Skip to content

Commit 0c9d33e

Browse files
committed
updated portal steps.
1 parent 80a1568 commit 0c9d33e

File tree

1 file changed

+8
-10
lines changed

1 file changed

+8
-10
lines changed

articles/ddos-protection/alerts.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99
ms.tgt_pltfrm: na
1010
ms.custom: ignite-2022
1111
ms.workload: infrastructure-services
12-
ms.date: 01/05/2023
12+
ms.date: 01/10/2023
1313
ms.author: abell
1414
---
1515
# Tutorial: View and configure Azure DDoS Protection alerts
@@ -34,13 +34,11 @@ In this tutorial, you'll learn how to:
3434

3535
You can select any of the available Azure DDoS Protection metrics to alert you when there’s an active mitigation during an attack, using the Azure Monitor alert configuration.
3636

37-
1. Sign in to the [Azure portal](https://portal.azure.com/) and browse to your DDoS Protection Plan.
37+
1. Sign in to the [Azure portal](https://portal.azure.com/).
3838

39-
1. Under **Monitoring**, select **Alerts**.
39+
1. In **Search resources, service, and docs (G+/)**, type **Alerts**. Select **Alerts** from the Marketplace results to open the **Alerts** page.
4040

41-
1. Select the **+ New Alert Rule** button or select **+ Create** on the navigation bar, then select **Alert rule**.
42-
43-
1. Close the **Select a Signal** page.
41+
1. Select the **+ Create** on the navigation bar, then select **Alert rule**.
4442

4543
1. On the **Create an alert rule** page, you'll see the follow tabs:
4644

@@ -55,10 +53,10 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
5553

5654
| Setting | Value |
5755
|--|--|
58-
| Scope | 1) Select **+ Select Scope**. <br/> 2) From the *Filter by subscription* dropdown list, select the **Subscription** that contains the public IP address you want to log. <br/> 3) From the *Filter by resource type* dropdown list, select **Public IP Address**, then select the specific public IP address you want to log metrics for. <br/> 4) Select **Done**. |
59-
| Condition | 1) Select the **+ Add Condition** button <br/> 2) In the *Search by signal name* search box, select **Under DDoS attack or not**. <br/> 3) Leave *Chart period* and *Alert Logic* as default. <br/> 4) From the *Operator* drop-down, select **Greater than or equal to**. <br/> 5) From the *Aggregation type* drop-down, select **Maximum**. <br/> 6) In the *Threshold value* box, enter **1**. For the *Under DDoS attack or not metric*, **0** means you're not under attack while **1** means you are under attack. <br/> 7) Select **Done**. |
60-
| Actions | 1) Select the **+ Create action group** button. <br/> 2) On the **Basics** tab, select your subscription, a resource group and provide the *Action group name* and *Display name*. <br/> 3) On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. <br/> 4) Under *Name*, enter **MyUnderAttackEmailAlert**. <br/> 5) On the *Email/SMS message/Push/Voice* page, enter the **Email** and as many of the available options you require, and then select **OK**. <br/> 6) Select **Review + create** and then select **Create**. |
61-
| Details | 1) Under *Alert rule name*, enter *MyDdosAlert*. <br/> 2) Select **Review + create** and then select **Create**. |
56+
| Scope | 1) Select **+ Select Scope**. <br/> 2) From the *Filter by subscription* dropdown list, select the **Subscription** that contains the public IP address you want to log. <br/> 3) From the *Filter by resource type* dropdown list, select **Public IP Address**, then select the specific public IP address you want to log metrics for. <br/> 4) Select **Done**. <br/> 5) Select **Next: Condition**. |
57+
| Condition | 1) Select the **+ Add Condition** button <br/> 2) In the *Search by signal name* search box, select **Under DDoS attack or not**. <br/> 3) Leave *Threshold* as default. <br/> 4) From the *Aggregation type* drop-down, select **Maximum**. <br/> 5) From the *Operator* drop-down, select **Greater than or equal to**. <br/> 6) In the *Unit* box, leave as default. <br/> 7) In the *Threshold value* box, enter **1**. For the *Under DDoS attack or not metric*, **0** means you're not under attack while **1** means you are under attack. <br/> 7) Select **Done**. <br/> 8) Select **Next: Actions**. |
58+
| Actions | 1) Select the **+ Create action group** button. <br/> 2) On the **Basics** tab, select your subscription, a resource group. <br/> 3 In the *Action group name* box, enter **myDDoSAlertsActionGroup**. <br/> 4 In the *Display name* box, enter **myDDoSAlerts**. <br/> 5) On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. <br/> 6) Under *Name*, enter **myUnderAttackEmailAlert**. <br/> 7) On the *Email/SMS message/Push/Voice* page, click the **Email** check box enter the required email. Click **OK**. <br/> 8) Select **Review + create** and then select **Create**. <br/> 9) Select **Next: Details** |
59+
| Details | 1) Under **Severity** select **2 - Warning**. <br/> 2) Under *Alert rule name*, enter **myDDoSAlert**. <br/> 3) Select **Review + create** and then select **Create**. |
6260

6361
Within a few minutes of attack detection, you should receive an email from Azure Monitor metrics that looks similar to the following picture:
6462

0 commit comments

Comments
 (0)