Skip to content

GraphQL Analytics

Last reviewed: over 2 years ago

Use the GraphQL Analytics API to review data for Magic Firewall network traffic related to rules matching your traffic. This contains both rules you configured in the Magic Firewall dashboard, and the rules managed by Cloudflare as a part of Magic Firewall Managed rules and Magic Firewall IDS features.

Before you begin, you must have an API token. For additional help getting started with GraphQL Analytics, refer to GraphQL Analytics API.

Obtain Cloudflare Account ID

To construct a Magic Firewall GraphQL query for an object, you will need a Cloudflare Account ID

Obtain your Cloudflare Account ID

  1. Log in to the Cloudflare dashboard, and select your account.
  2. The URL in your browser's address bar should show https://dash.cloudflare.com/ followed by a hex string. The hex string is your Cloudflare Account ID.

Obtain the rule ID for a firewall rule

To construct queries to gather analytics for a particular rule, you need the rule ID for each firewall rule.

  1. Log in to your Cloudflare dashboard, and select you account.
  2. Select Magic Firewall.
  3. Locate the rule you need the rule ID for from the list, and select Edit.
  4. Locate the Rule ID, and select the copy button.
  5. Select Cancel to return to the Magic Firewall page.

Explore GraphQL schema with Magic Firewall query example

In this section, you will run a test query to retrieve a five minute count of all configured Magic Firewall rules within five minute intervals. You can copy and paste the code below into GraphiQL.

For additional information about the Analytics schema, refer to Explore the Analytics schema with GraphiQL.

query {
viewer {
accounts(filter: {accountTag: "<YOUR_ACCOUNT_ID>"}) {
magicFirewallSamplesAdaptiveGroups(
filter: {datetime_geq: "2022-01-05T11:00:00Z",
datetime_leq: "2022-01-05T12:00:00Z"},
limit: 2,
orderBy: [datetimeFiveMinute_DESC])
{
sum {
bits
packets
}
dimensions {
datetimeFiveMinute
ruleId
}
}
}
}
}

Example queries for Magic Firewall

Obtain analytics for a specific rule

Use the example below to display the total number of packets and bits for the top ten suspected malicious traffic streams within the last hour. After receiving the results, you can sort by packet rates with a five minute average.

For each stream, display the:

  • Source and destination IP addresses
  • Ingress Cloudflare data centers that received it
  • Total traffic volume in bits and packets received within the hour
  • Actions taken by the firewall rule
query{
viewer {
accounts(filter: {accountTag: "<ACCOUNT_ID>"}) {
magicFirewallNetworkAnalyticsAdaptiveGroups(
filter: {
ruleId: "<RULE_ID>",
datetime_geq: "2022-01-12T10:00:00Z",
datetime_leq: "2022-01-12T11:00:00Z"
}
limit: 10,
orderBy: [avg_packetRateFiveMinutes_DESC])
{
sum {
bits
packets
}
dimensions {
coloCity
ipDestinationAddress
ipSourceAddress
outcome
}
}
}
}
}

Obtain IDS analytics

Use the example below to display the total number of packets and bits for the top 10 traffic streams that Magic Firewall IDS has detected in the last hour.

By setting verdict to drop and outcome as pass, we are filtering for traffic that was marked as a detection (i.e. verdict was drop) but was not dropped (for example, outcome was pass). This is because currently, Magic Firewall IDS only detects malicious traffic but does not drop the traffic.

For each stream, display the:

  • Source and destination IP addresses.
  • Ingress Cloudflare data centers that received it.
  • Total traffic volume in bits and packets received within the hour.
query{
viewer {
accounts(filter: {accountTag: "<ACCOUNT_ID>"}) {
magicIDPSNetworkAnalyticsAdaptiveGroups(
filter: {
datetime_geq: "2022-01-12T10:00:00Z",
datetime_leq: "2022-01-12T11:00:00Z",
verdict: drop,
outcome: pass
}
limit: 10,
orderBy: [avg_packetRateFiveMinutes_DESC])
{
sum {
bits
packets
}
dimensions {
coloCity
ipDestinationAddress
ipSourceAddress
}
}
}
}
}

Alternatively, to inspect all traffic that was analyzed, but grouped into malicious traffic and other traffic, the example below can be used. The response will contain two entries for each five minute timestamp. verdict will be set to drop for malicious traffic, and verdict will be set to pass for traffic that did not match any of the IDS rules.

query{
viewer {
accounts(filter: {accountTag: "<ACCOUNT_ID>"}) {
magicIDPSNetworkAnalyticsAdaptiveGroups(
filter: {
datetime_geq: "2022-01-12T10:00:00Z",
datetime_leq: "2022-01-12T11:00:00Z"
}
limit: 10,
orderBy: [avg_packetRateFiveMinutes_DESC])
{
sum {
bits
packets
}
dimensions {
coloCity
ipDestinationAddress
ipSourceAddress
verdict
}
}
}
}
}