All Products
Search
Document Center

Anti-DDoS:Query operation logs

Last Updated:Mar 22, 2024

This topic describes how to view the logs of important operations on an Anti-DDoS Proxy instance within 180 days.

Supported operations

Operation logs record only important operations. The following table lists the operations by type.

Type

Recorded operation

IP

  • Purchase and release of instances

  • Deactivation of blackhole filtering

  • Traffic blocking and unblocking

  • Changes of the scrubbing mode for Layer 4 traffic

  • Changes of the mitigation mode for HTTP flood attacks

  • Changes of the burstable protection bandwidth

Anti-DDoS plan

Consumption of Anti-DDoS plans

ECS

Releases of the IP addresses of ECS instances

burstable clean bandwidth

  • Enabling and disabling of the burstable clean bandwidth feature

  • Changes of the metering method

  • Changes of the burstable clean bandwidth

Burstable QPS

  • Enabling and disabling of the burstable QPS feature

  • Changes of the metering method

Analysis on captured packets

  • Creation of packet capture tasks

  • Deletion of packet capture tasks

  • Deletion of packet capture files

  • Automatic deletion of packet capture files upon expiration

Prerequisites

An Anti-DDoS Proxy (Chinese Mainland) or Anti-DDoS Proxy (Outside Chinese Mainland) instance is purchased. For more information, see Purchase an Anti-DDoS Proxy instance.

Procedure

  1. Log on to the Anti-DDoS Proxy console.

  2. In the top navigation bar, select the region of your instance.

    • Anti-DDoS Proxy (Chinese Mainland): If your instance is an Anti-DDoS Proxy (Chinese Mainland) instance, select Chinese Mainland.

    • Anti-DDoS Proxy (Outside Chinese Mainland): If your instance is an Anti-DDoS Proxy (Outside Chinese Mainland), select Outside Chinese Mainland.

  3. In the left-side navigation pane, choose Investigation > Operation Logs.

  4. On the Operation Logs page, specify a type and a time range and click the image..png icon to view operation logs.