Skip to content

Commit 55bc643

Browse files
committed
Log Explorer updates
1 parent bcefaea commit 55bc643

File tree

5 files changed

+58
-0
lines changed

5 files changed

+58
-0
lines changed

src/content/docs/log-explorer/custom-dashboards.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ Dashboards provide a visual interface that displays key metrics and analytics, h
1717

1818
Different metrics serve distinct roles in providing insights into your application's performance. For example, total HTTP requests offer an overview of traffic volume, while average response time helps assess application speed. Additionally, usage metrics such as traffic patterns and user behavior provide insight into how users interact with your application. These metrics together enable you to spot trends, identify problems, and make informed, data-driven decisions.
1919

20+
:::note
21+
Data in Custom Dashboards is sampled. For access to raw, unsampled data, use the [Log Search](/log-explorer/log-search/).
22+
:::
23+
2024
## Create a new dashboard
2125

2226
To create a new dashboard:

src/content/docs/log-explorer/log-search.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ import { TabItem, Tabs, Render } from "~/components";
99

1010
Log Explorer enables you to store and explore your Cloudflare logs directly within the Cloudflare dashboard or API, giving you visibility into your logs without the need to forward them to third-party services. Logs are stored on Cloudflare's global network using the R2 object storage platform and can be queried via the dashboard or SQL API.
1111

12+
The default retention period for Log Explorer is 30 days for Enterprise plans, and 7 days for Pro and Business plans.
13+
1214
## SQL queries supported
1315

1416
The diagram below displays the example sql grammar for `SELECT` statements as a railroad syntax diagram:
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Detect Remote Code Execution attacks with Custom Dashboards
4+
sidebar:
5+
order: 1
6+
sidebar:
7+
label: Detect Remote Code Execution
8+
---
9+
10+
Monitor for high-risk threats like Remote Code Execution (RCE) by building custom dashboards that combine multiple security signals.
11+
12+
## Approach
13+
14+
Create a custom dashboard that visualizes RCE attack detections surfaced by Cloudflare’s Web Application Firewall (WAF). Enhance visibility by incorporating auxiliary data streams such as:
15+
16+
- Malicious content upload events
17+
- JA3/JA4 TLS fingerprint anomalies
18+
- Unusual source IP clusters
19+
20+
## Outcome
21+
22+
This integrated view enables rapid detection of potential compromise scenarios where an attacker may be executing arbitrary commands on exposed hosts. By correlating across these datasets, teams can confidently escalate incidents involving malware propagation or lateral movement—critical for reducing dwell time and mitigating broader system impact.
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Use cases
4+
sidebar:
5+
order: 5
6+
group:
7+
hideIndex: true
8+
---
9+
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Investigate Unauthorized Access Attempts with Log Search
4+
sidebar:
5+
order: 2
6+
sidebar:
7+
label: Investigate Unauthorized Access Attempts
8+
---
9+
10+
Trace the origin and intent of suspicious authentication behavior using raw log data with Log Search.
11+
12+
## Approach
13+
14+
Start with Zero Trust access logs that show unauthorized login attempts. Then correlate those events with HTTP request logs to identify patterns, such as bot-like behavior or repeated access from known bad actors.
15+
16+
## Outcome
17+
18+
This log-level investigation validates that the access attempts are not user error or isolated misconfigurations, but part of a coordinated automated attack. Teams can immediately deploy mitigations such as IP blocking, bot management rules, or adaptive access controls.
19+
20+
21+

0 commit comments

Comments
 (0)