This topic describes how to enable the mitigation analysis feature in the Anti-DDoS Origin console. After you enable the mitigation analysis feature, you can query and analyze Anti-DDoS Origin logs and render query and analysis results into visualized charts in the Log Service console. This helps you protect your business against DDoS attacks.


An Anti-DDoS Origin instance is created. For more information, see Purchase an Anti-DDoS Origin Enterprise instance.


  1. Log on to the Traffic Security console.
  2. In the left-side navigation pane, choose Network Security > Anti-DDoS Origin > Mitigation Analysis.
  3. In the top navigation bar, select the resource group and region of your instance.
  4. The first time you enable the mitigation analysis feature, you must complete RAM authorization as prompted.
  5. Upgrade an Anti-DDoS Origin instance.
    1. On the Mitigation Analysis page, select the Anti-DDoS Origin instance that you want to upgrade from the Instance drop-down list.
    2. Click Upgrade Now.
    3. On the Upgrade/Downgrade page, select On for Mitigation Analysis (Beta).
    4. Read and select Anti-DDoS origin Terms of Service. Then, click Buy Now.
    5. Complete the payment.
      Note During public preview, the mitigation analysis feature of Anti-DDoS Origin is provided free of charge.
  6. On the Mitigation Analysis page, click Enable Now.
    After you enable the feature, Anti-DDoS Origin collects mitigation logs stored in Log Service from the instance that is being used. This way, you can query and analyze mitigation logs and view mitigation reports. You can turn on or off Status to enable or disable the feature.
    Note When you use the log analysis feature of Anti-DDoS Origin, we recommend that you check the remaining log storage space and the validity period on a regular basis. If more than 70% of storage space is used, we recommend that you increase the log storage capacity. Otherwise, you cannot store additional logs and data loss may occur.

What to do next

After Log Service collects Anti-DDoS Origin logs, you can query, analyze, download, ship and transform the logs. You can also create alert rules for the logs. For more information, see Common operations on logs of Alibaba Cloud services.