技术控

    今日:88| 主题:49270
收藏本版 (1)
最新软件应用技术尽在掌握

[其他] Traffic Control: Live Demo

[复制链接]
南风知我意 发表于 2016-10-1 11:17:31
133 3

立即注册CoLaBug.com会员,免费获得投稿人的专业资料,享用更多功能,玩转个人品牌!

您需要 登录 才可以下载或查看,没有帐号?立即注册

x
Cloudflare helps customers control their own traffic at the edge. One of two products that we introduced to empower customers to do so is Cloudflare Traffic Control .
   
Traffic Control: Live Demo-1 (customers,products,controls,intended,request)
  CC BY 2.0 image by Brian Hefele  
  Traffic Control allows a customer to rate limit, shape or block traffic based on the rate of requests per client IP address, cookie, authentication token, or other attributes of the request. Traffic can be controlled on a per-URI (with wildcards for greater flexibility) basis giving pinpoint control over a website, application, or API.
  Cloudflare has been dogfooding Traffic Control to add more granular controls against Layer 7 DOS and brute-force attacks. For example, we've experienced attacks on cloudflare.com from more than 4,000 IP addresses sending 600,000+ requests in 5 minutes to the same URL but with random parameters. These types of attacks send large volumes of HTTP requests intended to bring down our site or to crack login passwords.
  Traffic Control protects websites and APIs from similar types of bad traffic. By leveraging our massive network, we are able to process and enforce rate limiting near the client, shielding the customer's application from unnecessary load.
  To make this more concrete, let's look at a live demonstration rule for cloudflare.com. Multiple rules may be used and combined to great effect -- this is just a limited example.
  Read on, and then test it yourself.
  Creating the rule

  Imagine an endpoint that is resource intensive. To maintain availability, we want to protect it from high-volume request rates - like those from an aggressive bot or attacker.
   URL *.cloudflare.com/rate-limit-test
   Traffic Control allows for * wildcards to give more flexibility. An API with multiple endpoints might use a pattern of api.example.com/v2/*
   With that pattern, all resources under /v2 would be protected by the same rule.
   ThresholdWe set this demonstration rule to 10 requests per minute, which is too sensitive for a real web application, but allows a curious user refreshing their browser ten times to see Traffic Control in action.
   ActionWe set this value to block which means that once an IP addresses triggers a rule, all traffic from that IP address will be blocked at the edge and served with a default 429 HTTP error code.
   Other possible choices include simulate which means no action taken, but analytics would indicate which requests would have been mitigated to help customers evaluate the potential impact of a given rule.
  Timeout

  This is the duration of the mitigation once the rule has been triggered. In this example, an offending IP address will be blocked for 1 minute.
  Response body type

   This type was set to HTML in the demo so that Traffic Control returns a web page to mitigated requests. For an API endpoint, the response body type could return JSON.
  Response body

  The response body can be anything you want. Refresh the link below 10 times very quickly to see our choice for this demonstration rule.
   https://www.cloudflare.com/rate-limit-test
  Other possible configurations

   We could have specified a Method . If we only cared to rate limit POST requests, we could adjust the rule to do so. This rule could be used for a login page where high frequency of POSTs by the same IP is potentially suspicious.
   We also could have specified a Response Code . If we only wanted to rate limit IPs which were consistently failing to authenticate, we could create the rule to trigger only after a certain threshold of 403’s have been served. Once an IP is flagged, perhaps because it was pounding a login endpoint with incorrect credentials, that client IP could be blocked from hitting either that endpoint or the whole site.
  We will expand the matching criteria, such as adding headers or cookies. We will also extend the mitigation options to include CAPTCHA or other challenges. This will give our users even more flexibility and power to protect their websites and API endpoints.
  Early Access

   We'd love to have you try Traffic Control. Read more and sign up for Early Access .
友荐云推荐




上一篇:Shaun M. Thomas: PG Phriday: Postgres 9.6 Pluses
下一篇:Microsoft Delivers Yet Another Broken Windows 10 Update
酷辣虫提示酷辣虫禁止发表任何与中华人民共和国法律有抵触的内容!所有内容由用户发布,并不代表酷辣虫的观点,酷辣虫无法对用户发布内容真实性提供任何的保证,请自行验证并承担风险与后果。如您有版权、违规等问题,请通过"联系我们"或"违规举报"告知我们处理。

╰等不到的愛 发表于 2016-10-1 17:40:24
做好事不留名,都写在帖子里!
回复 支持 反对

使用道具 举报

大受点委屈企鹅 发表于 2016-10-2 06:10:31
帮顶个帖,攒人品,说不定我就会升职加薪、当上总经理、出任CEO、迎娶白富美、走上人生巅峰,嘿嘿,想想还有点小激动。
回复 支持 反对

使用道具 举报

康时网络 发表于 2016-10-2 11:15:36
有钱的捧个钱场,没钱的回家拿钱捧个钱场。
回复 支持 反对

使用道具 举报

*滑动验证:
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

我要投稿

推荐阅读

扫码访问 @iTTTTT瑞翔 的微博
回页顶回复上一篇下一篇回列表手机版
手机版/CoLaBug.com ( 粤ICP备05003221号 | 文网文[2010]257号 )|网站地图 酷辣虫

© 2001-2016 Comsenz Inc. Design: Dean. DiscuzFans.

返回顶部 返回列表