Loading source
Pulling the file list, source metadata, and syntax-aware rendering for this listing.
Source from repo
Comprehensive Cloudflare platform skill covering Workers, D1, R2, KV, AI, Durable Objects, and security.
Files
Skill
Size
Entrypoint
Format
Open file
Syntax-highlighted preview of this file as included in the skill package.
references/ddos/configuration.md
1# DDoS Configuration23## Dashboard Setup451. Navigate to Security > DDoS62. Select HTTP DDoS or Network-layer DDoS73. Configure sensitivity & action per ruleset/category/rule84. Apply overrides with optional expressions (Enterprise Advanced)95. Enable Adaptive DDoS toggle (Enterprise/Enterprise Advanced, requires 7 days traffic history)1011## Rule Structure1213```typescript14interface DDoSOverride {15description: string;16rules: Array<{17action: "execute";18expression: string; // Custom expression (Enterprise Advanced) or "true" for all19action_parameters: {20id: string; // Managed ruleset ID (discover via api.md)21overrides: {22sensitivity_level?: "default" | "medium" | "low" | "eoff";23action?: "block" | "managed_challenge" | "challenge" | "log"; // log = Enterprise Advanced only24categories?: Array<{25category: string; // e.g., "http-flood", "udp-flood"26sensitivity_level?: string;27}>;28rules?: Array<{29id: string;30action?: string;31sensitivity_level?: string;32}>;33};34};35}>;36}37```3839## Expression Availability4041| Plan | Custom Expressions | Example |42|------|-------------------|---------|43| Free/Pro/Business | ✗ | Use `"true"` only |44| Enterprise | ✗ | Use `"true"` only |45| Enterprise Advanced | ✓ | `ip.src in {...}`, `http.request.uri.path matches "..."` |4647## Sensitivity Mapping4849| UI | API | Threshold |50|----|-----|-----------|51| High | `default` | Most aggressive |52| Medium | `medium` | Balanced |53| Low | `low` | Less aggressive |54| Essentially Off | `eoff` | Minimal mitigation |5556## Common Categories5758- `http-flood`, `http-anomaly` (L7)59- `udp-flood`, `syn-flood`, `dns-flood` (L3/4)6061## Override Precedence6263Multiple override layers apply in this order (higher precedence wins):6465```66Zone-level > Account-level67Individual Rule > Category > Global sensitivity/action68```6970**Example**: Zone rule for `/api/*` overrides account-level global settings.7172## Adaptive DDoS Profiles7374**Availability**: Enterprise, Enterprise Advanced75**Learning period**: 7 days of traffic history required7677| Profile Type | Description | Detects |78|--------------|-------------|---------|79| **Origins** | Traffic patterns per origin server | Anomalous requests to specific origins |80| **User-Agents** | Traffic patterns per User-Agent | Malicious/anomalous user agent strings |81| **Locations** | Traffic patterns per geo-location | Attacks from specific countries/regions |82| **Protocols** | Traffic patterns per protocol (L3/4) | Protocol-specific flood attacks |8384Configure by targeting specific adaptive rule IDs via API (see api.md#typed-override-examples).8586## Alerting8788Configure via Notifications:89- Alert types: `http_ddos_attack_alert`, `layer_3_4_ddos_attack_alert`, `advanced_*` variants90- Filters: zones, hostnames, RPS/PPS/Mbps thresholds, IPs, protocols91- Mechanisms: email, webhooks, PagerDuty9293See [api.md](./api.md#alert-configuration) for API examples.94