Skip to content
Ruleset Engine
Visit Ruleset Engine on GitHub
Set theme to dark (⇧+D)

Adjust the sensitivity of a specific HTTP DDoS rule to Low

Follow the steps below to override the sensitivity of a specific rule of the Cloudflare HTTP DDoS Managed Ruleset.

  1. Add a rule to a phase to deploy the Cloudflare HTTP DDoS Managed Ruleset. You only need to deploy this specific ruleset when you wish to define one or more overrides, since it is enabled by default.
  2. Configure a rule override that sets the sensitivity_level of a specific rule.

The example below uses the Update ruleset operation to execute the steps in a single PUT request.

  • Add a rule to the ruleset of the ddos_l7 phase that applies the Cloudflare HTTP DDoS Managed Ruleset (with ID {http-ddos-ruleset-id}).
  • Create an override for the rule with ID {rule-id} and set the rule sensitivity to low. All other rules use the default sensitivity defined by Cloudflare.
Example: Use an override to set the sensitivity of an HTTP DDoS rule at the zone level
curl -X PUT \
-H "X-Auth-Email: user@cloudflare.com" \
-H "X-Auth-Key: REDACTED" \
"https://api.cloudflare.com/client/v4/zones/{zone-id}/rulesets/phases/ddos_l7/entrypoint" \
-d '{
"rules": [
{
"action": "execute",
"expression": "true",
"action_parameters": {
"id": "{http-ddos-ruleset-id}",
"overrides": {
"rules": [
{
"id": "{rule-id}",
"sensitivity_level": "low"
}
]
}
}
}
]
}'