, specify the notification methods, such as emails.
- In the left-side navigation pane, choose .
- In the Product Message section of the Common Settings page, select Security Notice. Then, select Internal Messages or Email based on your business requirements.
- In the lower part of the page, click Add Message Recipient. In the Modify Contact dialog box, select or specify contacts. Then, click Save.
Configure alert notifications in CloudMonitor (supported for Anti-DDoS Origin Enterprise)
If DDoS attack events occur on an Anti-DDoS Origin Enterprise instance, Alibaba Cloud sends alert notifications to the contacts in the selected contact group. Supported DDoS attack events are blackhole filtering events and traffic scrubbing events.
- Log on to the CloudMonitor console.
- Create an alert contact. If you have created a contact, skip this step.
- In the left-side navigation pane, choose .
- On the Alert Contacts tab, click Create Alert Contact. In the Set Alert Contact panel, configure the parameters, drag the slider to complete verification, and then click Ok.
- Create an alert contact group. If you have created an alert contact group, skip this step.
Note CloudMonitor sends alert notifications only to an alert contact group. You can add one or more alert contacts to an alert contact group.
- In the left-side navigation pane, choose .
- On the Alert Contact Group tab, click Create Alert Contact Group. In the Create Alert Contact Group panel, configure the parameters, select contacts, and then click Confirm.
- In the left-side navigation pane, choose .
- On the Event-triggered Alert Rules tab, click Create Alert Rule.
- In the Create/Modify Event-triggered Alert Rule panel, configure the parameters and click OK.
Section Parameter Description Basic Info Alert Rule Name Enter a name for the alert rule. Event-triggered Alert Rules Product Type Select Anti-DDoS Origin. Event Type Select the type of event for which you want to send alert notifications. Select DDoS Attacks. Event Level Select the severity level of the event for which you want to send alert notifications. Select Critical. The value is fixed as Critical. Event Name Select the event for which you want to send alert notifications. Valid values: ddosbgp_event_blackhole and ddosbgp_event_clean. Keyword Filtering In the Keyword Filtering field, enter a keyword for filtering and select a match condition from the Condition drop-down list. Valid values: - Contains any of the keywords: If the alert rule contains any one of the specified keywords, an alert notification is sent.
- Does not contain any of the keywords: If the alert rule does not contain any one of the specified keywords, an alert notification is sent.
SQL Filter Specify the SQL statements that are used for filtering. Resource Range Select the range of the resources to which the event-triggered alert rule is applied. Select All Resources. - All Resources: CloudMonitor sends alert notifications for all resource-related events based on your configurations.
- Application Groups: CloudMonitor sends alert notifications only for events that are related to the resources in the specified application group.
Notification Method Contact Group Select the alert contact groups to which alert notifications are sent. Alert Notification Specify the severity level and notification method of the event alert. Valid values: - Critical (Phone Call + Text Message + Email + Webhook)
- Warning (Text Message + Email + Webhook)
- Info (Email + Webhook)
Message Queue, Function Compute, URL Callback, and Log Service You do not need to specify these parameters. Mute For Select the period during which an alert is muted. This parameter specifies the interval at which an alert notification is sent to the specified contacts again if the alert is not cleared.
Configure alert notifications in Log Service (supported for Anti-DDoS Origin Enterprise)
Anti-DDoS Origin Enterprise supports the mitigation logs feature. You can query and analyze mitigation logs of Anti-DDoS Origin Enterprise instances. You can use query and analysis results to create custom alert rules for metrics based on your business requirements.
- Log on to the Traffic Security console.
- In the left-side navigation pane, choose .
- In the top navigation bar, select the resource group and region of your instance.
- Activate Log Service as prompted and complete Resource Access Management (RAM) authorization. Skip this step if Log Service is activated and authorization is complete.
- Enable the mitigation logs feature for the instance. Skip this step if the feature is enabled.
- On the Mitigation Logs page, select the required instance and click Upgrade Now.
- On the Anti-DDoS Basic | Upgrade/Downgrade page, set Mitigation Logs to On. Then, read and select Terms of Service.
- Click Buy Now and then click Subscribe to enable the mitigation logs feature for the instance.
- Configure an alert monitoring rule for the instance.