You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -49,6 +48,10 @@ Cloudflare API Security products are available to Enterprise customers only, tho
49
48
50
49
The full API Shield security suite is available as an Enterprise-only paid add-on, but all customers can access [Endpoint Management](/api-shield/management-and-monitoring/) and [Schema validation](/api-shield/security/schema-validation/) functionalities.
51
50
51
+
:::note
52
+
API Shield currently does not work for JDCloud customers.
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,6 +183,10 @@ You can delete endpoints one at a time or in bulk.
183
183
</TabItem>
184
184
</Tabs>
185
185
186
+
:::caution
187
+
When you delete an endpoint from Endpoint Management, Cloudflare immediately stops tracking all associated performance and analytics data. The endpoint's previous historical metrics are permanently removed and cannot be restored. If you later save this endpoint again, metric tracking will resume, starting from the point the endpoint is re-saved.
188
+
:::
189
+
186
190
## Endpoint Analysis
187
191
188
192
For each saved endpoint, customers can view:
@@ -218,3 +222,14 @@ Once Sensitive Data Detection is enabled for your zone, API Shield queries firew
218
222
API Shield displays the types of sensitive data found if you expand the Endpoint Management table row to view further details. Select **Explore Events** to view the matched events in Security Events.
219
223
220
224
After Sensitive Data Detection is enabled for your zone, you can [browse the Sensitive Data Detection ruleset](https://dash.cloudflare.com/?to=/:account/:zone/security/data/ruleset/e22d83c647c64a3eae91b71b499d988e/rules). The link will not work if Sensitive Data Detection is not enabled.
225
+
226
+
## Limitations
227
+
228
+
Certain performance metrics, such as latency, are not supported when a request is handled by a Cloudflare service in a way that prevents it from being passed directly to your origin server.
229
+
230
+
This limitation is specifically observed when:
231
+
232
+
- A Cloudflare Worker is running on the URL path.
233
+
- Other products built on top of Workers, such as [Waiting Room](/waiting-room/), are active on the application.
234
+
235
+
In these scenarios, the system is unable to accurately measure the origin response time, and the metric will not be populated in the dashboard.
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/security/api-discovery.mdx
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,6 +91,18 @@ If all of your zone’s API traffic contains the <GlossaryTooltip term="session
91
91
92
92
You can direct any feedback about your API Discovery results to your account team.
93
93
94
+
## Requirements
95
+
96
+
To ensure your API endpoints are successfully discovered and mapped by Cloudflare, traffic to the endpoint must meet specific operational criteria.
97
+
98
+
If an endpoint does not appear in the Discovery inbox, it is typically because the system has not observed enough valid requests over a continuous period. API Discovery only processes requests that satisfy all of the following requirements:
99
+
100
+
- The request must return a `2xx` response code from the Cloudflare edge.
101
+
- The request must not come directly from Cloudflare Workers.
102
+
- The endpoint must receive at least 500 requests within a 10-day period.
103
+
104
+
Endpoints discovered using session identifiers will be labeled as such in the Cloudflare dashboard. If the endpoints are not discovered through session identifiers, they will be discovered using our machine learning-based [API Discovery](/api-shield/security/api-discovery/).
105
+
94
106
## Availability
95
107
96
108
API Discovery is only available for Enterprise customers. If you are an Enterprise customer and interested in this product, contact your account team.
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/security/schema-validation/index.mdx
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -356,7 +356,13 @@ OpenAPI schemas generated by different tooling may not be specific enough to imp
356
356
357
357
## Limitations
358
358
359
-
Schema validation supports [OpenAPI Version 3.0.x schemas](https://spec.openapis.org/oas/v3.0.3). OpenAPI 3.1 is not supported yet, and we do not plan to expand support for OpenAPI 2.0.
359
+
Cloudflare API Shield's Schema validation (importing) and [Schema learning](/api-shield/management-and-monitoring/endpoint-management/schema-learning/) (exporting) capabilities rely on the [OpenAPI Specification (OAS) v3.0](https://spec.openapis.org/oas/v3.0.3).
360
+
361
+
This support includes all patch versions, such as OAS v3.0.x. We do not currently support OAS v3.1 and do not plan to expand support for OpenAPI 2.0.
362
+
363
+
:::note
364
+
Cloudflare recommends using a third-party tool like [Swagger Editor](https://editor.swagger.io/) to ensure that all schemas are fully compliant with the OAS v3.0 specification before upload.
365
+
:::
360
366
361
367
Currently, API Shield does not support some features of API schemas, including the following: all responses, external references, non-basic path templating, or unique items.
Cloudflare Volumetric Abuse Detection helps you set up a system of adaptive rate limiting.
13
13
14
-
## About
15
-
16
-
After [API Discovery](/api-shield/security/api-discovery/), Cloudflare looks for <GlossaryTooltipterm="API endpoint">endpoint</GlossaryTooltip> abuse based on common user traffic.
14
+
Cloudflare looks for endpoint abuse based on user traffic to individual endpoints.
17
15
18
16
For example, your API might see different levels of traffic to a `/reset-password` endpoint than a `/login` endpoint. Additionally, your `/login` endpoint might see higher than average traffic after a successful marketing campaign.
19
17
@@ -25,22 +23,34 @@ Volumetric Abuse Detection rate limits are a way to prevent blatant volumetric a
25
23
26
24
## Process
27
25
28
-
Volumetric Abuse Detection analyzes your API’s individual session traffic statistics to recommend per-endpoint, per-session rate limits.
29
-
30
-
Volumetric Abuse Detection currently requires a <GlossaryTooltipterm="session identifier"link="/api-shield/get-started/#to-set-up-session-identifiers">session identifier</GlossaryTooltip>, like an authorization token available as a request header or cookie.
26
+
Volumetric Abuse Detection analyzes your API's individual session traffic statistics to recommend per-endpoint, per-session rate limits.
31
27
32
-
After adding a session identifier, allow 24 hours for rate limit recommendations to appear on endpoints in the Cloudflare dashboard.
28
+
To access your endpoints:
33
29
34
30
Old dashboard: **Security** > **API Shield** > **Endpoint Management**
35
31
36
32
New dashboard: **Security** > **Web Assets** > **Endpoints**
37
33
38
34
Recommendations will continue to update if your traffic pattern changes.
39
35
40
-
### Observe rate limits
36
+
### Requirements
37
+
38
+
Volumetric Abuse Detection generates rate limit thresholds only after collecting sufficient, statistically safe traffic data for an endpoint. If recommendations are missing for a discovered endpoint, the traffic likely failed to meet the necessary criteria.
39
+
40
+
Thresholds are suggested only for endpoints that satisfy all of the following requirements within the last seven days (or since initial discovery):
41
+
42
+
- The endpoint must receive sufficient valid traffic (traffic that meets the [API Discovery](/api-shield/security/api-discovery/#requirements) criteria). Intermittent or erratic traffic may prevent suggestions.
43
+
- The endpoint must be accessed by at least 50 distinct sessions in any 24-hour period during the last seven days.
44
+
- <GlossaryTooltipterm="session identifier"link="/api-shield/get-started/#to-set-up-session-identifiers">Session identifiers</GlossaryTooltip>, such as an authorization token available as a request header or cookie, must be configured to allow Cloudflare to accurately detect individual sessions and perform the required per-session rate analysis.
45
+
46
+
After adding a session identifier, allow 24 hours for rate limit recommendations to appear on endpoints in the Cloudflare dashboard.
47
+
48
+
### Rate limiting recommendation calculation
41
49
42
50
Once rate limit recommendations appear in **Endpoints**, select the endpoint row to view more detail about the recommendation. You will see the overall recommended rate limit value, as well as p99, p90, and p50 rate limit values.
43
51
52
+
We calculate the recommended rate limit value throughout the day, and the new calculation may equal the existing recommendation due to similar traffic profiles existing on your API. When we recalculate, we look at requests that happened in the last 24 hours.
53
+
44
54
Cloudflare recommends choosing the overall rate limit recommendation, as our analysis includes the variance of the request rate distribution across your API sessions. Choosing a single p-value may cause false positives due to a high number of outliers.
0 commit comments