Skip to content

Commit fcccf65

Browse files
[DDoS Protection] Log only and EOff ruleset override use case (#26107)
* log and eoff * styling
1 parent d0aeafd commit fcccf65

File tree

2 files changed

+18
-3
lines changed

2 files changed

+18
-3
lines changed

src/content/docs/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If you cannot deploy any additional overrides, consider editing an existing over
3737
</TabItem>
3838
<TabItem label="New dashboard" icon="rocket">
3939
<Steps>
40-
1. In the [Cloudflare dashboard, go to the **Security rules** page.
40+
1. In the Cloudflare dashboard, go to the **Security rules** page.
4141

4242
<DashButton url="/?to=/:account/:zone/security/security-rules" />
4343
2. Go to the **DDoS protection** tab.

src/content/docs/ddos-protection/managed-rulesets/network/network-overrides/override-examples.mdx

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ head:
99

1010
---
1111

12-
import { Details, GlossaryTooltip } from "~/components"
12+
import { Details, GlossaryTooltip, DashButton } from "~/components"
1313

1414
## Use cases
1515

@@ -25,4 +25,19 @@ The override only applies to the fingerprint and not the detection. Refer to [Im
2525

2626
### Attack traffic is flagged by the adaptive rule based on UDP and destination port
2727

28-
If you recognize that the traffic flagged by the adaptive rule based on UDP and destination port is an attack, you create an override rule to enable the adaptive rule in mitigation mode, setting the action to block the traffic.
28+
If you recognize that the traffic flagged by the adaptive rule based on UDP and destination port is an attack, you create an override rule to enable the adaptive rule in mitigation mode, setting the action to block the traffic.
29+
30+
### Minimize the risk of false positives impacting production traffic
31+
32+
To avoid disruptions during initial deployment, you can create a _Log_ only – _Essentially Off_ ruleset override that allows all traffic while logging detection results. This lets you safely observe and analyze DDoS activity before enabling enforcement.
33+
34+
1. In the Cloudflare dashboard, go to the **Security rules** page.
35+
36+
<DashButton url="/?to=/:account/:zone/security/security-rules" />
37+
2. Go to the **DDoS protection** tab.
38+
3. On **HTTP DDoS attack protection**, select **Create override**.
39+
4. Set the **Scope** to _Apply to all incoming packets_.
40+
5. Under **Ruleset configuration**:
41+
- Set the **Ruleset action** to _Log_.
42+
- Set the **Ruleset sensitivity** to _Essentially Off_.
43+
6. Select **Save**.

0 commit comments

Comments
 (0)