Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
dd0eecd
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
6be0804
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
ce76323
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
929b0b0
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
e4a57dd
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
4a6e066
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
45c40e2
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
456b364
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
8a9b444
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
0108498
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
35dd8f0
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
240d1cb
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
d93dfd0
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
ad25201
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
297b90d
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
88722f3
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
9c42511
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
6b1c92b
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
d355e35
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
0699b06
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
cbb0130
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
746ea1b
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
d6408b2
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
b4cc4d9
Hyperlint Automation Fix
hyperlint-ai[bot] Jul 17, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ To access this content, you must verify your AI crawler.

Ensure your AI crawler identifies itself with the required headers for Web Bot Auth.

Follow the steps found in [Web Both Auth](/bots/concepts/bot/verified-bots/web-bot-auth/).
Follow the steps found in [Web Bot Auth](/bots/concepts/bot/verified-bots/web-bot-auth/).

## 2. Follow verified bot policy

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ Once decompressed, the integration package includes:
:::note[Note]


By default, all log messages are sent over TCPt. TLS encryption between the
By default, all log messages are sent over TCP. TLS encryption between the
Lambda function and Graylog is not currently supported. We recommend taking
appropriate measures to secure the log messages in transit, such as placing
the Lambda function within a secure VPC subnet where the Graylog node or
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ For reference information on NAv2 nodes, refer to the [NAv2 node reference](/ana

:::note[Obtaining data for ingress traffic only]

All the NAv2 `*AnalyticsAdaptiveGroups` nodes include data for ingress and egress traffic. To obtain data about ingress traffic only, include `direction: "ingress"` in your [GraphQL query filter](/analytics/graphql-api/features/filtering/).
All the NAv2 `*AnalyticsAdaptiveGroups` nodes include data for ingress and egress traffic. To obtain data about ingress traffic only, include `direction: 'ingress'` in your [GraphQL query filter](/analytics/graphql-api/features/filtering/).
:::

## Schema comparison
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ The sample rate is 1/1,000 packets.

### `advancedDnsProtectionNetworkAnalyticsAdaptiveGroups`

This node is only available to Magic Transit customers. Provides metadata about DNS-based DDoS attacks mitigated by Cloudflare's [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/) system.
This node is only available to Magic Transit customers. Provides metadata about DNS-based DDoS attacks mitigated by Cloudflare's [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/) system.

Samples include information about the following DNS header fields:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -103,4 +103,4 @@ Rather than filter by `cfRayId`, you may also [filter](/analytics/graphql-api/fe

You can compare the query results to your Access policies to understand why a user was blocked. For example, if your application requires a valid mTLS certificate, Access blocked the request shown above because `mtlsStatus`, `mtlsCommonName`, and `mtlsCertSerialId` are empty.

[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ title: Querying Firewall Events with GraphQL

In this example, we are going to use the GraphQL Analytics API to query for Firewall Events over a specified time period.

The following API call will request Firewall Events over a one hour period, and output the requested fields. Be sure to replace `<CLOUDFLARE_ZONE_TAG>`, `<EMAIL>`, and `<API_TOKEN>`[^1] with your zone tag and API credentials, and adjust the `datetime_geg` and `datetime_leq` values to your liking.
The following API call will request Firewall Events over a one hour period, and output the requested fields. Be sure to replace `<CLOUDFLARE_ZONE_TAG>`, `<EMAIL>`, and `<API_TOKEN>`[^1] with your zone tag and API credentials, and adjust the `datetime_geq` and `datetime_leq` values to your liking.

## API Call

Expand Down Expand Up @@ -183,4 +183,4 @@ https://api.cloudflare.com/client/v4/graphql \
#=> }
```

[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ title: Querying Magic Firewall Intrusion Detection System (IDS) samples with Gra

In this example, we are going to use the GraphQL Analytics API to query for IDS samples over a specified time period.

The following API call will request IDS samples over a one hour period, and output the requested fields. Be sure to replace `<CLOUDFLARE_ACCOUNT_TAG>` and `<API_TOKEN>`[^1] with your account tag and API credentials, and adjust the `datetime_geg` and `datetime_leq` values to your liking.
The following API call will request IDS samples over a one hour period, and output the requested fields. Be sure to replace `<CLOUDFLARE_ACCOUNT_TAG>` and `<API_TOKEN>`[^1] with your account tag and API credentials, and adjust the `datetime_geq` and `datetime_leq` values to your liking.

## API Call

Expand Down Expand Up @@ -66,13 +66,13 @@ https://api.cloudflare.com/client/v4/graphql \
#=> {
#=> sum: { bits: 327680, packets: 16384 },
#=> dimensions: {
#=> datetimeFiveMinute: '2021-05-12T22:00-00:00'
datetimeFiveMinutes: '2021-05-12T22:00-00:00'
#=> }
#=> },
#=> {
#=> sum: { bits: 360448, packets: 8192 },
#=> dimensions: {
#=> datetimeFiveMinute: '2021-05-12T22:05-00:00'
datetimeFiveMinutes: '2021-05-12T22:05-00:00'
#=> }
#=> },
#=> {
Expand Down Expand Up @@ -102,4 +102,4 @@ https://api.cloudflare.com/client/v4/graphql \
#=> }
```

[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ title: Querying Magic Firewall Samples with GraphQL

In this example, we are going to use the GraphQL Analytics API to query for Magic Firewall Samples over a specified time period.

The following API call will request Magic Firewall Samples over a one hour period, and output the requested fields. Be sure to replace `<CLOUDFLARE_ACCOUNT_TAG>` and `<API_TOKEN>`[^1] with your zone tag and API credentials, and adjust the `datetime_geg` and `datetime_leq` values to your liking.
The following API call will request Magic Firewall Samples over a one hour period, and output the requested fields. Be sure to replace `<CLOUDFLARE_ACCOUNT_TAG>` and `<API_TOKEN>`[^1] with your zone tag and API credentials, and adjust the `datetime_geq` and `datetime_leq` values to your liking.

## API Call

Expand Down Expand Up @@ -107,4 +107,4 @@ https://api.cloudflare.com/client/v4/graphql \
#=> }
```

[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
[^1]: Refer to [Configure an Analytics API token](/analytics/graphql-api/getting-started/authentication/api-token-auth/) for more information on configuration and permissions.
Loading