Configuring LTS for Anti-DDoS Logging
Scenario
After you authorize Anti-DDoS to access Log Tank Service (LTS), you can use the Anti-DDoS logs recorded by LTS for quick and efficient real-time analysis, device O&M management, and analysis of service trends.
Prerequisites
You have enabled LTS.
Procedure
- Log in to the management console.
- Select the region in the upper part of the page, click
in the upper left corner of the page, and choose . The Anti-DDoS page is displayed. - Click the Configure Logs tab, enable LTS (
), and select a log group and log stream. Table 1 describes the parameters. Figure 1 Configuring logs
Table 1 Log configuration Parameter
Description
Log Group
Select a log group or click View Log Group to go to the LTS console and create a log group.
Attack Log
Select a log stream or click View Log Stream to go to the LTS console and create a log stream.
Attack logs record alarm information about each attack, including the attack type and protected IP address.
- Click OK.
You can view Anti-DDoS protection event logs on the LTS console.
Log Fields in LTS
The following table describes the log fields.
| Field | Description |
|---|---|
| logType | Log type. The default value is ip_attack_sum, indicating attack logs. |
| deviceType | Type of the device that reports logs. The default value is CLEAN, indicating the scrubbing device. |
| inKbps | Inbound traffic, in kbit/s. |
| maxPps | Peak incoming traffic, in pps. |
| dropPps | Average number of discarded packets, in pps. |
| maxAttackInBps | Indicates the incoming traffic at the peak time of attack traffic, in bit/s. |
| currentConn | Current connections |
| zoneIP | Protected IP address. |
| logTime | Time when a log is generated. |
| attackType | Attack type. For details about the corresponding attack types, see Table 3. |
| inPps | Inbound traffic, in pps. |
| maxKbps | Peak inbound traffic, in kbit/s. |
| dropKbps | Average discarded traffic, in kbit/s. |
| startTime | Time when the attack starts. |
| endTime | End time of the attack. If this parameter is left blank, the attack has not ended yet. |
| maxAttackInConn | Number of connections at the peak time of attack traffic. |
| newConn | New connections. |
| Value | Attack Type |
|---|---|
| 0-9 | User-defined attack type |
| 10 | SYN flood attack |
| 11 | Ack flood attack |
| 12 | SynAck flood attack |
| 13 | Fin/Rst flood attack |
| 14 | Concurrent connections exceed the threshold. |
| 15 | New connections exceeds the threshold. |
| 16 | TCP fragment attack |
| 17 | TCP fragment bandwidth limit attack |
| 18 | TCP bandwidth limit attack |
| 19 | UDP flood attack |
| 20 | UDP fragment attack |
| 21 | UDP fragment bandwidth limit attack |
| 22 | UDP bandwidth limit attack |
| 23 | ICMP bandwidth limit attack |
| 24 | Other bandwidth limit attack |
| 25 | Traffic limiting attack |
| 26 | HTTPS flood attack |
| 27 | HTTP flood attack |
| 28 | Reserved |
| 29 | DNS query flood attack |
| 30 | DNS reply flood attack |
| 31 | SIP flood attack |
| 32 | Blacklist dropping |
| 33 | Abnormal HTTP URL behavior |
| 34 | TCP fragment abnormal dropping traffic attack |
| 35 | TCP abnormal dropping traffic attack |
| 36 | UDP fragment abnormal dropping traffic attack |
| 37 | UDP abnormal dropping traffic attack |
| 38 | ICMP abnormal attack |
| 39 | Other abnormal attacks |
| 40 | Connection flood attack |
| 41 | Domain name hijacking attack |
| 42 | DNS poisoning packet attack |
| 43 | DNS reflection attack |
| 44 | Oversize DNS packet attack |
| 45 | Abnormal rate of DNS source requests |
| 46 | Abnormal rate of DNS source replies |
| 47 | Abnormal rate of DNS domain name requests |
| 48 | Abnormal rate of DNS domain name replies |
| 49 | DNS request packet TTL anomaly |
| 50 | DNS packet format anomaly |
| 51 | DNS cache matching and dropping attack |
| 52 | Port scan attacks |
| 53 | Abnormal TCP packet flag bit |
| 54 | BGP attack |
| 55 | UDP association defense anomaly |
| 56 | DNS NO such Name |
| 57 | Other fingerprint attacks |
| 58 | Zone traffic limit attack |
| 59 | HTTP slow attacks |
| 60 | Malware prevention |
| 61 | Domain name blocking |
| 62 | Filtering |
| 63 | Web attack packet capture |
| 64 | SIP source rate limiting |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.