Skip to content

Commit ed6660d

Browse files
author
Jill Grant
authored
Merge pull request #281115 from AbdullahBell/ddos-protection-freshness01
DDoS Protection: Networking Content Incubation: Freshness: 30 articles
2 parents 6120dbb + c1d9c09 commit ed6660d

31 files changed

+170
-163
lines changed

articles/ddos-protection/alerts.md

Lines changed: 30 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
---
2-
title: 'Configure Azure DDoS Protection metric alerts through portal'
2+
title: 'Tutorial: Configure Azure DDoS Protection metric alerts through portal'
33
description: Learn how to configure DDoS protection metric alerts for Azure DDoS Protection.
44
services: ddos-protection
55
author: AbdullahBell
66
ms.service: ddos-protection
77
ms.topic: tutorial
8-
ms.date: 08/07/2023
8+
ms.date: 07/17/2024
99
ms.author: abell
1010
---
11-
# Configure Azure DDoS Protection metric alerts through portal
1211

13-
DDoS Protection metrics alerts are an important step in alerting your team through Azure portal, email, SMS message, push, or voice notification when an attack is detected.
12+
# Tutorial: Configure Azure DDoS Protection metric alerts through portal
1413

1514
In this tutorial, you learn how to:
1615

1716
> [!div class="checklist"]
1817
> * Configure metrics alerts through Azure Monitor.
1918
19+
DDoS Protection metrics alerts are an important step in alerting your team through Azure portal, email, SMS message, push, or voice notification when an attack is detected.
2020

2121
## Prerequisites
2222

2323
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2424
- [DDoS Network Protection](manage-ddos-protection.md) must be enabled on a virtual network or [DDoS IP Protection](manage-ddos-protection-powershell-ip.md) must be enabled on a public IP address.
25-
- DDoS Protection monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address. You can monitor the public IP address of all resources deployed through Resource Manager (not classic) listed in [Virtual network for Azure services](../virtual-network/virtual-network-for-azure-services.md#services-that-can-be-deployed-into-a-virtual-network) (including Azure Load Balancers where the backend virtual machines are in the virtual network), except for Azure App Service Environments. To continue with this How-To guide, you can quickly create a [Windows](../virtual-machines/windows/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Linux](../virtual-machines/linux/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) virtual machine.  
25+
- DDoS Protection monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address.  
2626

2727
## Configure metric alerts through portal
2828

@@ -34,7 +34,7 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
3434

3535
1. Select **+ Create** on the navigation bar, then select **Alert rule**.
3636

37-
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-page.png" alt-text="Screenshot of creating Alerts." lightbox="./media/ddos-alerts/ddos-protection-alert-page.png":::
37+
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-page.png" alt-text="Screenshot of DDoS Protection creating Alerts." lightbox="./media/ddos-alerts/ddos-protection-alert-page.png":::
3838

3939
1. On the **Create an alert rule** page, select **+ Select scope**, then select the following information in the **Select a resource** page.
4040

@@ -48,49 +48,55 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
4848
|Resource | Select the specific **Public IP address** you want to log metrics for. |
4949

5050
1. Select **Done**, then select **Next: Condition**.
51-
1. On the **Condition** page, select **+ Add Condition**, then in the *Search by signal name* search box, search and select **Under DDoS attack or not**.
51+
1. On the **Condition** page, select **+ Add Condition**, then in the *Search by signal name* search box, search, and select **Under DDoS attack or not**.
5252

5353
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-add-condition.png" alt-text="Screenshot of adding DDoS Protection attack alert condition." lightbox="./media/ddos-alerts/ddos-protection-alert-add-condition.png":::
5454

55-
1. In the **Create an alert rule** page, enter or select the following information.
56-
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-signal.png" alt-text="Screenshot of adding DDoS Protection attack alert signal." lightbox="./media/ddos-alerts/ddos-protection-alert-signal.png":::
55+
1. In the **Create an alert rule** page, select the following information.
56+
57+
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-signal.png" alt-text="Screenshot of adding DDoS Protection attack alert signal." lightbox="./media/ddos-alerts/ddos-protection-alert-signal.png":::
5758

5859
| Setting | Value |
5960
|--|--|
60-
| Threshold | Leave as default. |
61-
| Aggregation type | Leave as default. |
61+
| Threshold | Leave as the default *Static*. |
62+
| Aggregation type | Leave as default *Maximum*. |
6263
| Operator | Select **Greater than or equal to**. |
63-
| Unit | Leave as default. |
64+
| Unit | Leave as default *Count*. |
6465
| Threshold value | Enter **1**. For the *Under DDoS attack or not metric*, **0** means you're not under attack while **1** means you are under attack. |
65-
66+
| Check every | Choose how often the alert rule will check if the condition is met. Leave as default *1 minute*. |
67+
| Lookback period | This is the lookback period, or the time period to look back at each time the data is checked. For example, every 1 minute you’ll be looking at the past 5 minutes. Leave as default *5 minutes*. |
6668

6769

6870
1. Select **Next: Actions** then select **+ Create action group**.
6971

7072
### Create action group
7173

7274
1. In the **Create action group** page, enter the following information, then select **Next: Notifications**.
73-
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-action-group-basics.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics." lightbox="./media/ddos-alerts/ddos-protection-alert-action-group-basics.png":::
75+
76+
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-action-group-basics.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics." lightbox="./media/ddos-alerts/ddos-protection-alert-action-group-basics.png":::
7477

7578
| Setting | Value |
7679
|--|--|
7780
| Subscription | Select your Azure subscription that contains the public IP address you want to log. |
7881
| Resource Group | Select your Resource group. |
79-
| Region | Leave as default. |
80-
| Action Group | Enter **myDDoSAlertsActionGroup**. |
81-
| Display name | Enter **myDDoSAlerts**. |
82+
| Region | Choose these locations for the broadest set of Azure products and long-term capacity growth. |
83+
| Action Group | Provide an action group name that is unique within the resource group. For this example, enter **myDDoSAlertsActionGroup**. |
84+
| Display name | This display name will be shown as the action group name in email and SMS notifications. For this example, enter **myDDoSAlerts**. |
8285

8386

84-
1. On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. Under *Name*, enter **myUnderAttackEmailAlert**.
87+
1. On the *Notifications* tab, under *Notification type*, select the notification type you wish to use. For this example, we select **Email/SMS message/Push/Voice**. In the *Name* tab, enter **myUnderAttackEmailAlert**.
8588

8689
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-action-group-notification.png" alt-text="Screenshot of adding DDoS Protection attack alert notification type." lightbox="./media/ddos-alerts/ddos-protection-alert-action-group-notification.png":::
8790

88-
8991
1. On the *Email/SMS message/Push/Voice* page, select the **Email** check box, then enter the required email. Select **OK**.
9092

9193
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-notification.png" alt-text="Screenshot of adding DDoS Protection attack alert notification page." lightbox="./media/ddos-alerts/ddos-protection-alert-notification.png":::
9294

9395
1. Select **Review + create** and then select **Create**.
96+
97+
> [!NOTE]
98+
> Review the [Action groups](../azure-monitor/alerts/action-groups.md) documentation for more information on creating action groups.
99+
94100
### Continue configuring alerts through portal
95101

96102
1. Select **Next: Details**.
@@ -108,7 +114,7 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
108114

109115
Within a few minutes of attack detection, you should receive an email from Azure Monitor metrics that looks similar to the following picture:
110116

111-
:::image type="content" source="./media/ddos-alerts/ddos-alert.png" alt-text="Screenshot of a DDoS Attack Alert." lightbox="./media/ddos-alerts/ddos-alert.png":::
117+
:::image type="content" source="./media/ddos-alerts/ddos-alert.png" alt-text="Screenshot of a DDoS attack Alert after a DDoS attack." lightbox="./media/ddos-alerts/ddos-alert.png":::
112118

113119
You can also learn more about [configuring webhooks](../azure-monitor/alerts/alerts-webhooks.md?toc=%2fazure%2fvirtual-network%2ftoc.json) and [logic apps](../logic-apps/logic-apps-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) for creating alerts.
114120

@@ -117,14 +123,16 @@ You can keep your resources for the next tutorial. If no longer needed, delete t
117123

118124
1. In the search box at the top of the portal, enter **Alerts**. Select **Alerts** in the search results.
119125

120-
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-rule.png" alt-text="Screenshot of Alerts page." lightbox="./media/ddos-alerts/ddos-protection-alert-rule.png":::
126+
:::image type="content" source="./media/ddos-alerts/ddos-protection-alert-rule.png" alt-text="Screenshot of Alerts page within Azure for DDoS Protection." lightbox="./media/ddos-alerts/ddos-protection-alert-rule.png":::
121127

122128
1. Select **Alert rules**.
123129

124-
:::image type="content" source="./media/ddos-alerts/ddos-protection-delete-alert-rules.png" alt-text="Screenshot of Alert rules page." lightbox="./media/ddos-alerts/ddos-protection-delete-alert-rules.png":::
130+
:::image type="content" source="./media/ddos-alerts/ddos-protection-delete-alert-rules.png" alt-text="Screenshot of Alert rules page within Azure for DDoS Protection." lightbox="./media/ddos-alerts/ddos-protection-delete-alert-rules.png":::
125131

126132
1. In the Alert rules page, select your subscription.
133+
127134
1. Select the alerts created in this tutorial, then select **Delete**.
135+
128136
## Next steps
129137

130138
In this tutorial you learned how to configure metric alerts through Azure portal.

articles/ddos-protection/ddos-configure-log-analytics-workspace.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
2-
title: 'Configure Azure DDoS Protection Log Analytics workspace'
2+
title: 'Tutorial: Configure Azure DDoS Protection Log Analytics workspace'
33
description: Learn how to configure Log Analytics workspace for Azure DDoS Protection.
44
services: ddos-protection
55
author: AbdullahBell
66
ms.service: ddos-protection
77
ms.topic: tutorial
8-
ms.date: 08/07/2023
8+
ms.date: 07/17/2024
99
ms.author: abell
1010
---
1111

12-
# Configure Azure DDoS Protection Log Analytics workspace
13-
14-
In order to use diagnostic logging, you'll first need a Log Analytics workspace with diagnostic settings enabled.
12+
# Tutorial: Configure Azure DDoS Protection Log Analytics workspace
1513

1614
In this tutorial, you learn how to:
1715

1816
> [!div class="checklist"]
1917
> * Configure a Log Analytics workspace for DDoS Protection.
2018
19+
In order to use diagnostic logging, you'll first need a Log Analytics workspace with diagnostic settings enabled.
20+
2121
## Prerequisites
2222

2323
- If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -48,7 +48,8 @@ In this tutorial, you learn how to:
4848
:::image type="content" source="./media/ddos-log-analytics-workspace/ddos-protection-log-analytics-workspace-settings.png" alt-text="Screenshot of locating log analytics workspace diagnostic setting.":::
4949

5050
1. On the *Diagnostic setting* page, under *Destination details*, select **Send to Log Analytics workspace**, then enter the following information.
51-
:::image type="content" source="./media/ddos-log-analytics-workspace/ddos-protection-diagnostic-settings.png" alt-text="Screenshot of log analytics workspace diagnostic setting.":::
51+
52+
:::image type="content" source="./media/ddos-log-analytics-workspace/ddos-protection-diagnostic-settings.png" alt-text="Screenshot of log analytics workspace diagnostic setting.":::
5253

5354
| Setting | Value |
5455
|--|--|

articles/ddos-protection/ddos-diagnostic-alert-templates.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,37 @@
11
---
2-
title: 'Configure Azure DDoS Protection diagnostic logging alerts'
2+
title: 'Tutorial: Configure Azure DDoS Protection diagnostic logging alerts'
33
description: Learn how to configure DDoS protection diagnostic alerts for Azure DDoS Protection.
44
services: ddos-protection
55
author: AbdullahBell
66
ms.service: ddos-protection
77
ms.topic: tutorial
8-
ms.date: 08/07/2023
8+
ms.date: 07/17/2024
99
ms.author: abell
1010
---
1111

12-
# Configure Azure DDoS Protection diagnostic logging alerts
13-
14-
DDoS Protection diagnostic logging alerts provide visibility into DDoS attacks and mitigation actions. You can configure alerts for all DDoS protected public IP addresses that you have enabled diagnostic logging on.
12+
# Tutorial: Configure Azure DDoS Protection diagnostic logging alerts
1513

1614
In this tutorial, you learn how to:
1715

1816
> [!div class="checklist"]
1917
> * Configure diagnostic logging alerts through Azure Monitor and Logic App.
18+
19+
DDoS Protection diagnostic logging alerts provide visibility into DDoS attacks and mitigation actions. You can configure alerts for all DDoS protected public IP addresses that you have enabled diagnostic logging on.
20+
2021
## Prerequisites
2122

2223
- If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2324
- [DDoS Network Protection](manage-ddos-protection.md) must be enabled on a virtual network or [DDoS IP Protection](manage-ddos-protection-powershell-ip.md) must be enabled on a public IP address.
2425
- In order to use diagnostic logging, you must first create a [Log Analytics workspace with diagnostic settings enabled](ddos-configure-log-analytics-workspace.md).
25-
- DDoS Protection monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address. You can monitor the public IP address of all resources deployed through Resource Manager (not classic) listed in [Virtual network for Azure services](../virtual-network/virtual-network-for-azure-services.md#services-that-can-be-deployed-into-a-virtual-network) (including Azure Load Balancers where the backend virtual machines are in the virtual network), except for Azure App Service Environments. To continue with this guide, you can quickly create a [Windows](../virtual-machines/windows/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Linux](../virtual-machines/linux/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) virtual machine.
26+
- DDoS Protection monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address.
2627

2728
## Configure diagnostic logging alerts through Azure Monitor
2829

29-
With these templates, you'll be able to configure alerts for all public IP addresses that you have enabled diagnostic logging on.
30+
With these templates, you are able to configure alerts for all public IP addresses that you have enabled diagnostic logging on.
3031

3132
### Create Azure Monitor alert rule
3233

33-
The Azure Monitor alert rule template will run a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. The alert indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
34+
The Azure Monitor alert rule template runs a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. The alert indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
3435

3536

3637
#### Deploy the template
@@ -48,7 +49,7 @@ The Azure Monitor alert rule template will run a query against the diagnostic lo
4849
| Subscription | Select your Azure subscription. |
4950
| Resource Group | Select your Resource group. |
5051
| Region | Select your Region. |
51-
| Workspace Name | Enter your workspace name. In this example the *Workspace name* is **myLogAnalyticsWorkspace**. |
52+
| Workspace Name | Enter your workspace name. In this example, the *Workspace name* is **myLogAnalyticsWorkspace**. |
5253
| Location | Enter **East US**. |
5354

5455
> [!NOTE]
@@ -78,7 +79,7 @@ This DDoS Mitigation Alert Enrichment template deploys the necessary components
7879
| Alert Name | Leave as default. |
7980
| Security Team Email | Enter the required email address. |
8081
| Company Domain | Enter the required domain. |
81-
| Workspace Name | Enter your workspace name. In this example the *Workspace name* is **myLogAnalyticsWorkspace**. |
82+
| Workspace Name | Enter your workspace name. In this example, the *Workspace name* is **myLogAnalyticsWorkspace**. |
8283

8384
1. Select **Review + create** and then select **Create** after validation passes.
8485

0 commit comments

Comments
 (0)