
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 09 Apr 2026 20:20:25 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Introducing notifications for HTTP Traffic Anomalies]]></title>
            <link>https://blog.cloudflare.com/introducing-http-traffic-anomalies-notifications/</link>
            <pubDate>Tue, 31 Oct 2023 13:01:11 GMT</pubDate>
            <description><![CDATA[ Today we're excited to announce Traffic Anomalies notifications, which proactively alert you when your Internet property is seeing an unexpected change in traffic patterns ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vLGpnj5frsUOqDOTSbbmY/d1b29458a05d13a8b1d1727d08a25592/Traffic-anomalies-1.png" />
            
            </figure><p>When it comes to managing Internet properties, the difference between a small technical hiccup and major incident is often a matter of speed. Proactive alerting plays a crucial role, which is why we were excited when we released <a href="/smarter-origin-service-level-monitoring/">HTTP Error Rate notifications</a> — giving administrators visibility into when end users are experiencing errors.</p><p>But what if there are issues that don't show up as errors, like a sudden drop in traffic, or a spike?</p><p>Today, we're excited to announce Traffic Anomalies notifications, available to enterprise customers. These notifications trigger when Cloudflare detects unexpected changes in traffic, giving another valuable perspective into the health of your systems.</p><p>Unexpected changes in traffic could be indicative of many things. If you run an ecommerce site and see a spike in traffic that could be great news — maybe customers are flocking to your sale, or you just had an ad run on a popular TV show. However, it could also mean that something is going wrong: maybe someone accidentally turned off a firewall rule, and now you’re seeing more malicious traffic. Either way, you might want to know that something has changed.</p><p>Similarly, a sudden drop in traffic could mean many things. Perhaps it’s Friday afternoon and all of your employees are signing off and no longer accessing your company website. Or maybe a link to your site is broken, and now potential customers aren’t able to access it. You could be losing potential revenue every minute that traffic is low, so you’d want to know as soon as possible to investigate.</p>
    <div>
      <h3>How can we tell when to alert?</h3>
      <a href="#how-can-we-tell-when-to-alert">
        
      </a>
    </div>
    <p>Calculating anomalies in time series datasets is difficult to do well. The simplest way to do it is to use basic thresholds. However, as we’ve <a href="/smarter-origin-service-level-monitoring/">previously blogged about</a>, simple thresholds aren’t very accurate when trying to determine when things are actually going wrong. There are too many edge cases for them to work effectively.</p><p>Calculating anomalies in HTTP errors is relatively easy. We know that in general there should be a very low number of errors, so any spike is bad and therefore alertable. That’s why we use <a href="https://sre.google/workbook/alerting-on-slos/">Service Level Objectives (SLOs)</a> to calculate anomalies for our <a href="https://developers.cloudflare.com/notifications/notification-available/#traffic-monitoring">HTTP Error Rate notifications</a>.</p><p>However, analyzing overall HTTP traffic behaves more similarly to <a href="/introducing-thresholds-in-security-event-alerting-a-z-score-love-story/">Cloudflare Security Events</a>: there’s some general baseline of events that is computed from historical trends. Any deviation from that baseline is alertable. Because of those similarities, we decided to use the same calculations for Traffic Anomalies notifications as we have previously used for Security Event notifications: <a href="/get-notified-when-your-site-is-under-attack/">z-scores</a>. This involves comparing the current value to the average over a period of time. However, many standard deviations away from the average the current value is, is the z-score.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WyyibpRN80C7w0WSsG3OL/a7153af760800ba681676c21c3db9159/image4-6.png" />
            
            </figure><p><i>Plot of HTTP traffic against z-scores. The blue is the HTTP traffic, purple is the positive z-score bound of the traffic, and green is the negative z-score bound of the traffic</i></p><p>For Traffic Anomalies notifications, we’re comparing the traffic over the past 5 minutes (the short window) to the average of the traffic over the past 4 hours (the long window). Positive z-scores indicate a spike, and negative z-scores indicate a drop. If the current value is more than 3.5 standard deviations away from the average, we alert. We measure every 5 minutes, so we can alert on any traffic spike or drop in a timely fashion.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6A3BnkHW9bCc9JUuq2aOW7/40964ec23fd85153ae48dcdfa117f38a/image2-9.png" />
            
            </figure><p><i>Green bucket is the long window and the red bucket is the short window</i></p><p>While our Security Event notifications only trigger when there is a spike in security events (a drop is almost always a good thing), in the case of Traffic Anomalies we send notifications for both spikes <i>and</i> drops. This is because a drop of HTTP traffic is likely indicative of a problem, and a surge could be good or bad.</p><p>As with Security Events, Traffic Anomalies notifications support <a href="/introducing-thresholds-in-security-event-alerting-a-z-score-love-story/">minimum thresholds</a>. This means that, even if we determine that an event is outside 3.5 standard deviations, if the number of events is insignificant, we don’t alert. A spike must be at least 200 requests, and a drop must fall by at least 200 requests. This makes the notifications less noisy, since we aren’t alerting on small spikes and drops.</p>
    <div>
      <h3>Digging a little deeper</h3>
      <a href="#digging-a-little-deeper">
        
      </a>
    </div>
    <p>Cloudflare stores sampled statistics on requests that go through its network <a href="/http-analytics-for-6m-requests-per-second-using-clickhouse/">in Clickhouse</a>. Every minute, we take HTTP traffic from Clickhouse and store it in an instance of VictoriaMetrics, a time-series data storage solution. VictoriaMetrics gives us out-of-the-box algorithmic functions for free, and it has been a good fit for our use case. We chose VictoriaMetrics for a few reasons.</p><p>Firstly, it's easy to configure and operate. As a team, we want to optimize for low operational burden and VictoriaMetrics has been great thus far. Secondly, VictoriaMetrics has the ability to scale horizontally, meaning we can run it in a highly available mode. For a system such as this where we want something reliable to compute time sensitive information for our customers, the high availability requirement is essential. Finally, in our tests, we found that VictoriaMetrics used around ⅓ of the memory that Prometheus, a similar alternative product, did for the same use case.</p><p>Once we have data in VictoriaMetrics, we can run queries against it and determine whether we need to alert our customers or not, based on notification configurations they have created ahead of time. To do this we leverage our existing Alert Notification System, <a href="/new-tools-to-monitor-your-server-and-avoid-downtime/">which we blogged about initially in 2019</a>. We know we can count on our current notification system for the last mile to deliver these critical notifications to our customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Hu0yJDBmf67PqYc7JsAjw/3986029c7ad8e59f91f3f689a9c7a489/image1-9.png" />
            
            </figure><p><i>Data flow from HTTP request to notification</i></p><h6><i>Setting up the Notification</i></h6><p>To configure this notification, navigate to the “Notifications” tab of the dashboard. Select Traffic Anomalies as your notification type. As with all Cloudflare notifications, you’re able to name and describe your notification, and choose how you want to be notified.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ggeccGOgR8LCHrwXVIOxe/0bc0ec47154d63112398588b25040879/image5-3.png" />
            
            </figure><p><i>Traffic Anomalies notification in the Dashboard</i></p><p>You can choose which domains you want monitored for Traffic Anomalies, whether you want to include traffic that’s already been mitigated by Cloudflare DoS or WAF products, and whether there are specific status codes you want included or excluded. You can also choose whether you want to be alerted on traffic spikes, drops, or both.</p><p>We’re excited to use this system to help serve our Enterprise customers with invaluable notifications regarding the overall health of their systems. Head over to the Notifications tab in the dash to check this new notification out now!</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Notifications]]></category>
            <category><![CDATA[Network Services]]></category>
            <guid isPermaLink="false">3Vmb6kMuhHfnJ1EQgzYsRt</guid>
            <dc:creator>Cathy Chi</dc:creator>
            <dc:creator>Natasha Wissmann</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Observability]]></title>
            <link>https://blog.cloudflare.com/vision-for-observability/</link>
            <pubDate>Fri, 18 Mar 2022 21:03:00 GMT</pubDate>
            <description><![CDATA[ Being a single pane of glass for all network activity has always been one of Cloudflare’s goals. Today, we’re outlining the future vision for Cloudflare observability. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3bfLNf93KkwbzGrHAI7Eoo/c9afa97526fe27a4d3c1350bb97237aa/Observability---Bringing-Logs-in-Dash.png" />
            
            </figure><p>Whether you’re a software engineer deploying a new feature, network engineer updating routes, or a security engineer configuring a new firewall rule: You need visibility to know if your system is behaving as intended — and if it’s not, to know how to fix it.</p><p>Cloudflare is committed to helping our customers get visibility into the services they have protected behind Cloudflare. Being a single pane of glass for all network activity has always been one of Cloudflare’s goals. Today, we’re outlining the future vision for Cloudflare observability.</p>
    <div>
      <h3>What is observability?</h3>
      <a href="#what-is-observability">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/performance/what-is-observability/">Observability</a> means gaining visibility into the internal state of a system. It’s used to <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">give users the tools</a> to figure out what’s happening, where it’s happening, and why.</p><p>At Cloudflare, we believe that observability has three core components: monitoring, analytics, and forensics. Monitoring measures the health of a system - it tells you when something is going wrong. Analytics give you the tools to visualize data to identify patterns and insights. Forensics helps you answer very specific questions about an event.</p><p>Observability becomes particularly important in the context of security to validate that any mitigating actions performed by our security products, such as Firewall or Bot Management, are not false positives. Was that request correctly classified as malicious? And if it wasn’t, which detection system classified it as such?</p><p>Cloudflare, additionally, has products to improve performance of applications and corporate networks and allow developers to write lightning fast code that runs on our global network. We want to be able to provide our customers with insights into every request, packet, and fetch that goes through Cloudflare’s network.</p>
    <div>
      <h3>Monitoring and Notifying</h3>
      <a href="#monitoring-and-notifying">
        
      </a>
    </div>
    <p>Analytics are fantastic for summarizing data, but how do you know <i>when</i> to look at them? No one wants to sit on the dashboard clicking refresh over and over again just in case something looks off. That’s where notifications come in.</p><p>When we talk about something “looking off” on an analytics page, what we really mean is that there’s a significant change in your traffic or network which is reflected by spikes or drops in our analytics. Availability and performance directly affect end users, and our goal is to monitor and notify our customers as soon as we see things going wrong.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1l5DpBwxWnfWRiyAIpwMxo/b85ae5d80dc26967acc17190e3ad633f/Untitled--1-.png" />
            
            </figure><p>Today, we have many different types of notifications from <a href="/smarter-origin-service-level-monitoring/">Origin Error Rates</a>, <a href="/get-notified-when-your-site-is-under-attack/">Security Events, and Advanced Security Events</a> to Usage Based Billing and <a href="/health-check-analytics-and-how-you-can-use-it/">Health Checks</a>. We’re continuously adding more notification types to have them correspond with our awesome analytics. As our analytics get more customizable, our notifications will as well.</p><p>There’s tons of different algorithms that can be used to detect spikes, including using burn rates and z-scores. We’re continuing to iterate on the algorithms that we use for detections to offer more variations, make them smarter, and make sure that our notifications are both accurate and not too noisy.</p>
    <div>
      <h3>Analytics</h3>
      <a href="#analytics">
        
      </a>
    </div>
    <p>So, you’ve received an alert from Cloudflare. What comes next?</p><p>Analytics can be used to get a birds eye view of traffic or focus on specific types of events by adding filters and time ranges. After you receive an alert, we want to show you exactly what’s been triggered through graphs, high level metrics, and top Ns on the Cloudflare dashboard.</p><p>Whether you’re a developer, security analyst, or network engineer, the Cloudflare dashboard should be the spot for you to see everything you need. We want to make the dashboard more customizable to serve the diverse use cases of our customers. Analyze data by specifying a timeframe and filter through dropdowns on the dashboard, or build your own metrics and graphs that work alongside the raw logs to give you a clear picture of what's happening.</p><p>Focusing on security, we believe analytics are the best tool to build confidence before deploying security policies. Moving forward, we plan to layer all of our security related detection signals on top of HTTP analytics so you can use the dashboard to answer questions such as: if I were to block all requests that the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> identifies as an XSS attack, what would I block?</p><p>Customers using our enterprise Bot Management may already be familiar with this experience, and as we improve it and build upon it further, all of our other security products will follow.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bJEpCdWDMbU6pcepmsoXW/565e8bbd48406f35bc8faffc42d4de0f/Screenshot-2022-03-18-at-15.24.11.png" />
            
            </figure><p>Analytics are a powerful tool to see high level patterns and identify anomalies that indicate that something unusual is happening. We’re working on new dashboards, customizations, and features that widen the use cases for our customers. Stay tuned!</p>
    <div>
      <h3>Logs</h3>
      <a href="#logs">
        
      </a>
    </div>
    <p>Logs are used when you want to examine specific details about an event. They consist of a timestamp and fields that describe the event and are used to get visibility on a granular level when you need a play-by-play.</p><p>In each of our datasets, an event measures something different. For example, in HTTP request logs, an event is when an end user requests content from or sends content to a server. For Firewall logs, an event occurs when the Firewall takes an action on an HTTP request. There can be multiple Firewall events for each HTTP request.</p><p>Today, our customers access logs using Logpull, Logpush, or Instant Logs. Logpull and Logpush are great for customers that want to send their logs to third parties (like our <a href="https://www.cloudflare.com/partners/analytics/">Analytics Partners</a>) to store, analyze, and correlate with other data sources. With Instant Logs, our customers can monitor and troubleshoot their traffic in real-time straight from the dashboard or CLI. We’re planning on building out more capabilities to dig into logs on Cloudflare. We’re hard at work on building <a href="/store-your-cloudflare-logs-on-r2/">log storage on R2</a> - but what’s next?</p><p>We’ve heard from customers that the activity log on the Firewall analytics dashboard is incredibly useful. We want to continue to bring the power of logs to the dashboard by adding the same functionality across our products. For customers that will store their logs on Cloudflare R2, this means that we can minimize the use of sampled data.</p><p>If you’re looking for something very specific, querying logs is also important, which is where forensics comes in. The goal is to let you investigate from high level analytics all the way down to individual logs lines that make them up. Given a unique identifier, such as the ray ID, you should be able to look up a single request, and then correlate it with all other related activity. Find out the client IP of that ray ID and from there, use cases are plentiful: what other requests from this IP are malicious? What paths did the client follow?</p>
    <div>
      <h3>Tracing</h3>
      <a href="#tracing">
        
      </a>
    </div>
    <p>Logs are really useful, but they don’t capture the context around a request. Traces show the end-to-end life cycle of a request from when a user requests a resource to each of the systems that are involved in its delivery. They’re another way of applying forensics to help you find something very specific.</p><p>These are used to differentiate each part of the application to identify where errors or bottlenecks are occurring. Let's say that you have a Worker that performs a fetch event to your origin and a third party API. Analytics can show you average execution times and error rates for your Worker, but it doesn’t give you visibility into each of these operations.</p><p>Using wrangler dev and console.log statements are really helpful ways to test and debug your code. They bring some of the visibility that’s needed, but it can be tedious to instrument your code like this.</p><p>As a developer, you should have the tools to understand what’s going on in your applications so you can deliver the best experience to your end users. We can help you answer questions like: Where is my Worker execution failing? Which operation is causing a spike in latency in my application?</p>
    <div>
      <h3>Putting it all together</h3>
      <a href="#putting-it-all-together">
        
      </a>
    </div>
    <p>Notifications, analytics, logs, and tracing each have their distinct use cases, but together, these are powerful tools to provide analysts and developers visibility. Looking forward, we’re excited to bring more and more of these capabilities on the Cloudflare dashboard.</p><p>We would love to hear from you as we build these features out. If you’re interested in sharing use cases and helping shape our roadmap, contact your account team!</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Bots]]></category>
            <guid isPermaLink="false">23Q8iqhgSAOgTyAsHRfZ6s</guid>
            <dc:creator>Tanushree Sharma</dc:creator>
            <dc:creator>Natasha Wissmann</dc:creator>
            <dc:creator>Ashcon Partovi</dc:creator>
            <dc:creator>Michael Tremante</dc:creator>
        </item>
        <item>
            <title><![CDATA[What’s new with Notifications?]]></title>
            <link>https://blog.cloudflare.com/whats-new-with-notifications/</link>
            <pubDate>Sat, 11 Dec 2021 13:59:18 GMT</pubDate>
            <description><![CDATA[ We know that notifications are incredibly important to our customers. Cloudflare sits in between your Internet property and the rest of the world. When something goes wrong, you want to know right away because it could have a huge impact on your end users. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Sxg57IttTVk04ZLpBTGR4/d36e2d321405131fe7f151590b315117/image1-64.png" />
            
            </figure><p>Back in 2019, we <a href="/new-tools-to-monitor-your-server-and-avoid-downtime/">blogged about our brand new Notification center</a> as a centralized hub for configuring notifications on your account. Since then, we’ve talked a lot about new types of notifications you can set up, but not as much about updates to the notification platform itself. So what’s new with Notifications?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20CKBWq8cNuT7F039v4Rp9/fc002415a966f5051c94ed3cf72234f3/image3-31.png" />
            
            </figure>
    <div>
      <h3>Why we care about notifications</h3>
      <a href="#why-we-care-about-notifications">
        
      </a>
    </div>
    <p>We know that notifications are incredibly important to our customers. Cloudflare sits in between your Internet property and the rest of the world. When something goes wrong, you want to know right away because it could have a huge impact on your end users. However, you don’t want to have to sit on the Cloudflare Dashboard all day, pressing refresh on analytics pages over and over just to make sure that you don’t miss anything important. This is where Notifications come in. Instead of requiring you to actively monitor your Internet properties, you want Cloudflare to be able to directly inform you when something might be going wrong.</p><p>Cloudflare has many different notification types to ensure that you don’t miss anything important. We have notifications to inform you that <a href="/announcing-ddos-alerts/">you’ve been DDoS’d</a>, or that <a href="/get-notified-when-your-site-is-under-attack/">the Firewall is blocking more requests than normal</a>, or that <a href="/smarter-origin-service-level-monitoring/">your origin is seeing high levels of 5xx errors</a>, or even that <a href="/introducing-workers-usage-notifications/">your Workers script’s CPU usage is above average</a>. We’re constantly adding new notifications, so make sure to check our <a href="https://developers.cloudflare.com/fundamentals/notifications/notification-available">Cloudflare Development Docs</a> to see what’s new!</p>
    <div>
      <h3>Emails are out, webhooks are in</h3>
      <a href="#emails-are-out-webhooks-are-in">
        
      </a>
    </div>
    <p>So we have all of these super great notifications, but <i>how</i> do we actually inform you of an event? The classic answer is “we email you.” All of our customers have the ability to configure notifications to send to the email addresses of their choosing.</p><p>However, email isn’t always the optimal choice. What happens when an email gets sent to spam, or filtered out into another folder that you rarely check? What if you’re a person who never cleans out their inbox and has four thousand unread emails that can drown out new important emails that come in? You want a way for notifications to go directly to the messaging platform that you check the most, whether that’s Slack or Microsoft Teams or Discord or something else entirely. For customers on our Professional, Business, and Enterprise plans, this is where webhooks come in.</p><p>Webhooks are incredibly powerful! They’re a type of API with a simple, standardized behavior. They allow one service (Cloudflare) to send events directly to another service. This destination service can be nearly anything: messaging platforms, data management systems, workflow automation systems, or even your own internal APIs.</p><p>While Cloudflare has had first class support for webhooking into Slack, Microsoft Teams, Google Chat, and customer’s own APIs for a while, we’ve recently added support for DataDog, Discord, OpsGenie, and Splunk as well. You can read about how to set up each of those types of webhooks in our <a href="https://developers.cloudflare.com/fundamentals/notifications/configure-webhooks">Cloudflare Development Docs</a>.</p><p>Because webhooks are so versatile, more and more customers are using them! The number of webhooks configured within Cloudflare’s notification system doubles, on average, every three months. Customers can configure webhooks in the Notifications tab in the dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4IK1GmOJoBLbBekVr4q2N3/15a7598ca9cced6394158b4cf5e1d6ad/image2-47.png" />
            
            </figure>
    <div>
      <h3>Those who forget history are doomed to repeat it</h3>
      <a href="#those-who-forget-history-are-doomed-to-repeat-it">
        
      </a>
    </div>
    <p>Webhooks are cool, but they still leave room for error. What happens when you receive a notification but accidentally delete it? Or when someone new starts at your company, but you forget to update the notification settings to send to the new employee?</p><p>Before now, Cloudflare notifications were entirely point in time. We sent you a notification via your preferred method, and we no longer had any visibility into that notification. If that notification gets lost on your end, we don’t have any way to help recover the information it contained.</p><p>Notification history fixes that exact issue. Users are able to see a log of the notifications that were sent, when they were sent, and who they were sent to. Customers on Free, Professional, or Business plans are able to see notification history for the past 30 days. Customers on Enterprise plans are able to see notification history for the past 90 days.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LqewbFwuPn6q8uhizFiXU/a70a18b548a09ac6720cead1de36bb11/image4-27.png" />
            
            </figure><p>Right now, notification history is only <a href="https://api.cloudflare.com/#notification-history-properties">available via API</a>, but stay tuned for updates about viewing directly in the Cloudflare Dashboard!</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Notifications]]></category>
            <category><![CDATA[Email]]></category>
            <guid isPermaLink="false">1z30mcJRU8FhUxPza6TpLe</guid>
            <dc:creator>Natasha Wissmann</dc:creator>
        </item>
        <item>
            <title><![CDATA[Get notified when your site is under attack]]></title>
            <link>https://blog.cloudflare.com/get-notified-when-your-site-is-under-attack/</link>
            <pubDate>Fri, 03 Dec 2021 13:59:21 GMT</pubDate>
            <description><![CDATA[ Cloudflare can now send proactive notifications about any application security event spike, so you are warned whenever an attack might be targeting your application. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Our core application security features such as the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a>, firewall rules and rate limiting help keep millions of Internet properties safe. They all do so quietly without generating any notifications when attack traffic is blocked, as our focus has always been to stop malicious requests first and foremost.</p><p>Today, we are happy to announce a big step in that direction. Business and Enterprise customers can now set up proactive alerts whenever we observe a spike in firewall related events indicating a likely ongoing attack.</p><p>Alerts can be configured via email, PagerDuty or webhooks, allowing for flexible integrations across many systems.</p><p>You can find and set up the new alert types <a href="https://developers.cloudflare.com/fundamentals/notifications">under the notifications tab in your Cloudflare account</a>.</p>
    <div>
      <h2>What Notifications are available?</h2>
      <a href="#what-notifications-are-available">
        
      </a>
    </div>
    <p>Two new notification types have been added to the platform.</p>
    <div>
      <h3>Security Events Alert</h3>
      <a href="#security-events-alert">
        
      </a>
    </div>
    <p>This notification can be set up on Business and Enterprise zones, and will alert on any spike of firewall related events across all products and services. You will receive the alert within two hours of the attack being mitigated.</p>
    <div>
      <h3>Advanced Security Events Alert</h3>
      <a href="#advanced-security-events-alert">
        
      </a>
    </div>
    <p>This notification can be set up on Enterprise zones only. It allows you to filter on the exact security service you are interested in monitoring and different notifications can be set up for different services as necessary. The alert will fire within five minutes of the attack being mitigated.</p>
    <div>
      <h2>Alerting on Application Security Anomalies</h2>
      <a href="#alerting-on-application-security-anomalies">
        
      </a>
    </div>
    <p>We’ve <a href="/smarter-origin-service-level-monitoring/">previously blogged</a> about how accurately calculating anomalies in time series data sets is hard. Simple threshold alerting — “notify me if there are more than X events” — doesn’t work well. It takes a lot of work to tune the specific thresholds to be accurate, and even then you’re still likely to end up with false positives or missed events.</p><p>For Origin Error Rate notifications, we leaned on the methodology outlined in the <a href="https://sre.google/workbook/alerting-on-slos/">Google SRE Handbook</a> for alerting based on Service Level Objectives (SLOs). However, SLO alerting assumes that there is an established baseline. We know exactly what percentage of responses from your origin are “allowed” to be errors before something is definitely wrong. We don’t know what that percentage is for Firewall events. For example, Internet properties with many Firewall rules are more likely to have more Firewall events than Internet properties with few Firewall rules.</p><p>Instead of using SLO based alerting for Security Event notifications, we’re using <a href="https://en.wikipedia.org/wiki/Standard_score">Z-score calculations</a>. The z-score methodology calculates how many standard deviations away from the mean a certain data point is. For Security Event notifications we can take the mean number of Firewall events for each distinct Internet property as the effective “baseline”, and compare the current number of Firewall events to see if there is a significant spike.</p><p>In this first iteration, a z-score threshold of 3.5 has been configured in the system and will be adjusted based on customer feedback. You can read more about the system in our <a href="https://developers.cloudflare.com/waf/alerts">WAF developer docs</a>.</p>
    <div>
      <h2>Getting started with Application Security Event notifications</h2>
      <a href="#getting-started-with-application-security-event-notifications">
        
      </a>
    </div>
    <p>To configure these notifications, navigate to the Notifications tab of the dashboard and click “Add”. Select <b>Security Events Alert</b> or <b>Advanced Security Events Alert.</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RdUuk0JL1EebBfHRRwxBZ/3e8e40d3409c5040eb5d31c7e263aa3e/image4-1.png" />
            
            </figure><p>As with all Cloudflare notifications, you’re able to name and describe your notification, and choose how you want to be notified. From there, you can select which domains you want to monitor.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WJEHsoYxwlOQdxseJ1iFW/626f9432c5fa9d8b1a4207b11c992d07/image1-8.png" />
            
            </figure><p>For Advanced Security Event notifications, you can also select which services the notification should monitor. The log value in <a href="https://developers.cloudflare.com/logs/reference/log-fields/zone/firewall_events">Firewall Event logs</a> for each relevant service is also displayed in the event you are integrating directly with Cloudflare logs and wish to filter relevant events in your existing SIEMs.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3usixXOJnfPWbcm9nbkrIk/ddba546ccf5b64b9d0d67553d787038c/image3.png" />
            
            </figure><p>Once the notifications have been set up, you can rely on Cloudflare to warn you whenever an anomaly is detected. An example email notification is shown below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FxFDHYOH8MZS9jOxcZcBq/9993510099f8f67a2ed6ea9a83d2107c/image5.png" />
            
            </figure><p>The alert provides details on the service detecting the events (in this case the WAF), the timestamp and the affected zone. A link is provided that will direct you to the Firewall Events dashboard filtered on the correct service and time range.</p>
    <div>
      <h2>The first of many alerts!</h2>
      <a href="#the-first-of-many-alerts">
        
      </a>
    </div>
    <p>We are looking forward to customers setting up their notifications, so they can stay on top of any malicious activity affecting their applications.</p><p>This is just the first step of many towards building a much more comprehensive suite of notifications and incident management systems directly embedded in the Cloudflare dashboard. We look forward to posting feature improvements to our application security alert system in the near future.</p> ]]></content:encoded>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Notifications]]></category>
            <guid isPermaLink="false">7EWowD9MzHYrt8KvKzLEn7</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Natasha Wissmann</dc:creator>
        </item>
        <item>
            <title><![CDATA[Understand and reduce your carbon impact with Cloudflare]]></title>
            <link>https://blog.cloudflare.com/understand-and-reduce-your-carbon-impact-with-cloudflare/</link>
            <pubDate>Tue, 27 Jul 2021 12:59:10 GMT</pubDate>
            <description><![CDATA[ As part of Cloudflare’s Impact Week, we’re excited to announce a new tool: Your Carbon Impact Report, available today for all Cloudflare accounts, will outline the carbon savings of operating your Internet properties on Cloudflare’s network. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Yf8wRHvxpdKgHqN8aeCMy/0ba396952873ae9eb477d482cc40c588/Carbon-Dash-1.png" />
            
            </figure><p>Today, as part of Cloudflare’s Impact Week, we’re excited to announce a new tool to help you understand the environmental impact of operating your websites, applications, and networks. Your Carbon Impact Report, available today for all Cloudflare accounts, will outline the carbon savings of operating your Internet properties on Cloudflare’s network.</p><p>Everyone has a role to play in reducing carbon impact and reversing climate change. We <a href="/cloudflare-committed-to-building-a-greener-internet/">shared today</a> how we’re approaching this, by committing to power our network with 100% renewable energy. But we’ve also heard from customers that want more visibility into the impact of the tools they use (also referred to as <a href="https://www.epa.gov/climateleadership/scope-3-inventory-guidance">“Scope 3” emissions</a>) — and we want to help!</p>
    <div>
      <h3>The impact of running an Internet property</h3>
      <a href="#the-impact-of-running-an-internet-property">
        
      </a>
    </div>
    <p>We’ve <a href="/the-climate-and-cloudflare/">previously blogged</a> about how Internet infrastructure affects the environment. At a high level, powering hardware (like servers) uses energy. Depending on its source, producing this energy may involve emitting carbon into the atmosphere, which contributes to climate change.</p><p>When you use Cloudflare, we use energy to power hardware to deliver content for you. But how does that energy we use compare to the energy it would take to deliver content without Cloudflare? As of today, you can go to the Cloudflare dashboard to see the (approximate) carbon savings from your usage of Cloudflare services versus Internet averages for your usage volume.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12w0CAYZJN0fg08gJE6akN/0939b3482bfa6e2ebe3fbdb8636cbb6d/image1-25.png" />
            
            </figure>
    <div>
      <h3>Calculating the carbon savings of your Cloudflare use</h3>
      <a href="#calculating-the-carbon-savings-of-your-cloudflare-use">
        
      </a>
    </div>
    <p>Most of the energy that Cloudflare uses comes from powering the servers at our edge to serve your content. We’ve outlined how we quantify the carbon impact of this energy in our <a href="https://assets.ctfassets.net/slt3lc6tev37/2YzIeTtzSbyKkM4GsryP5S/62ce0dff98e92a142281a0b462ce4408/Cloudflare_Emissions_Inventory_-_2020.pdf">emissions report</a>. To determine the percentage of this impact derived from <i>your</i> Cloudflare usage specifically, we’ve used the following method:</p><blockquote><p>When you use Cloudflare, data from requests destined to your Internet property goes through our edge. Data transfer for your Internet properties roughly represents a fraction of the energy consumed at Cloudflare’s edge. If we sum up the data transfer for your Internet properties and multiply that number by the energy it takes to power each request (derived from our emissions report and overall usage data), we can approximate the total carbon impact of powering your Internet properties with Cloudflare.</p></blockquote><p>We already knew that delivering content takes some energy and therefore has some carbon impact. So how much energy does Cloudflare actually save you? To determine what your usage would look like without Cloudflare, we’ve used the following method:</p><blockquote><p>Using public information on <a href="https://www.mdpi.com/2078-1547/6/1/117">average data center energy usage</a> and the <a href="https://www.iea.org/">International Energy Agency’s</a> global average emissions for energy usage, we can calculate the carbon cost of data transfer through average (non-Cloudflare) networks. We can then compare these numbers to arrive at your carbon savings from using Cloudflare.</p></blockquote><p>With our new Carbon Impact Report, available for all plans/users, we’ve given you this value for your account. It represents the carbon dioxide equivalent (CO2e) that you’ve saved as a result of using Cloudflare to serve requests to your Internet properties in 2020.</p><p>This raw number is great, but it isn’t the easiest to understand. What does a gram of carbon dioxide equivalent actually mean in practice? It’s not a unit of measurement most of us are used to seeing in our day-to-day lives. To make this number a little easier to digest, we’ve also provided a comparison to light bulbs.</p><blockquote><p>Standard light bulbs are 60 watts, so we know that turning on a light bulb for an hour uses 0.06 kilowatt-hours of energy. <a href="https://www.epa.gov/energy/greenhouse-gas-equivalencies-calculator">According to the EPA</a>, that’s about 42 grams of carbon dioxide equivalent. That means that if your carbon dioxide equivalent saving is 126 grams, that’s approximately the same impact as turning off a light bulb for three hours.</p></blockquote>
    <div>
      <h3>How does using Cloudflare impact the environment?</h3>
      <a href="#how-does-using-cloudflare-impact-the-environment">
        
      </a>
    </div>
    <p>As explained in more detail <a href="/cloudflare-committed-to-building-a-greener-internet/">here</a>, Cloudflare purchases Renewable Energy Credits to account for the energy used by our network. This means that your use of Cloudflare’s services is powered by renewable energy.</p><p>Additionally, using Cloudflare helps you reduce your overall carbon footprint. Using Cloudflare’s cloud security and performance services such as <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a>, Network Firewall, and DDoS mitigation allow you to decommission specialized hardware and transfer those functions to software running efficiently at our edge. This reduces your carbon footprint by significantly decreasing the energy used to operate your network stack, and improves your security, performance, and reliability along the way.</p><p>Optimizing your website also reduces your carbon footprint by requiring less energy for your end users to load a page. Using Cloudflare’s Image Resizing for visual content on your site to properly resize images reduces the energy it takes each of your end users to load a page, thus reducing downstream carbon emissions.</p><p>Lastly, since Cloudflare is a <a href="/green-hosting-with-cloudflare-pages/">certified green host</a>, any content you host on Pages or Workers KV is hosted green and certified powered by renewable energy.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>This dashboard is just a first step in giving our customers transparent information on their carbon use, savings, and ideas for improvement with Cloudflare. Right now, you can view data on your carbon savings from 2020 (aligned with our 2020 <a href="https://assets.ctfassets.net/slt3lc6tev37/2YzIeTtzSbyKkM4GsryP5S/62ce0dff98e92a142281a0b462ce4408/Cloudflare_Emissions_Inventory_-_2020.pdf">emissions report</a>). As we continue to iterate on how we measure carbon impact, we’re working toward providing dynamic information on carbon savings at a quarterly or even monthly granularity.</p><p>Have other ideas on what we can provide to help you understand and reduce the carbon impact of your Internet properties? Please reach out to us in the comments on this post or on social media!</p><p>We hope that this data helps you with your sustainability goals, and we’re excited to keep providing you with transparent information for 2021 and beyond.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Green]]></category>
            <category><![CDATA[Sustainability]]></category>
            <guid isPermaLink="false">4gTpagaI7JzAqno2TJWadK</guid>
            <dc:creator>Natasha Wissmann</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Smart(er) Origin Service Level Monitoring]]></title>
            <link>https://blog.cloudflare.com/smarter-origin-service-level-monitoring/</link>
            <pubDate>Thu, 08 Jul 2021 12:59:19 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce Origin Error Rate notifications: a new, sophisticated way to detect and notify you when Cloudflare sees elevated levels of 5xx errors from your origin. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49NSNbVLKyTHBtfUjU40tK/5139746eb239c89a907604999fcc2081/image10.png" />
            
            </figure><p>Today we’re excited to announce Origin Error Rate notifications: a new, sophisticated way to detect and notify you when Cloudflare sees elevated levels of 5xx errors from your origin.</p><p>In 2019, we announced <a href="/new-tools-to-monitor-your-server-and-avoid-downtime/">Passive Origin Monitoring alerts</a> to notify you when your origin goes down. Passive Origin Monitoring is great — it tells you if every request to your origin is returning a 521 error (web server down) for a full five minutes. But sometimes that’s not enough. You don’t want to wait for <i>all</i> of your users to have issues; you want to be notified when <i>more users than normal</i> are having issues before it becomes a big problem.</p>
    <div>
      <h3>Calculating Anomalies</h3>
      <a href="#calculating-anomalies">
        
      </a>
    </div>
    <p>No service is perfect — we know that a very small percentage of your origin responses are likely to be 5xx errors. Most of the time, these issues are one-offs and nothing actually needs to be done. However, for Internet properties with very high traffic, even a very small percentage could potentially be a large number. If we alerted you for every one of these errors, you would never stop getting useless notifications. When it comes to notifying, the question isn’t whether there are <i>any</i> errors, but <i>how many</i> errors need to exist before it’s a problem.</p><p>So how do we actually tell if something is a problem? As humans, it’s relatively easy for us to look at a graph, identify a spike, and think “hmm, that’s not supposed to be there.” For a computer it gets a little more complicated. Unlike humans, who have intuition and can exercise judgement in grey areas, a computer needs an exact set of criteria to tell whether something is out of the ordinary.</p><p>The simplest way to detect abnormalities in a time series dataset is to set a single threshold — for example, “notify me whenever more than 5% of the requests to my Internet properties result in errors.” Unfortunately, it’s really hard to pick an effective threshold. Too high and you never actually get notified; too low, and you’re drowning in notifications:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ShPGzlgkyWnQQQFMJnpe2/a42a00a2e2d65c9d1dc72d104e0b8e4e/image5-2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/74X7tzqt2EUnsPmaoYrkC0/df02ebf6bec8266c2eb0616c2a94348b/image6-2.png" />
            
            </figure><p>Even when we find that happy medium, we can still miss issues that burn “low and slow”. This is where there’s no obvious, dramatic spike, but something has been going a little wrong for a long time:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ACE4r6XiZowbgWiHExatx/e4b86134dd8e82c78b0f9dd6c9ad2e97/image8.png" />
            
            </figure><p>We can try layering on multiple thresholds. For example: notify you if the error rate is ever over 10%, <b>or</b> if it’s over 5% for more than five minutes, <b>or</b> if it’s over 2% for more than 10 minutes. Not only does this quickly become complicated, but it also doesn’t account for periodic issues, such as kubernetes pods restarting or deployments going out at a regular interval. What if the error rate is over 5% for only four minutes, but it happens every five minutes? We know that a lot of your end users are being affected, but even the long set of rules listed above wouldn’t catch it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YCFFMiETN3Ed9Wg3Nnu7r/b94d79cbe4d3db665377d86bc1fd6c0b/image1-4.png" />
            
            </figure><p>So thresholds probably aren’t sophisticated enough to detect origin issues. Instead, we turn to the <a href="https://sre.google/workbook/alerting-on-slos/">Google SRE Handbook</a> for alerting based on Service Level Objectives (SLOs). An SLO is a part of an agreement between a customer and a service provider. It’s a defined metric and value that both parties agree on. One of the most common types of SLOs is availability, or “the service will be available for a certain percentage of the time”. In this case, the service is your origin and the agreement is between you and your end users. Your end users expect your origin to be available a certain percent of the time.</p><p>If we revisit our original concept, we know that you’re comfortable with your origin returning a certain number of errors. We define that number as your SLO. An SLO of 99.9 means that you’re OK with 0.01% of all of your requests over a month being errors. Therefore, 0.01% of all the requests that reach your origin is your total error budget — you can have this many errors in a month and never be notified, because you’ve defined that as acceptable.</p><p>What you really want to know is when you’re burning through that error budget too quickly — this probably means that something is actually going wrong (instead of a one-time occurrence). We can measure a burn rate to gauge how quickly you’re burning through your error budget, given the rate of errors that we’re currently seeing. A burn rate of one means that the entirety of the error budget will be used up exactly within the set time period — an ideal scenario. A burn rate of zero is even better since we’re not seeing any errors at all, but ultimately is pretty unrealistic. A burn rate of 10 is most likely a problem — if that rate keeps up for the full month, you’ll have had 10x the number of errors than you originally said was acceptable.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/X82KrLewyzlgRdirVRuiD/93fa48b97c57f33c482d69bae74bed4f/image2-1.png" />
            
            </figure><p>Even when using burn rates instead of thresholds, we still want to have multiple criteria. We want to measure a short time period with a high burn rate (a short indicator). This covers your need to “alert me quickly when something dramatic is happening.” But we also want to have a longer time period with a lower burn rate (a long indicator), in order to cover your need to “don’t alert me on issues that are over quickly.” This way we can ensure that we alert quickly without sending too many false positives.</p><p>Let’s take a look at the life of an incident using this methodology. In our first measurement, the short indicator tells us it looks like something is starting to go wrong. However, the long indicator is still within reasonable bounds. We’re not going to sound the alarm yet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZfXwFdIg3Xnxgwherit2g/cc307ebf528bca4574e5c50b5ee73f32/image4-1.png" />
            
            </figure><p>When we measure next, we see that the problem is worse. Now we’re at the point where there are enough errors that not only is the short indicator telling us there’s something wrong, but the long indicator has been impacted too. We feel confident that there’s a problem, and it’s time to notify you.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6F1J2XiFoLzHYAePUpyynH/89f61ce38fc3a50b5e433a8f8d6f66af/image7.png" />
            
            </figure><p>A couple cycles later, the incident is over. The long indicator is still telling us that something is wrong, because the incident is still within the long time period. However, the short indicator shows that nothing is currently concerning. Since we don’t have both indicators telling us that something is wrong, we won’t notify you. This keeps us from sending notifications for incidents that are already over.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5z5B3oZ46km4yzhMiZXqdp/158c00fbaaf5068d4e431d98e93b9adc/image3-1.png" />
            
            </figure><p>This methodology is cool because of how well it responds to different incidents. If the original spike had been more dramatic, it would have triggered both the long and short indicators immediately. The more errors we’re seeing, the more confident we are that there’s an issue and the sooner we can notify you.</p><p>Even with this methodology, we know that different services behave differently. So for this notification, you can choose the Service Level Objective (SLO) you want to use to monitor your Internet property: 99.9% (high sensitivity), 99.8% (medium sensitivity), or 99.7% (low sensitivity). You can also choose which Internet properties you want to monitor — no need to be notified for test properties or lower priority domains.</p>
    <div>
      <h3>Getting started today</h3>
      <a href="#getting-started-today">
        
      </a>
    </div>
    <p>HTTP Origin Error Rate notifications can be configured in the Notifications tab of the dashboard. Select <b>Origin Error Rate Alert</b> as your alert type. As with all Cloudflare notifications, you’re able to name and describe your notification, and choose how you want to be notified. From there, you can select which domains you want to monitor, and at what SLO.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XIuKjsl3jwbOkUF5CLfpq/eb632a2406a2cf2301a7ba95fc108a37/image9.gif" />
            
            </figure><p>This notification is available to all Enterprise customers. If you’re interested in monitoring your origin, we encourage you to give it a try.</p><p>Our team is hiring in <a href="https://boards.greenhouse.io/cloudflare/jobs/3129759?gh_jid=3129759">Austin</a>, <a href="https://boards.greenhouse.io/cloudflare/jobs/3231716?gh_jid=3231716">Lisbon</a> and <a href="https://boards.greenhouse.io/cloudflare/jobs/3231718?gh_jid=3231718">London</a>.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Notifications]]></category>
            <guid isPermaLink="false">3iBKhuAdX6wJvtSc4fiAPl</guid>
            <dc:creator>Natasha Wissmann</dc:creator>
        </item>
    </channel>
</rss>