Skip to main content

Monitoring

The monitoring shows the following information:

  • Volume: Total data transferred across edge nodes.
  • Bandwidth: Real-time and historical bandwidth usage.
  • QPS: Number of queries processed per second.
  • Malicious Requests: Number of requests identified as malicious by security engines.
  • Edge HTTP Status Codes: Distribution of HTTP status codes returned from edge nodes.
  • Origin HTTP Status Codes: Distribution of HTTP status codes returned from the origin servers.
  • Threat Types: Classification of detected threats (e.g., SQLi, XSS).
  • Top 10 Threat Source IP: List of source IPs that generated the most threats.
  • Top 10 Threat Source Regions: Geographic origin of the top threat-generating IPs.