Skip to content

Commit 4ace81c

Browse files
cdraper-cloudflaremarciocloudflarehyperlint-ai[bot]
authored andcommitted
MNM documentation update for Birthday Week 2024! Let's Go! (#17044)
* MNM documentation update for Birthday Week 2024! Let's Go! * Apply suggestions from code review Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com> * Apply suggestions from code review * Update src/content/docs/magic-network-monitoring/index.mdx --------- Co-authored-by: marciocloudflare <[email protected]> Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent 43d8661 commit 4ace81c

File tree

7 files changed

+59
-32
lines changed

7 files changed

+59
-32
lines changed

src/content/docs/magic-network-monitoring/faq.mdx

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,21 @@ title: FAQ
44
structured_data: true
55
sidebar:
66
order: 11
7-
87
---
98

9+
## Can I send NetFlow/sFlow data to Cloudflare in a secure, encrypted way?
10+
11+
Yes. Both enterprise and free customers can send encrypted network flow data to Cloudflare.
12+
13+
Enterprise customers with Magic Transit or Magic WAN are able to send encrypted network flow data via an IPsec tunnel to Cloudflare's network. You can achieve this by:
14+
15+
1. Configuring your [NetFlow](/magic-network-monitoring/routers/netflow-ipfix-config/) or [sFlow](/magic-network-monitoring/routers/sflow-config/) data to be sent to Cloudflare's network for parsing.
16+
2. Directing that network flow data to be sent over [Magic Transit IPsec tunnels](/magic-transit/how-to/configure-tunnels/) or [Magic WAN IPsec tunnels](/magic-wan/configuration/manually/how-to/configure-tunnels/) to Cloudflare's network.
17+
18+
Cloudflare's network will then identify this traffic via the destination IP address/port, and direct the network flow traffic to Magic Network Monitoring for parsing.
19+
20+
Free customers can route their network flow traffic through a device that is running the WARP client. Then, network flow traffic can be forwarded from the WARP enabled device to Cloudflare's network flow endpoints. You can learn more about this in the [Encrypt network flow data tutorial](/magic-network-monitoring/tutorials/encrypt-network-flow-data).
21+
1022
## I have Auto-Advertisement enabled and it was triggered by an attack. Do I have to turn Magic Transit off manually?
1123

1224
Once Auto-Advertisement is activated for an IP prefix that is under attack, the IP prefix will continue to be advertised by Cloudflare even if the attack ends. You will then need to manually disable advertisement for that IP prefix. Refer to [Configure dynamic advertisement](/byoip/concepts/dynamic-advertisement/best-practices/#configure-dynamic-advertisement) to learn how to withdraw your prefixes, and stop using Magic Transit.
@@ -41,14 +53,3 @@ It is recommended that you set your router's public IP address and network flow
4153
Currently, all data received from a customer's router goes to our servers in the US. If you enable data sovereignty in Europe, you cannot currently use Magic Network Monitoring.
4254

4355
GraphQL analytics is retained for 90 days for enterprise customers. For non-enterprise customers, data retention is seven days. Cloudflare also retains data for six hours in the US, for threshold crossing detection.
44-
45-
## Can I send NetFlow/sFlow data to Cloudflare in a secure, encrypted way?
46-
47-
Yes. Enterprise customers with Magic Transit or Magic WAN are able to send encrypted network flow data via an IPsec tunnel to Cloudflare's network. You can achieve this by:
48-
49-
1. Configuring your [NetFlow](/magic-network-monitoring/routers/netflow-ipfix-config/) or [sFlow](/magic-network-monitoring/routers/sflow-config/) data to be sent to Cloudflare’s network for parsing.
50-
2. Directing that network flow data to be sent over a [Magic Transit IPsec tunnels](/magic-transit/how-to/configure-tunnels/) or [Magic WAN IPsec tunnels](/magic-wan/configuration/manually/how-to/configure-tunnels/) to Cloudflare's network.
51-
52-
Cloudflare's network will then identify this traffic via the destination IP address/port, and direct the network flow traffic to Magic Network Monitoring for parsing.
53-
54-
This feature is not available to Magic Network Monitoring free customers.

src/content/docs/magic-network-monitoring/get-started.mdx

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,13 @@ title: Get started
33
pcx_content_type: get-started
44
sidebar:
55
order: 2
6-
76
---
87

9-
import { GlossaryTooltip } from "~/components"
10-
11-
To begin using Magic Network Monitoring, complete the list of tasks below. If you are an Enterprise customer, Cloudflare can significantly accelerate the timeline during active-attack scenarios.
8+
import { GlossaryTooltip } from "~/components";
129

13-
If you are an Enterprise customer and would like to use Magic Network Monitoring and Magic Transit On Demand together, begin by [configuring Magic Transit](/magic-transit/get-started/).
10+
To begin using Magic Network Monitoring, complete the list of tasks below.
1411

15-
There is also a [free version](/magic-network-monitoring/magic-network-monitoring-free/) of Magic Network Monitoring in a closed beta right now. Refer to it to learn about the functionalities and limits of this version.
12+
If you are an Enterprise customer, Cloudflare can significantly accelerate the onboarding timeline during active-attack scenarios. Enterprise customers that would like to use Magic Network Monitoring and Magic Transit On Demand together can begin by [configuring Magic Transit](/magic-transit/get-started/).
1613

1714
## 1. Verify NetFlow or sFlow capabilities
1815

src/content/docs/magic-network-monitoring/index.mdx

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,24 +6,33 @@ sidebar:
66
head:
77
- tag: title
88
content: Cloudflare Magic Network Monitoring
9-
109
---
1110

12-
import { CardGrid, Description, Feature, GlossaryTooltip, LinkTitleCard, Plan, RelatedProduct } from "~/components"
11+
import {
12+
CardGrid,
13+
Description,
14+
Feature,
15+
GlossaryTooltip,
16+
LinkTitleCard,
17+
Plan,
18+
RelatedProduct,
19+
} from "~/components";
1320

1421
<Description>
1522

16-
Detect and receive notifications about attacks based on traffic flows.
23+
Improve your network visibility and detect DDoS attacks based on traffic flows.
1724

1825
</Description>
1926

2027
<Plan type="all" />
2128

2229
Magic Network Monitoring provides visibility into your network traffic by analyzing network <GlossaryTooltip term="flow data">flow data</GlossaryTooltip> sent from a customer’s routers. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
2330

24-
Enterprise customers can use Magic Network Monitoring with [Magic Transit on-demand](/magic-transit/on-demand/) to monitor their network, identify volumetric DDoS attacks, and activate Magic Transit on-demand to mitigate those attacks.
31+
Magic Network Monitoring is generally available to everyone with a Cloudflare account by default. You can log in to your Cloudflare dashboard, select your account, then go to **Analytics & Logs** > **Magic Monitoring** to get started.
2532

26-
Magic Network Monitoring is automatically enabled for all Magic Transit and Magic WAN enterprise customers. Any enterprise customers without Magic Transit or Magic WAN that are interested in testing Magic Network Monitoring can receive access to the Magic Network Monitoring [free version](/magic-network-monitoring/magic-network-monitoring-free/) by submitting a request to their Cloudflare account team.
33+
Everyone can use the [free version](/magic-network-monitoring/magic-network-monitoring-free/) of Magic Network Monitoring in a home network, network lab, or business to get end to end visibility across their network traffic. Potential enterprise customers are encouraged to use the free version to run a proof of concept.
34+
35+
Enterprise customers can use Magic Network Monitoring with [Magic Transit on-demand](/magic-transit/on-demand/) to monitor their network, identify volumetric DDoS attacks, and activate Magic Transit on-demand to mitigate those attacks.
2736

2837
Learn how to [get started](/magic-network-monitoring/get-started/).
2938

@@ -56,24 +65,32 @@ Set up notifications to learn about an attack.
5665
<RelatedProduct header="Magic Transit" href="/magic-transit/" product="magic-transit">
5766

5867
Mitigates L7, L4, and L3 DDoS attacks with Magic Network Monitoring with Magic Transit on-demand.
68+
5969
</RelatedProduct>
6070

6171
<RelatedProduct header="DDoS Protection" href="/ddos-protection/" product="ddos-protection">
6272

6373
Provides HTTP DDoS attack protection for zones onboarded to Cloudflare in addition to L3 and L4 DDoS attack protection.
74+
6475
</RelatedProduct>
6576

6677
<RelatedProduct header="Cloudflare Network Interconnect" href="/network-interconnect/" product="network-interconnect">
6778

6879
Connects your network infrastructure directly with Cloudflare – rather than using the public Internet – for a more reliable and secure experience.
80+
6981
</RelatedProduct>
7082

7183
## More resources
7284

7385
<CardGrid>
7486

75-
<LinkTitleCard title="Discord" href="https://discord.com/invite/cloudflaredev" icon="discord">
76-
Connect with the Magic Network Monitoring community on Discord to ask questions, and share feedback.
87+
<LinkTitleCard
88+
title="Discord"
89+
href="https://discord.com/invite/cloudflaredev"
90+
icon="discord"
91+
>
92+
Connect with the Magic Network Monitoring community on Discord to ask
93+
questions, and share feedback.
7794
</LinkTitleCard>
7895

7996
</CardGrid>

src/content/docs/magic-network-monitoring/magic-network-monitoring-free.mdx

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,16 @@ title: Free version
33
pcx_content_type: reference
44
sidebar:
55
order: 8
6-
badge:
7-
text: Beta
86
head:
97
- tag: title
108
content: Magic Network Monitoring free version
119
---
1210

13-
The free version of Magic Network Monitoring (MNM) is currently in a closed beta. All customers with a Cloudflare account can request early access to the free version of MNM by [filling out this form](https://docs.google.com/forms/d/1umsmwHmXgMesP2t4wH94uVExHaT60tb5RTeawqR_9Cg/edit).
11+
The free version of Magic Network Monitoring (MNM) is generally available to everyone with a Cloudflare account by default.
1412

15-
If you would like your request for early access to MNM to be prioritized, please join [Cloudflares Discord server](https://discord.com/invite/cloudflaredev) and ask about early access in the MNM Discord channel. We prioritize Discord community members because Discord creates a great environment for engaging with users, helping with configuration, answering questions, and collecting valuable product feedback.
13+
All free customers are encouraged to join [Cloudflare's Discord server](https://discord.com/invite/cloudflaredev) to discuss the use cases, configuration, and troubleshooting of Magic Network Monitoring. Free customers are always welcome to provide product feedback and discuss feature requests. The product and engineering team that works on Magic Network Monitoring regularly engages with the Discord community.
1614

17-
You can find the channel by joining the Cloudflare Developers Discord server. Then scroll down in the side bar navigation to the **Products** category and select **magic-network-monitoring**.
15+
You can find the channel by joining the Cloudflare Developers Discord server. Then scroll down in the side bar navigation to the **Cloudflare One** category and select **magic-network-monitoring**.
1816

1917
## Access the free version of MNM
2018

src/content/docs/magic-network-monitoring/tutorials/ddos-testing-guide.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: DDoS testing guide
33
pcx_content_type: tutorial
44
updated: 2024-06-18
55
sidebar:
6-
order: 2
6+
order: 3
77
head:
88
- tag: title
99
content: Magic Network Monitoring DDoS testing guide
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Encrypt network flow data
3+
pcx_content_type: tutorial
4+
updated: 2024-09-23
5+
sidebar:
6+
order: 1
7+
head:
8+
- tag: title
9+
content: Magic Network Monitoring encrypt network flow data
10+
---
11+
12+
Customers can encrypt the network flow data sent from their router to Cloudflare by routing their network flow traffic through a device running the WARP client. Then, encrypted network flow traffic can be forwarded from the WARP enabled device to Cloudflare's network flow endpoints.
13+
14+
To learn more about the WARP client, and to install the WARP client on Linux, macOS, or Windows, you can visit the [WARP client documentation](/cloudflare-one/connections/connect-devices/warp/).

src/content/docs/magic-network-monitoring/tutorials/graphql-analytics.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ updated: 2023-01-04
55
languages:
66
- GraphQL
77
sidebar:
8-
order: 1
8+
order: 2
99
head:
1010
- tag: title
1111
content: GraphQL Analytics

0 commit comments

Comments
 (0)