Skip to content

Commit 74623aa

Browse files
[DDoS Protection/Network Analytics] Clarify log behavior (#19416)
* clarify log behavior * remove import * Update src/content/docs/analytics/network-analytics/configure/displayed-data.mdx Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com> --------- Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent 1bd798f commit 74623aa

File tree

4 files changed

+26
-3
lines changed

4 files changed

+26
-3
lines changed

src/content/docs/analytics/network-analytics/configure/displayed-data.mdx

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,3 +67,18 @@ Note that some filters will not be added to the new Magic Firewall rule definiti
6767
Enable the **Show annotations** toggle to show or hide annotations for advertised/withdrawn IP prefix events in the **Network Analytics** view. Select each annotation to get more details.
6868

6969
![Network Analytics chart displaying IP prefix-related annotations.](~/assets/images/analytics/network-analytics/view-annotations.png)
70+
71+
## View logged or monitored traffic
72+
73+
[Network DDoS managed rules](/ddos-protection/managed-rulesets/network/) and [Advanced DDoS Protection systems](/ddos-protection/advanced-ddos-systems/overview/) provide a `log` or `monitoring` mode that does not drop traffic. These `log` and `monitoring` mode events are based on **Verdict** and **Outcome**/**Action** fields.
74+
75+
To filter for these traffic events:
76+
77+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
78+
2. Go to **Analytics & Logs** > **Network Analytics** > **DDoS managed rules**.
79+
3. Select **Add filter**.
80+
- Set `Verdict equals drop`.
81+
- Set `Action equals pass`.
82+
4. Select **Apply**.
83+
84+
By setting `verdict` to `drop` and `outcome` as `pass`, we are filtering for traffic that was marked as a detection (that is, verdict was `drop`) but was not dropped (for example, outcome was `pass`).

src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,8 @@ Besides defining rules with one of the above scopes, you must also select the [p
5858
The Advanced TCP Protection system constantly learns your TCP connections to mitigate DDoS attacks. Advanced TCP Protection rules can have one of the following execution modes: monitoring, mitigation (enabled), or disabled.
5959

6060
- **Monitoring**
61-
- In this mode, Advanced TCP Protection will not impact any packets. Instead, the protection system will learn your legitimate TCP connections and show you what it would have mitigated. Check Network Analytics to visualize what actions Advanced TCP Protection would have taken on incoming packets, according to the current configuration.
61+
- In this mode, Advanced TCP Protection will not impact any packets. Instead, the protection system will learn your legitimate TCP connections and show you what it would have mitigated. Check Network Analytics to visualize what actions Advanced TCP Protection would have taken on incoming packets, according to the current configuration. <Render file="log-and-monitor-behavior-link" />
62+
6263

6364
- **​​Mitigation (Enabled)**
6465
- In this mode, Advanced TCP Protection will learn your legitimate TCP connections and perform mitigation actions on incoming TCP DDoS attacks based on the rule configuration (burst and rate sensitivity) and your [allowlist](/ddos-protection/advanced-ddos-systems/concepts/#allowlist).
@@ -99,7 +100,9 @@ The default rate sensitivity and recommended setting is _Low_. You should only i
99100

100101
## Filter
101102

102-
<Render file="atp-filter-definition" /> The filter expression can reference source and destination IP addresses and ports. Each system component (SYN flood protection and out-of-state TCP protection) should have one or more [rules](#rule), but filters are optional.
103+
<Render file="atp-filter-definition" />
104+
105+
The filter expression can reference source and destination IP addresses and ports. Each system component (SYN flood protection and out-of-state TCP protection) should have one or more [rules](#rule), but filters are optional.
103106

104107
Each system component has its own filters. You can configure a filter for each execution mode:
105108

src/content/docs/ddos-protection/managed-rulesets/network/override-parameters.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The action performed for packets that match specific rules of Cloudflare's DDoS
2626

2727
- **Log**
2828
- API value: `"log"`.
29-
- Only available on Enterprise plans. Logs requests that match the expression of a rule detecting network layer DDoS attacks. Recommended for validating a rule before committing to a more severe action.
29+
- Only available on Enterprise plans. Logs requests that match the expression of a rule detecting network layer DDoS attacks. Recommended for validating a rule before committing to a more severe action. <Render file="log-and-monitor-behavior-link" />
3030

3131
- **Block**
3232
- API value: `"block"`.
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
---
2+
{}
3+
---
4+
5+
Refer to the [Analytics documentation](/analytics/network-analytics/configure/displayed-data/#view-logged-or-monitored-traffic) for more information on how to view logged or monitored traffic.

0 commit comments

Comments
 (0)