Monitoring
The monitoring shows the following information:
- Volume: Total data transferred across edge nodes.
- Bandwidth: Real-time and historical bandwidth usage.
- QPS: Number of queries processed per second.
- Malicious Requests: Number of requests identified as malicious by security engines.
- Edge HTTP Status Codes: Distribution of HTTP status codes returned from edge nodes.
- Origin HTTP Status Codes: Distribution of HTTP status codes returned from the origin servers.
- Threat Types: Classification of detected threats (e.g., SQLi, XSS).
- Top 10 Threat Source IP: List of source IPs that generated the most threats.
- Top 10 Threat Source Regions: Geographic origin of the top threat-generating IPs.