Skip to content

Commit 7dfc8e7

Browse files
committed
update word in steps
1 parent cf82759 commit 7dfc8e7

File tree

1 file changed

+24
-11
lines changed

1 file changed

+24
-11
lines changed

articles/ddos-protection/alerts.md

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -51,17 +51,30 @@ This [template](https://aka.ms/ddosalert) deploys the necessary components of an
5151
You can select any of the available DDoS protection metrics to alert you when there’s an active mitigation during an attack, using the Azure Monitor alert configuration.
5252

5353
1. Sign in to the [Azure portal](https://portal.azure.com/) and browse to your DDoS Protection Plan.
54-
2. Under **Monitoring**, select **Alerts**.
55-
3. Click on **Create Alert Rule** button or Select **“+ Create”** on the navigation bar, then select **“Alert Rule”**
56-
4. Close the **Select a Signal** dialog
57-
5. On the **Create an alert rule** dialog, you will see these steps: Scope, Condition, Actions, Details, Tags, Review + create. For each step use the values described below.
58-
59-
|Setting |Value |
60-
|--------- |--------- |
61-
| Scope | Click on the **“+ Select Scope”** button <br/> On the “Filter by subscription” dropdown list, select the **Subscription** that contains the public IP address you want to log. <br/> On the “Filter by resource type ” dropdown list, select **Public IP Address**, then select the specific public IP address you want to log metrics for.<br/> Select **Done**. |
62-
| Condition | Click on the **“+ Add Condition”** button <br/> On the “Search by signal name” search box, select **Under DDoS attack or not**. <br/> Leave “Chart period” and “Alert Logic” default. <br/> Under **Operator**, select **Greater than or equal to**. <br/> Under **Aggregation type**, select **Maximum**. <br/> Under Threshold value, enter _1_. For the **Under DDoS attack or not metric**, **0** means you are not under attack while **1** means you are under attack. <br/> Select **Done**. |
63-
| Actions | Click on the **“+ Create action group”** button <br/> On the **Basics** step, select your subscription, you resource group and provide the Action Group Name and Display Name <br/> On the **Notifications** step, under **Notification type**, select **Email/SMS message/Push/Voice**. <br/> Under **Name**, enter *MyUnderAttackEmailAlert*. <br/> On the **“Email/SMS message/Push/Voice”** dialog enter the **Email** and as many of the available options you require, and then select **OK**. <br/> Click on **Review + create** and then **Create**. |
64-
| Details | Under **Alert rule name**, Enter _MyDdosAlert_. <br/> Click on **Review + create** and then **Create**. |
54+
55+
1. Under **Monitoring**, select **Alerts**.
56+
57+
1. Select the **+ New Alert Rule** button or select **+ Create** on the navigation bar, then select **Alert rule**.
58+
59+
1. Close the **Select a Signal** page.
60+
61+
1. On the **Create an alert rule** page, you'll see the follow tabs:
62+
63+
- Scope
64+
- Condition
65+
- Actions
66+
- Details
67+
- Tags
68+
- Review + create
69+
70+
For each step use the values described below:
71+
72+
| Setting | Value |
73+
|--|--|
74+
| Scope | 1) Select **+ Select Scope**. <br/> 2) From the *Filter by subscription* dropdown list, select the **Subscription** that contains the public IP address you want to log. <br/> 3) From the *Filter by resource type* dropdown list, select **Public IP Address**, then select the specific public IP address you want to log metrics for. <br/> 4) Select **Done**. |
75+
| Condition | 1) Select the **+ Add Condition** button <br/> 2) In the *Search by signal name* search box, select **Under DDoS attack or not**. <br/> 3) Leave *Chart period* and *Alert Logic* as default. <br/> 4) From the *Operator* drop-down, select **Greater than or equal to**. <br/> 5) From the *Aggregation type* drop-down, select **Maximum**. <br/> 6) In the *Threshold value* box, enter **1**. For the *Under DDoS attack or not metric*, **0** means you're not under attack while **1** means you are under attack. <br/> 7) Select **Done**. |
76+
| Actions | 1) Select the **+ Create action group** button. <br/> 2) On the **Basics** tab, select your subscription, a resource group and provide the *Action group name* and *Display name*. <br/> 3) On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. <br/> 4) Under *Name*, enter **MyUnderAttackEmailAlert**. <br/> 5) On the *Email/SMS message/Push/Voice* page enter the **Email** and as many of the available options you require, and then select **OK**. <br/> 6) Select **Review + create** and then select **Create**. |
77+
| Details | 1) Under *Alert rule name*, enter *MyDdosAlert*. <br/> 2) Select **Review + create** and then select **Create**. |
6578

6679
Within a few minutes of attack detection, you should receive an email from Azure Monitor metrics that looks similar to the following picture:
6780

0 commit comments

Comments
 (0)