You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/frequently-asked-questions.mdx
+1-66Lines changed: 1 addition & 66 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,69 +4,4 @@ title: FAQ
4
4
structured_data: true
5
5
sidebar:
6
6
order: 8
7
-
8
-
---
9
-
10
-
## Why are my API endpoints not found by API Discovery?
11
-
12
-
In most cases, this is due to the system not observing enough valid requests over a continuous period.
13
-
14
-
API Discovery only looks at requests that satisfy all of the following criteria:
15
-
16
-
1. Requests must return `2XX` response codes from the edge.
17
-
2. Requests must not come directly from Cloudflare Workers.
18
-
3. At least 500 requests are made to the discovered endpoint within a 10 day period.
19
-
20
-
Endpoints discovered using session identifiers will be labeled as such in the dashboard. If the endpoints are not discovered through session identifiers, they will be discovered using our machine learning-based [API Discovery](/api-shield/security/api-discovery/).
21
-
22
-
---
23
-
24
-
## How does Cloudflare calculate the recommended rate limit for my endpoint?
25
-
26
-
27
-
Cloudflare uses both the volume and frequency of traffic to guide your recommended rate. We calculate the recommended rate value throughout the day, and the new calculation may equal the existing recommendation due to similar traffic profiles existing on your API. When we recalculate, we look at requests that happened in the last 24 hours.
28
-
29
-
You can view the `P50`/`95`/`99` of your request count for more details under an endpoint’s expanded view.
30
-
31
-
---
32
-
33
-
## Will I be able to access an endpoint’s data after I delete it?
34
-
35
-
No. Cloudflare will stop tracking performance data when you delete an endpoint and its previous data will not be stored. This means that if you save this endpoint again, the metrics will start tracking from the point that you save it.
36
-
37
-
---
38
-
39
-
### Why do I not receive threshold recommendations for my discovered API endpoints?
40
-
41
-
Thresholds can only be recommended for endpoints that receive sufficient levels of traffic that meet the following criteria:
42
-
43
-
- Only requests with the same criteria as API Discovery are considered.
44
-
- If traffic has been erratic or intermittent to this endpoint, the threshold might not show up. Cloudflare needs endpoints to receive sufficient valid traffic in any 24-hour period in the last 7 days or since the initial discovery of the endpoint to make statistically safe threshold suggestions.
45
-
- Cloudflare also requires at least 50 distinct sessions to have accessed the endpoint in any 24-hour period in the last 7 days or since the initial discovery of the endpoint. To detect sessions, you must set up [session identifiers](/api-shield/get-started/#session-identifiers).
46
-
47
-
If you do not receive threshold recommendations for a discovered endpoint, you will see one of the following error codes:
48
-
49
-
-`404 response`: Cloudflare has not seen sufficient valid traffic for this zone to generate recommendations.
50
-
-`551 response`: Cloudflare has successfully generated recommendations at some point in the past, but we have not seen sufficient recent valid traffic to provide up-to-date recommendations.
51
-
52
-
---
53
-
54
-
## Does API Shield work for JDCloud customers?
55
-
56
-
Not currently.
57
-
58
-
---
59
-
60
-
## What version of OpenAPI specification do you support?
61
-
62
-
The importing ([Schema validation](/api-shield/security/schema-validation/)) and exporting ([Schema learning](/api-shield/management-and-monitoring/#endpoint-schema-learning)) of OpenAPI schemas from our product to customers is done using **OpenAPI v3.0**. Any specifications using patched versions (3.0.x) are compatible as well.
63
-
64
-
---
65
-
66
-
## Why am I not seeing latency metrics?
67
-
68
-
Latency metrics currently are not supported when a Cloudflare Worker is running on the URL, as the requests are not passed directly to your origin.
69
-
70
-
Some Cloudflare products such as [Waiting Room](/waiting-room/) are built on top of Workers, so the same limitations apply to applications using these products.
@@ -49,6 +48,10 @@ Cloudflare API Security products are available to Enterprise customers only, tho
49
48
50
49
The full API Shield security suite is available as an Enterprise-only paid add-on, but all customers can access [Endpoint Management](/api-shield/management-and-monitoring/) and [Schema validation](/api-shield/security/schema-validation/) functionalities.
51
50
51
+
:::note
52
+
API Shield currently does not work for JDCloud customers.
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,6 +183,10 @@ You can delete endpoints one at a time or in bulk.
183
183
</TabItem>
184
184
</Tabs>
185
185
186
+
:::caution
187
+
When you delete an endpoint from Endpoint Management, Cloudflare immediately stops tracking all associated performance and analytics data. The endpoint's previous historical metrics are permanently removed and cannot be restored. If you later save this endpoint again, metric tracking will resume, starting from the point the endpoint is re-saved.
188
+
:::
189
+
186
190
## Endpoint Analysis
187
191
188
192
For each saved endpoint, customers can view:
@@ -218,3 +222,14 @@ Once Sensitive Data Detection is enabled for your zone, API Shield queries firew
218
222
API Shield displays the types of sensitive data found if you expand the Endpoint Management table row to view further details. Select **Explore Events** to view the matched events in Security Events.
219
223
220
224
After Sensitive Data Detection is enabled for your zone, you can [browse the Sensitive Data Detection ruleset](https://dash.cloudflare.com/?to=/:account/:zone/security/data/ruleset/e22d83c647c64a3eae91b71b499d988e/rules). The link will not work if Sensitive Data Detection is not enabled.
225
+
226
+
## Limitations
227
+
228
+
Certain performance metrics, such as latency, are not supported when a request is handled by a Cloudflare service in a way that prevents it from being passed directly to your origin server.
229
+
230
+
This limitation is specifically observed when:
231
+
232
+
- A Cloudflare Worker is running on the URL path.
233
+
- Other products built on top of Workers, such as [Waiting Room](/waiting-room/), are active on the application.
234
+
235
+
In these scenarios, the system is unable to accurately measure the origin response time, and the metric will not be populated in the dashboard.
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/security/api-discovery.mdx
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,6 +91,18 @@ If all of your zone’s API traffic contains the <GlossaryTooltip term="session
91
91
92
92
You can direct any feedback about your API Discovery results to your account team.
93
93
94
+
## Requirements
95
+
96
+
To ensure your API endpoints are successfully discovered and mapped by Cloudflare, traffic to the endpoint must meet specific operational criteria.
97
+
98
+
If an endpoint does not appear in the Discovery inbox, it is typically because the system has not observed enough valid requests over a continuous period. API Discovery only processes requests that satisfy all of the following requirements:
99
+
100
+
- The request must return a `2xx` response code from the Cloudflare edge.
101
+
- The request must not come directly from Cloudflare Workers.
102
+
- The endpoint must receive at least 500 requests within a 10-day period.
103
+
104
+
Endpoints discovered using session identifiers will be labeled as such in the Cloudflare dashboard. If the endpoints are not discovered through session identifiers, they will be discovered using our machine learning-based [API Discovery](/api-shield/security/api-discovery/).
105
+
94
106
## Availability
95
107
96
108
API Discovery is only available for Enterprise customers. If you are an Enterprise customer and interested in this product, contact your account team.
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/security/schema-validation/index.mdx
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -356,7 +356,13 @@ OpenAPI schemas generated by different tooling may not be specific enough to imp
356
356
357
357
## Limitations
358
358
359
-
Schema validation supports [OpenAPI Version 3.0.x schemas](https://spec.openapis.org/oas/v3.0.3). OpenAPI 3.1 is not supported yet, and we do not plan to expand support for OpenAPI 2.0.
359
+
Cloudflare API Shield's Schema validation (importing) and [Schema learning](/api-shield/management-and-monitoring/endpoint-management/schema-learning/) (exporting) capabilities rely on the [OpenAPI Specification (OAS) v3.0](https://spec.openapis.org/oas/v3.0.3).
360
+
361
+
This support includes all patch versions, such as OAS v3.0.x. We do not currently support OAS v3.1 and do not plan to expand support for OpenAPI 2.0.
362
+
363
+
:::note
364
+
Cloudflare recommends using a third-party tool like [Swagger Editor](https://editor.swagger.io/) to ensure that all schemas are fully compliant with the OAS v3.0 specification before upload.
365
+
:::
360
366
361
367
Currently, API Shield does not support some features of API schemas, including the following: all responses, external references, non-basic path templating, or unique items.
Cloudflare Volumetric Abuse Detection helps you set up a system of adaptive rate limiting.
13
13
14
-
## About
15
-
16
14
After [API Discovery](/api-shield/security/api-discovery/), Cloudflare looks for <GlossaryTooltipterm="API endpoint">endpoint</GlossaryTooltip> abuse based on common user traffic.
17
15
18
16
For example, your API might see different levels of traffic to a `/reset-password` endpoint than a `/login` endpoint. Additionally, your `/login` endpoint might see higher than average traffic after a successful marketing campaign.
@@ -27,20 +25,38 @@ Volumetric Abuse Detection rate limits are a way to prevent blatant volumetric a
27
25
28
26
Volumetric Abuse Detection analyzes your API’s individual session traffic statistics to recommend per-endpoint, per-session rate limits.
29
27
30
-
Volumetric Abuse Detection currently requires a <GlossaryTooltipterm="session identifier"link="/api-shield/get-started/#to-set-up-session-identifiers">session identifier</GlossaryTooltip>, like an authorization token available as a request header or cookie.
31
-
32
-
After adding a session identifier, allow 24 hours for rate limit recommendations to appear on endpoints in the Cloudflare dashboard.
28
+
To access your endpoints:
33
29
34
30
Old dashboard: **Security** > **API Shield** > **Endpoint Management**
35
31
36
32
New dashboard: **Security** > **Web Assets** > **Endpoints**
37
33
38
34
Recommendations will continue to update if your traffic pattern changes.
39
35
40
-
### Observe rate limits
36
+
### Requirements
37
+
38
+
Volumetric Abuse Detection generates rate limit thresholds only after collecting sufficient, statistically safe traffic data for an endpoint. If recommendations are missing for a discovered endpoint, the traffic likely failed to meet the necessary criteria.
39
+
40
+
Thresholds are suggested only for endpoints that satisfy all of the following requirements within the last seven days (or since initial discovery):
41
+
- The endpoint must receive sufficient valid traffic (traffic that meets the [API Discovery](/api-shield/security/api-discovery/) criteria). Intermittent or erratic traffic may prevent suggestions.
42
+
- The endpoint must be accessed by at least 50 distinct sessions in any 24-hour period.
43
+
- <GlossaryTooltipterm="session identifier"link="/api-shield/get-started/#to-set-up-session-identifiers">Session identifiers</GlossaryTooltip>, such as an authorization token available as a request header or cookie, must be configured to allow Cloudflare to accurately detect individual sessions and perform the required per-session rate analysis.
44
+
45
+
After adding a session identifier, allow 24 hours for rate limit recommendations to appear on endpoints in the Cloudflare dashboard.
46
+
47
+
If recommendations fail to generate, one of the following response codes may appear in the Cloudflare dashboard:
48
+
49
+
| Error code | Description |
50
+
| --- | --- |
51
+
|`404 response`| Cloudflare has not seen sufficient valid traffic for this zone to generate initial recommendations. |
52
+
|`551 response`| Cloudflare previously generated recommendations, but we have not seen sufficient recent valid traffic to provide up-to-date suggestions. |
53
+
54
+
### Rate limiting recommendation calculation
41
55
42
56
Once rate limit recommendations appear in **Endpoints**, select the endpoint row to view more detail about the recommendation. You will see the overall recommended rate limit value, as well as p99, p90, and p50 rate limit values.
43
57
58
+
We calculate the recommended rate limit value throughout the day, and the new calculation may equal the existing recommendation due to similar traffic profiles existing on your API. When we recalculate, we look at requests that happened in the last 24 hours.
59
+
44
60
Cloudflare recommends choosing the overall rate limit recommendation, as our analysis includes the variance of the request rate distribution across your API sessions. Choosing a single p-value may cause false positives due to a high number of outliers.
45
61
46
62
:::note[p-values]
@@ -56,6 +72,7 @@ Implementing low confidence rate limits can still be helpful to prevent API abus
56
72
57
73
Refer to the [Rules documentation](https://developers.cloudflare.com/waf/rate-limiting-rules/create-zone-dashboard/) for more information on how to create an Advanced Rate Limiting rule.
58
74
75
+
59
76
## API
60
77
61
78
[Rate limit recommendations are available via the API](/api/resources/api_gateway/subresources/operations/methods/get/) if you would like to dynamically update rate limits over time.
0 commit comments