Log reports on the Log Analysis page of the Anti-DDoS Pro and Anti-DDoS Premium console support dashboards of Log Service. You can view log reports on the default dashboards: DDoS Access Center and DDoS Operation Center. After you enable Log Analysis for a domain name, you can query log reports on the default dashboards.
Prerequisites
- The domain name of your website is added to Anti-DDoS Pro or Anti-DDoS Premium. For more information, see Add a website.
- The Log Analysis feature is enabled for the domain name. For more information, see Overview.
Procedure
Charts on the default dashboards
DDoS Access Center
Chart name | Type | Default time range | Description | Example value |
---|---|---|---|---|
PV | Single value | 1 hour (relative) | The total number of PVs. | 100000 |
UV | Single value | 1 hour (relative) | The total number of UVs. | 100000 |
Inbound traffic | Single value | 1 hour (relative) | The total volume of inbound traffic of the website. Unit: MB. | 300 MB |
Peak network in | Single value | Today (time frame) | The maximum inbound data transmission rate of the website. Unit: byte/s. | 100 Bytes/s |
Peak network out | Single value | Today (time frame) | The maximum outbound data transmission rate of the website. Unit: byte/s. | 100 Bytes/s |
Traffic network trend | Double-line chart | 1 week (relative) | The trends of inbound and outbound traffic. Unit: KB/s. | None |
PV/UV trends | Double-line chart | 1 week (relative) | The trends of PVs and UVs. | None |
Access status distribution | Pie chart | 1 week (relative) | The distribution of requests with different status codes, such as 400, 304, and 200. Unit: count/minute. | None |
Access source | World map | 1 hour (relative) | The distribution of PVs from different countries. | None |
Traffic in source (world) | World map | 1 hour (relative) | The distribution of inbound traffic from different countries. Unit: MB. | None |
Traffic in source (China) | Map of China | 1 hour (relative) | The distribution of inbound traffic from different provinces in China. Unit: MB. | None |
Access heat map | Amap | 1 hour (relative) | The heat map that shows the geographical locations of visitors. | None |
Network provider source | Donut chart | 1 hour (relative) | The distribution of the inbound traffic from different Internet service providers (ISPs), such as China Telecom, China Unicom, China Mobile, and CERNET. Unit: MB. | None |
Referer | Table | 1 hour (relative) | The top 100 most used referer URLs, target hosts, and the number of redirections. | None |
Access line distribution | Donut chart | 1 hour (relative) | The distribution of Anti-DDoS Pro or Anti-DDoS Premium lines. | None |
Client distribution | Donut chart | 1 hour (relative) | The top 20 most used user agents, such as iPhone, iPad, Internet Explorer, and Google Chrome. | None |
Request content type distribution | Donut chart | 1 hour (relative) | The top 20 most requested content types, such as HTML, form, JSON, and streaming data. | None |
Access domain name | Donut chart | 1 hour (relative) | The top 20 most visited domain names of the website. | None |
Top clients | Table | 1 hour (relative) | Information about the top 100 clients that initiates the most requests. The information includes the IP addresses, PVs, inbound traffic, number of invalid requests, and number of attacks. | None |
URL with slowest response | Table | 1 hour (relative) | Information about the top 100 URLs with the longest response time. The information includes the websites, URLs, response time, and the number of accesses. | None |
DDoS Operation Center
Chart name | Type | Default time range | Description | Example value |
---|---|---|---|---|
Inbound and outbound bandwidth (Kbit/s) | Double-line chart | 1 week (relative) | The trends of inbound and outbound bandwidth. | None |
Request and interception | Double-line chart | 1 week (relative) | The trends of the total numbers of requests and intercepted attack requests. | None |
Attacker list | Table | 1 hour (relative) | Information about the top 100 attackers that initiates the most attack requests. The information includes the attacker IP addresses, source locations, number of attacks, and total attack traffic. | None |
Top 10 attacked websites | Table | 1 hour (relative) | The top 10 most attacked websites. | None |