Skip to content
Closed
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions src/content/docs/log-explorer/custom-dashboards.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,10 @@ Dashboards provide a visual interface that displays key metrics and analytics, h

Different metrics serve distinct roles in providing insights into your application's performance. For example, total HTTP requests offer an overview of traffic volume, while average response time helps assess application speed. Additionally, usage metrics such as traffic patterns and user behavior provide insight into how users interact with your application. These metrics together enable you to spot trends, identify problems, and make informed, data-driven decisions.

:::note
Data in Custom Dashboards is sampled. For access to raw, unsampled data, use the [Log Search](/log-explorer/log-search/).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe we want to link "sampled" to the GraphQL Analytics, since it's using that: https://developers.cloudflare.com/analytics/graphql-api/sampling/

:::

## Create a new dashboard

To create a new dashboard:
Expand Down
2 changes: 2 additions & 0 deletions src/content/docs/log-explorer/log-search.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ import { TabItem, Tabs, Render } from "~/components";

Log Explorer enables you to store and explore your Cloudflare logs directly within the Cloudflare dashboard or API, giving you visibility into your logs without the need to forward them to third-party services. Logs are stored on Cloudflare's global network using the R2 object storage platform and can be queried via the dashboard or SQL API.

The default retention period for Log Explorer is 30 days for Enterprise plans, and 7 days for Pro and Business plans.

## SQL queries supported

The diagram below displays the example sql grammar for `SELECT` statements as a railroad syntax diagram:
Expand Down
22 changes: 22 additions & 0 deletions src/content/docs/log-explorer/use-cases/detect-rce.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
pcx_content_type: how-to
title: Detect Remote Code Execution attacks with Custom Dashboards
sidebar:
order: 1
sidebar:
label: Detect Remote Code Execution
---

Monitor for high-risk threats like Remote Code Execution (RCE) by building custom dashboards that combine multiple security signals.

## Approach

Create a custom dashboard that visualizes RCE attack detections surfaced by Cloudflare’s Web Application Firewall (WAF). Enhance visibility by incorporating auxiliary data streams such as:

- Malicious content upload events
- JA3/JA4 TLS fingerprint anomalies
- Unusual source IP clusters

## Outcome

This integrated view enables rapid detection of potential compromise scenarios where an attacker may be executing arbitrary commands on exposed hosts. By correlating across these datasets, teams can confidently escalate incidents involving malware propagation or lateral movement—critical for reducing dwell time and mitigating broader system impact.
9 changes: 9 additions & 0 deletions src/content/docs/log-explorer/use-cases/index.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
pcx_content_type: how-to
title: Use cases
sidebar:
order: 5
group:
hideIndex: true
---

21 changes: 21 additions & 0 deletions src/content/docs/log-explorer/use-cases/unauthorized-access.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
---
pcx_content_type: how-to
title: Investigate Unauthorized Access Attempts with Log Search
sidebar:
order: 2
sidebar:
label: Investigate Unauthorized Access Attempts
---

Trace the origin and intent of suspicious authentication behavior using raw log data with Log Search.

## Approach

Start with Zero Trust access logs that show unauthorized login attempts. Then correlate those events with HTTP request logs to identify patterns, such as bot-like behavior or repeated access from known bad actors.

## Outcome

This log-level investigation validates that the access attempts are not user error or isolated misconfigurations, but part of a coordinated automated attack. Teams can immediately deploy mitigations such as IP blocking, bot management rules, or adaptive access controls.