Skip to content

Commit aebc638

Browse files
[API Shield] FAQ to docs (#25656)
* faq to docs * delete faq * redirect * spacing * Update src/content/docs/api-shield/security/volumetric-abuse-detection.mdx * Apply suggestions from code review * Update src/content/docs/api-shield/security/volumetric-abuse-detection.mdx Co-authored-by: marciocloudflare <[email protected]> --------- Co-authored-by: marciocloudflare <[email protected]>
1 parent 5b573d3 commit aebc638

File tree

7 files changed

+57
-82
lines changed

7 files changed

+57
-82
lines changed

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -242,6 +242,7 @@
242242
/api-shield/security/jwt-validation/configure/ /api-shield/security/jwt-validation/api/ 301
243243
/api-shield/security/schema-validation/configure/ /api-shield/security/schema-validation/api/ 301
244244
/api-shield/security/sequence-mitigation/configure/ /api-shield/security/sequence-mitigation/api/ 301
245+
/api-shield/frequently-asked-questions/ /api-shield/ 301
245246

246247
#autorag
247248
/autorag/usage/recipes/ /ai-search/how-to/ 301

src/content/docs/api-shield/frequently-asked-questions.mdx

Lines changed: 0 additions & 72 deletions
This file was deleted.

src/content/docs/api-shield/index.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ head:
1111

1212
import { Description, Feature, Plan, RelatedProduct, Render } from "~/components"
1313

14-
1514
<Description>
1615
Identify and address your API vulnerabilities.
1716
</Description>
@@ -49,6 +48,10 @@ Cloudflare API Security products are available to Enterprise customers only, tho
4948

5049
The full API Shield security suite is available as an Enterprise-only paid add-on, but all customers can access [Endpoint Management](/api-shield/management-and-monitoring/) and [Schema validation](/api-shield/security/schema-validation/) functionalities.
5150

51+
:::note
52+
API Shield currently does not work for JDCloud customers.
53+
:::
54+
5255
## Related products
5356

5457
<RelatedProduct header="DDoS Protection" href="/ddos-protection/" product="ddos-protection">

src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,10 @@ You can delete endpoints one at a time or in bulk.
183183
</TabItem>
184184
</Tabs>
185185

186+
:::caution
187+
When you delete an endpoint from Endpoint Management, Cloudflare immediately stops tracking all associated performance and analytics data. The endpoint's previous historical metrics are permanently removed and cannot be restored. If you later save this endpoint again, metric tracking will resume, starting from the point the endpoint is re-saved.
188+
:::
189+
186190
## Endpoint Analysis
187191

188192
For each saved endpoint, customers can view:
@@ -218,3 +222,14 @@ Once Sensitive Data Detection is enabled for your zone, API Shield queries firew
218222
API Shield displays the types of sensitive data found if you expand the Endpoint Management table row to view further details. Select **Explore Events** to view the matched events in Security Events.
219223

220224
After Sensitive Data Detection is enabled for your zone, you can [browse the Sensitive Data Detection ruleset](https://dash.cloudflare.com/?to=/:account/:zone/security/data/ruleset/e22d83c647c64a3eae91b71b499d988e/rules). The link will not work if Sensitive Data Detection is not enabled.
225+
226+
## Limitations
227+
228+
Certain performance metrics, such as latency, are not supported when a request is handled by a Cloudflare service in a way that prevents it from being passed directly to your origin server.
229+
230+
This limitation is specifically observed when:
231+
232+
- A Cloudflare Worker is running on the URL path.
233+
- Other products built on top of Workers, such as [Waiting Room](/waiting-room/), are active on the application.
234+
235+
In these scenarios, the system is unable to accurately measure the origin response time, and the metric will not be populated in the dashboard.

src/content/docs/api-shield/security/api-discovery.mdx

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,18 @@ If all of your zone’s API traffic contains the <GlossaryTooltip term="session
9191

9292
You can direct any feedback about your API Discovery results to your account team.
9393

94+
## Requirements
95+
96+
To ensure your API endpoints are successfully discovered and mapped by Cloudflare, traffic to the endpoint must meet specific operational criteria.
97+
98+
If an endpoint does not appear in the Discovery inbox, it is typically because the system has not observed enough valid requests over a continuous period. API Discovery only processes requests that satisfy all of the following requirements:
99+
100+
- The request must return a `2xx` response code from the Cloudflare edge.
101+
- The request must not come directly from Cloudflare Workers.
102+
- The endpoint must receive at least 500 requests within a 10-day period.
103+
104+
Endpoints discovered using session identifiers will be labeled as such in the Cloudflare dashboard. If the endpoints are not discovered through session identifiers, they will be discovered using our machine learning-based [API Discovery](/api-shield/security/api-discovery/).
105+
94106
## Availability
95107

96108
API Discovery is only available for Enterprise customers. If you are an Enterprise customer and interested in this product, contact your account team.

src/content/docs/api-shield/security/schema-validation/index.mdx

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -356,7 +356,13 @@ OpenAPI schemas generated by different tooling may not be specific enough to imp
356356

357357
## Limitations
358358

359-
Schema validation supports [OpenAPI Version 3.0.x schemas](https://spec.openapis.org/oas/v3.0.3). OpenAPI 3.1 is not supported yet, and we do not plan to expand support for OpenAPI 2.0.
359+
Cloudflare API Shield's Schema validation (importing) and [Schema learning](/api-shield/management-and-monitoring/endpoint-management/schema-learning/) (exporting) capabilities rely on the [OpenAPI Specification (OAS) v3.0](https://spec.openapis.org/oas/v3.0.3).
360+
361+
This support includes all patch versions, such as OAS v3.0.x. We do not currently support OAS v3.1 and do not plan to expand support for OpenAPI 2.0.
362+
363+
:::note
364+
Cloudflare recommends using a third-party tool like [Swagger Editor](https://editor.swagger.io/) to ensure that all schemas are fully compliant with the OAS v3.0 specification before upload.
365+
:::
360366

361367
Currently, API Shield does not support some features of API schemas, including the following: all responses, external references, non-basic path templating, or unique items.
362368

src/content/docs/api-shield/security/volumetric-abuse-detection.mdx

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,7 @@ import { GlossaryTooltip, Steps, Render, APIRequest } from "~/components"
1111

1212
Cloudflare Volumetric Abuse Detection helps you set up a system of adaptive rate limiting.
1313

14-
## About
15-
16-
After [API Discovery](/api-shield/security/api-discovery/), Cloudflare looks for <GlossaryTooltip term="API endpoint">endpoint</GlossaryTooltip> abuse based on common user traffic.
14+
Cloudflare looks for endpoint abuse based on user traffic to individual endpoints.
1715

1816
For example, your API might see different levels of traffic to a `/reset-password` endpoint than a `/login` endpoint. Additionally, your `/login` endpoint might see higher than average traffic after a successful marketing campaign.
1917

@@ -25,22 +23,34 @@ Volumetric Abuse Detection rate limits are a way to prevent blatant volumetric a
2523

2624
## Process
2725

28-
Volumetric Abuse Detection analyzes your API’s individual session traffic statistics to recommend per-endpoint, per-session rate limits.
29-
30-
Volumetric Abuse Detection currently requires a <GlossaryTooltip term="session identifier" link="/api-shield/get-started/#to-set-up-session-identifiers">session identifier</GlossaryTooltip>, like an authorization token available as a request header or cookie.
26+
Volumetric Abuse Detection analyzes your API's individual session traffic statistics to recommend per-endpoint, per-session rate limits.
3127

32-
After adding a session identifier, allow 24 hours for rate limit recommendations to appear on endpoints in the Cloudflare dashboard.
28+
To access your endpoints:
3329

3430
Old dashboard: **Security** > **API Shield** > **Endpoint Management**
3531

3632
New dashboard: **Security** > **Web Assets** > **Endpoints**
3733

3834
Recommendations will continue to update if your traffic pattern changes.
3935

40-
### Observe rate limits
36+
### Requirements
37+
38+
Volumetric Abuse Detection generates rate limit thresholds only after collecting sufficient, statistically safe traffic data for an endpoint. If recommendations are missing for a discovered endpoint, the traffic likely failed to meet the necessary criteria.
39+
40+
Thresholds are suggested only for endpoints that satisfy all of the following requirements within the last seven days (or since initial discovery):
41+
42+
- The endpoint must receive sufficient valid traffic (traffic that meets the [API Discovery](/api-shield/security/api-discovery/#requirements) criteria). Intermittent or erratic traffic may prevent suggestions.
43+
- The endpoint must be accessed by at least 50 distinct sessions in any 24-hour period during the last seven days.
44+
- <GlossaryTooltip term="session identifier" link="/api-shield/get-started/#to-set-up-session-identifiers">Session identifiers</GlossaryTooltip>, such as an authorization token available as a request header or cookie, must be configured to allow Cloudflare to accurately detect individual sessions and perform the required per-session rate analysis.
45+
46+
After adding a session identifier, allow 24 hours for rate limit recommendations to appear on endpoints in the Cloudflare dashboard.
47+
48+
### Rate limiting recommendation calculation
4149

4250
Once rate limit recommendations appear in **Endpoints**, select the endpoint row to view more detail about the recommendation. You will see the overall recommended rate limit value, as well as p99, p90, and p50 rate limit values.
4351

52+
We calculate the recommended rate limit value throughout the day, and the new calculation may equal the existing recommendation due to similar traffic profiles existing on your API. When we recalculate, we look at requests that happened in the last 24 hours.
53+
4454
Cloudflare recommends choosing the overall rate limit recommendation, as our analysis includes the variance of the request rate distribution across your API sessions. Choosing a single p-value may cause false positives due to a high number of outliers.
4555

4656
:::note[p-values]

0 commit comments

Comments
 (0)