View Azure DDoS Protection logs in Log Analytics workspace
DDoS Protection diagnostic logs provide you with the ability to view DDoS Protection notifications, mitigation reports and mitigation flow logs after a DDoS attack. You can view these logs in your Log Analytics workspace.
In this tutorial, you learn how to:
- view Azure DDoS Protection diagnostic logs including notifications, mitigation reports and mitigation flow logs.
Prerequisites
- An Azure account with an active subscription. Create an account for free.
- DDoS Network Protection must be enabled on a virtual network or DDoS IP Protection must be enabled on a public IP address.
- Configure DDoS Protection diagnostic logs. To learn more, see Configure diagnostic logs.
- Simulate an attack using one of our simulation partners. To learn more, see Test with simulation partners.
View in Log Analytics workspace
Sign in to the Azure portal.
In the search box at the top of the portal, enter Log Analytics workspace. Select Log Analytics workspace in the search results.
Under the Log Analytics workspaces blade, select your workspace.
On the left-side tab, select Logs. Here you'll see the query explorer. Exit out the Queries pane to utilize the Logs page.
In the Logs page, type in your query then hit Run to view results.
Example log queries
DDoS Protection Notifications
Notifications will notify you anytime a public IP resource is under attack, and when attack mitigation is over.
AzureDiagnostics
| where Category == "DDoSProtectionNotifications"
The following table lists the field names and descriptions:
Field name | Description |
---|---|
TimeGenerated | The date and time in UTC when the notification was created. |
ResourceId | The resource ID of your public IP address. |
Category | For notifications, this will be DDoSProtectionNotifications . |
ResourceGroup | The resource group that contains your public IP address and virtual network. |
SubscriptionId | Your DDoS protection plan subscription ID. |
Resource | The name of your public IP address. |
ResourceType | This will always be PUBLICIPADDRESS . |
OperationName | For notifications, this will be DDoSProtectionNotifications . |
Message | Details of the attack. |
Type | Type of notification. Possible values include MitigationStarted . MitigationStopped . |
PublicIpAddress | Your public IP address. |
DDoS Mitigation FlowLogs
Attack mitigation flow logs allow you to review the dropped traffic, forwarded traffic and other interesting data-points during an active DDoS attack in near-real time. You can ingest the constant stream of this data into Microsoft Sentinel or to your third-party SIEM systems via event hub for near-real time monitoring, take potential actions and address the need of your defense operations.
AzureDiagnostics
| where Category == "DDoSMitigationFlowLogs"
The following table lists the field names and descriptions:
Field name | Description |
---|---|
TimeGenerated | The date and time in UTC when the flow log was created. |
ResourceId | The resource ID of your public IP address. |
Category | For flow logs, this will be DDoSMitigationFlowLogs . |
ResourceGroup | The resource group that contains your public IP address and virtual network. |
SubscriptionId | Your DDoS protection plan subscription ID. |
Resource | The name of your public IP address. |
ResourceType | This will always be PUBLICIPADDRESS . |
OperationName | For flow logs, this will be DDoSMitigationFlowLogs . |
Message | Details of the attack. |
SourcePublicIpAddress | The public IP address of the client generating traffic to your public IP address. |
SourcePort | Port number ranging from 0 to 65535. |
DestPublicIpAddress | Your public IP address. |
DestPort | Port number ranging from 0 to 65535. |
Protocol | Type of protocol. Possible values include tcp , udp , other . |
DDoS Mitigation Reports
Attack mitigation reports use the Netflow protocol data, which is aggregated to provide detailed information about the attack on your resource. Anytime a public IP resource is under attack, the report generation will start as soon as the mitigation starts. There will be an incremental report generated every 5 mins and a post-mitigation report for the whole mitigation period. This is to ensure that in an event the DDoS attack continues for a longer duration of time, you'll be able to view the most current snapshot of mitigation report every 5 minutes and a complete summary once the attack mitigation is over.
AzureDiagnostics
| where Category == "DDoSMitigationReports"
The following table lists the field names and descriptions:
Field name | Description |
---|---|
TimeGenerated | The date and time in UTC when the notification was created. |
ResourceId | The resource ID of your public IP address. |
Category | For mitigation reports, this will be DDoSMitigationReports . |
ResourceGroup | The resource group that contains your public IP address and virtual network. |
SubscriptionId | Your DDoS protection plan subscription ID. |
Resource | The name of your public IP address. |
ResourceType | This will always be PUBLICIPADDRESS . |
OperationName | For mitigation reports, this will be DDoSMitigationReports . |
ReportType | Possible values are Incremental and PostMitigation . |
MitigationPeriodStart | The date and time in UTC when the mitigation started. |
MitigationPeriodEnd | The date and time in UTC when the mitigation ended. |
IPAddress | Your public IP Address. |
AttackVectors | Degradation of attack types. The keys include TCP SYN flood , TCP flood , UDP flood , UDP reflection , and Other packet flood . |
TrafficOverview | Degradation of attack traffic. The keys include Total packets , Total packets dropped , Total TCP packets , Total TCP packets dropped , Total UDP packets , Total UDP packets dropped , Total Other packets , and Total Other packets dropped . |
Protocols | Breakdown of protocols included. The keys include TCP , UDP , and Other . |
DropReasons | Analysis of causes of dropped packets. The keys include Protocol violation invalid TCP . syn Protocol violation invalid TCP , Protocol violation invalid UDP , UDP reflection , TCP rate limit exceeded , UDP rate limit exceeded , Destination limit exceeded , Other packet flood Rate limit exceeded , and Packet was forwarded to service . Protocol violation invalid drop reasons refer to malformed packets. |
TopSourceCountries | Breakdown of the top 10 source countries into inbound traffic. |
TopSourceCountriesForDroppedPackets | Analysis of the top 10 source countries for attack traffic that have been throttled. |
TopSourceASNs | Analysis of the top 10 sources of autonomous system numbers (ASNs) of incoming traffic. |
SourceContinents | Analysis of the source continent for inbound traffic. |
Type | Type of notification. Possible values include MitigationStarted . MitigationStopped . |
Next steps
In this tutorial, you learned how to view DDoS Protection diagnostic logs in a Log Analytics workspace. To learn more about the recommended steps to take when you receive a DDoS attack, see these next steps.
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for