You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/radar/investigate/application-layer-attacks.mdx
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Since we are examining attacks, we can inspect both sides of an attack — both
17
17
18
18
This ability to filter by both sides of the attack is only available in the `top locations` endpoints. Unless otherwise specified, other endpoints are filtered by source location, like the origin location of the attack.
19
19
20
-
The magnitude of the attack is defined by the total number of mitigated requests, unless otherwise specified.
20
+
The magnitude of the attack is defined by the total number of mitigated requests.
21
21
22
22
Like in [HTTP requests](/radar/investigate/http-requests), these endpoints can be split into the ability to fetch a timeseries, a single value summarizing the entire date range, and a list of top locations.
23
23
@@ -167,10 +167,8 @@ For more information refer to [Get layer 7 top target locations](/api/resources/
167
167
168
168
Which source-target location pairs constitute the biggest attacks in the last 24 hours?
169
169
170
-
How big an attack is, or the attack magnitude, can be defined by the number of mitigated requests (the default) or by the number of total zones under attack.
@@ -232,8 +230,6 @@ A typical response will be similar to the following:
232
230
233
231
This means that 3.79% of all mitigated requests are from and to the US, 3.6% of all mitigated requests are from the US to Belgium, etc..
234
232
235
-
This response came from a query that is using attack `magnitude` as the sum of mitigated requests. To use the number of unique zones attacked as the metric, for example, use `attack_magnitude=AFFECTED_ZONES`.
236
-
237
233
For more information refer to [Get layer 7 top attack pairs](/api/resources/radar/subresources/attacks/subresources/layer7/subresources/top/methods/attacks/).
The layer 7 attack `magnitude` query parameter, which allows defining attack magnitude by total requests mitigated (`MITIGATED_REQUESTS`) or total zones attacked (`AFFECTED_ZONES`), is deprecated.
16
+
Moving forward, Cloudflare Radar will only support defining layer 7 attack magnitude based on the total number of mitigated requests.
17
+
18
+
Affected API:
19
+
20
+
`GET /radar/attacks/layer7/top/attacks`
21
+
22
+
Replacement:
23
+
24
+
Users should stop using the `magnitude` parameter, as the default behavior already uses `MITIGATED_REQUESTS`.
25
+
8
26
- publish_date: "2025-07-01"
9
27
title: Cloudflare DWeb Resolver
10
28
description: |-
@@ -191,27 +209,27 @@ entries:
191
209
192
210
The following URL parameters for filtering DNS records are deprecated:
193
211
194
-
- `name=contains:value`
212
+
- `name=contains:value`
195
213
Instead, use the supported `name.contains=value` syntax.
196
-
- `name=starts_with:value`
214
+
- `name=starts_with:value`
197
215
Instead, use the supported `name.startswith=value` syntax.
198
-
- `name=ends_with:value`
216
+
- `name=ends_with:value`
199
217
Instead, use the supported `name.endswith=value` syntax.
200
-
- `name=one,two,three` (searching for one of multiple possible names, separated by commas)
218
+
- `name=one,two,three` (searching for one of multiple possible names, separated by commas)
201
219
Instead, make multiple requests, one for each possible `name`.
202
220
Alternatively, if only querying the `name` field, the `?match=any&name=one&name=two&name=three` syntax can be used instead.
203
221
This syntax has an extended deprecation date of May 23, 2025.
204
-
- `content=contains:value`
222
+
- `content=contains:value`
205
223
Instead, use the supported `content.contains=value` syntax.
206
-
- `content=starts_with:value`
224
+
- `content=starts_with:value`
207
225
Instead, use the supported `content.startswith=value` syntax.
208
-
- `content=ends_with:value`
226
+
- `content=ends_with:value`
209
227
Instead, use the supported `content.endswith=value` syntax.
210
-
- `content=one,two,three` (searching for one of multiple possible contents, separated by commas)
228
+
- `content=one,two,three` (searching for one of multiple possible contents, separated by commas)
211
229
Instead, make multiple requests, one for each possible `content`.
212
230
Alternatively, if only querying the `content` field, the `?match=any&content=one&content=two&content=three` syntax can be used instead.
213
231
This syntax has an extended deprecation date of May 23, 2025.
214
-
- `type=contains:value`
232
+
- `type=contains:value`
215
233
Searching for substrings of a type name will no longer be supported.
216
234
Instead, please search for an exact type name, such as `type=CNAME`.
217
235
If the input value is a free-text search from a human user, consider using the `search` parameter instead.
0 commit comments