Skip to content

Commit 4c3f71d

Browse files
committed
[Radar] Deprecate layer 7 attack magnitude parameter
1 parent a5a30f2 commit 4c3f71d

File tree

2 files changed

+29
-15
lines changed

2 files changed

+29
-15
lines changed

src/content/docs/radar/investigate/application-layer-attacks.mdx

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Since we are examining attacks, we can inspect both sides of an attack — both
1717

1818
This ability to filter by both sides of the attack is only available in the `top locations` endpoints. Unless otherwise specified, other endpoints are filtered by source location, like the origin location of the attack.
1919

20-
The magnitude of the attack is defined by the total number of mitigated requests, unless otherwise specified.
20+
The magnitude of the attack is defined by the total number of mitigated requests.
2121

2222
Like in [HTTP requests](/radar/investigate/http-requests), these endpoints can be split into the ability to fetch a timeseries, a single value summarizing the entire date range, and a list of top locations.
2323

@@ -167,10 +167,8 @@ For more information refer to [Get layer 7 top target locations](/api/resources/
167167

168168
Which source-target location pairs constitute the biggest attacks in the last 24 hours?
169169

170-
How big an attack is, or the attack magnitude, can be defined by the number of mitigated requests (the default) or by the number of total zones under attack.
171-
172170
```bash
173-
curl "https://api.cloudflare.com/client/v4/radar/attacks/layer7/top/attacks?limit=5&dateRange=1d&magnitude=MITIGATED_REQUESTS&format=json" \
171+
curl "https://api.cloudflare.com/client/v4/radar/attacks/layer7/top/attacks?limit=5&dateRange=1d&format=json" \
174172
--header "Authorization: Bearer <API_TOKEN>"
175173
```
176174

@@ -232,8 +230,6 @@ A typical response will be similar to the following:
232230

233231
This means that 3.79% of all mitigated requests are from and to the US, 3.6% of all mitigated requests are from the US to Belgium, etc..
234232

235-
This response came from a query that is using attack `magnitude` as the sum of mitigated requests. To use the number of unique zones attacked as the metric, for example, use `attack_magnitude=AFFECTED_ZONES`.
236-
237233
For more information refer to [Get layer 7 top attack pairs](/api/resources/radar/subresources/attacks/subresources/layer7/subresources/top/methods/attacks/).
238234

239235
## Next steps

src/content/release-notes/api-deprecations.yaml

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,24 @@ productLink: "/fundamentals/"
55
productArea: Core platform
66
productAreaLink: /fundamentals/reference/changelog/platform/
77
entries:
8+
- publish_date: "2025-03-11"
9+
title: "Cloudflare Radar: Layer 7 attack magnitude parameter"
10+
description: |-
11+
Deprecation date: March 11, 2025
12+
13+
End of life date: June 11, 2025
14+
15+
The layer 7 attack `magnitude` query parameter, which allows defining attack magnitude by total requests mitigated (`MITIGATED_REQUESTS`) or total zones attacked (`AFFECTED_ZONES`), is deprecated.
16+
Moving forward, Cloudflare Radar will only support defining layer 7 attack magnitude based on the total number of mitigated requests.
17+
18+
Affected API:
19+
20+
`GET /radar/attacks/layer7/top/attacks`
21+
22+
Replacement:
23+
24+
Users should stop using the `magnitude` parameter, as the default behavior already uses `MITIGATED_REQUESTS`.
25+
826
- publish_date: "2025-07-01"
927
title: Cloudflare DWeb Resolver
1028
description: |-
@@ -191,27 +209,27 @@ entries:
191209
192210
The following URL parameters for filtering DNS records are deprecated:
193211
194-
- `name=contains:value`
212+
- `name=contains:value`
195213
Instead, use the supported `name.contains=value` syntax.
196-
- `name=starts_with:value`
214+
- `name=starts_with:value`
197215
Instead, use the supported `name.startswith=value` syntax.
198-
- `name=ends_with:value`
216+
- `name=ends_with:value`
199217
Instead, use the supported `name.endswith=value` syntax.
200-
- `name=one,two,three` (searching for one of multiple possible names, separated by commas)
218+
- `name=one,two,three` (searching for one of multiple possible names, separated by commas)
201219
Instead, make multiple requests, one for each possible `name`.
202220
Alternatively, if only querying the `name` field, the `?match=any&name=one&name=two&name=three` syntax can be used instead.
203221
This syntax has an extended deprecation date of May 23, 2025.
204-
- `content=contains:value`
222+
- `content=contains:value`
205223
Instead, use the supported `content.contains=value` syntax.
206-
- `content=starts_with:value`
224+
- `content=starts_with:value`
207225
Instead, use the supported `content.startswith=value` syntax.
208-
- `content=ends_with:value`
226+
- `content=ends_with:value`
209227
Instead, use the supported `content.endswith=value` syntax.
210-
- `content=one,two,three` (searching for one of multiple possible contents, separated by commas)
228+
- `content=one,two,three` (searching for one of multiple possible contents, separated by commas)
211229
Instead, make multiple requests, one for each possible `content`.
212230
Alternatively, if only querying the `content` field, the `?match=any&content=one&content=two&content=three` syntax can be used instead.
213231
This syntax has an extended deprecation date of May 23, 2025.
214-
- `type=contains:value`
232+
- `type=contains:value`
215233
Searching for substrings of a type name will no longer be supported.
216234
Instead, please search for an exact type name, such as `type=CNAME`.
217235
If the input value is a free-text search from a human user, consider using the `search` parameter instead.

0 commit comments

Comments
 (0)