You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ddos-protection/telemetry.md
+21-17Lines changed: 21 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,16 @@
1
1
---
2
-
title: 'Tutorial: View and configure DDoS protection telemetry for Azure DDoS Protection'
3
-
description: Learn how to view and configure DDoS protection telemetry for Azure DDoS Protection.
2
+
title: 'Tutorial: View and configure DDoS protection telemetry'
3
+
description: Learn how to view and configure the DDoS protection telemetry and metrics for Azure DDoS Protection.
4
+
#customer intent: I want to learn how to view and configure DDoS protection telemetry for Azure DDoS Protection.
4
5
services: ddos-protection
5
6
author: AbdullahBell
6
7
ms.service: ddos-protection
7
8
ms.topic: tutorial
8
9
ms.date: 05/09/2024
9
10
ms.author: abell
10
11
---
11
-
# Tutorial: View and configure Azure DDoS protection telemetry
12
12
13
-
Azure DDoS Protection provides detailed attack insights and visualization with DDoS Attack Analytics. Customers protecting their virtual networks against DDoS attacks have detailed visibility into attack traffic and actions taken to mitigate the attack via attack mitigation reports & mitigation flow logs. Rich telemetry is exposed via Azure Monitor including detailed metrics during the duration of a DDoS attack. Alerting can be configured for any of the Azure Monitor metrics exposed by DDoS Protection. Logging can be further integrated with [Microsoft Sentinel](../sentinel/data-connectors/azure-ddos-protection.md), Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.
13
+
# Tutorial: View and configure Azure DDoS protection telemetry
14
14
15
15
In this tutorial, you'll learn how to:
16
16
@@ -21,6 +21,8 @@ In this tutorial, you'll learn how to:
21
21
22
22
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
23
23
24
+
25
+
24
26
## Prerequisites
25
27
26
28
* If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -32,7 +34,10 @@ Telemetry for an attack is provided through Azure Monitor in real time. While [m
32
34
33
35
You can view DDoS telemetry for a protected public IP address through three different resource types: DDoS protection plan, virtual network, and public IP address.
34
36
37
+
Logging can be further integrated with [Microsoft Sentinel](../sentinel/data-connectors/azure-ddos-protection.md), Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.
38
+
35
39
For more information on metrics, see [Monitoring Azure DDoS Protection](monitor-ddos-protection-reference.md) for details on DDoS Protection monitoring logs.
40
+
36
41
### View metrics from DDoS protection plan
37
42
38
43
1. Sign in to the [Azure portal](https://portal.azure.com/) and select your DDoS protection plan.
@@ -73,32 +78,31 @@ For more information on metrics, see [Monitoring Azure DDoS Protection](monitor-
73
78
>[!NOTE]
74
79
>When changing DDoS IP protection from **enabled** to **disabled**, telemetry for the public IP resource will not be available.
75
80
76
-
## View DDoS mitigation policies
81
+
###View DDoS mitigation policies
77
82
78
-
Azure DDoS Protection applies three auto-tuned mitigation policies (TCP SYN, TCP & UDP) for each public IP address of the protected resource, in the virtual network that has DDoS protection enabled. You can view the policy thresholds by selecting the **Inbound TCP packets to trigger DDoS mitigation** and **Inbound UDP packets to trigger DDoS mitigation** metrics with **aggregation** type as 'Max', as shown in the following picture:
83
+
Azure DDoS Protection uses three automatically adjusted mitigation policies (TCP SYN, TCP, and UDP) for each public IP address of the resource being protected. This applies to any virtual network with DDoS protection enabled.
79
84
80
-
:::image type="content" source="./media/manage-ddos-protection/view-mitigation-policies.png" alt-text="Screenshot of viewing mitigation policies." lightbox="./media/manage-ddos-protection/view-mitigation-policies.png":::
81
-
## Validate and test
82
85
83
-
To simulate a DDoS attack to validate DDoS protection telemetry, see [Validate DDoS detection](test-through-simulations.md).
86
+
You can see the policy limits within your public IP address metrics by choosing the *Inbound SYN packets to trigger DDoS mitigation*, *Inbound TCP packets to trigger DDoS mitigation*, and *Inbound UDP packets to trigger DDoS mitigation* metrics. Make sure to set the aggregation type to *Max*.
84
87
88
+
:::image type="content" source="./media/manage-ddos-protection/view-mitigation-policies.png" alt-text="Screenshot of viewing mitigation policies." lightbox="./media/manage-ddos-protection/view-mitigation-policies.png":::
85
89
86
-
## View peace time traffic telemetry
90
+
###View peace time traffic telemetry
87
91
88
92
It's important to keep an eye on the metrics for TCP SYN, UDP, and TCP detection triggers. These metrics help you know when DDoS protection starts. Make sure these triggers reflect the normal traffic levels when there's no attack.
89
93
90
-
You can make a chart for the public IP address resource. In this chart, include the Packet Count (number of packets), Byte Count (amount of data), and Syn Count (number of synchronization packets) metrics. This will show you the sum of traffic.
94
+
You can make a chart for the public IP address resource. In this chart, include the Packet Count (number of packets)and SYN Count (number of synchronization packets) metrics. This shows you the sum of traffic.
91
95
92
-
93
-
1. Sign in to the [Azure portal](https://portal.azure.com/) and browse to your public IP address.
94
-
1. On the Azure portal menu, select or search for and select **Public IP addresses** then select your public IP address.
95
-
1. Under **Monitoring**, select **Metrics**.
96
-
1. Select your metrics and scope as described in the previous sections.
97
-
1. Create a chart with the metrics you want to monitor. In this example we chose *Byte Count*, *Packet Count*, and *Syn Count* set to *Sum*.
96
+
:::image type="content" source="./media/manage-ddos-protection/ddos-baseline-metrics.png" alt-text="Screenshot of viewing mitigation policies." lightbox="./media/manage-ddos-protection/ddos-baseline-metrics.png":::
98
97
99
98
>[!NOTE]
100
99
> To make a fair comparison, you need to convert the data to packets-per-second. You can do this by dividing the number you see by 60, as the data represents the number of packets, bytes, or SYN packets collected over 60 seconds. For example, if you have 91,000 packets collected over 60 seconds, divide 91,000 by 60 to get approximately 1,500 packets-per-second (pps).
101
100
101
+
## Validate and test
102
+
103
+
To simulate a DDoS attack to validate DDoS protection telemetry, see [Validate DDoS detection](test-through-simulations.md).
0 commit comments