So I’ve been DDoS’d 3 times today. I use a service to receive email alerts whenever the site is down (error 502 for example), recently I’ve been receiving a lot of fake requests which overwhelms the server’s CPU resources and results in a bad gateway error.
What can I do to resolve this? I’m already using Under attack mode, WAF, Rate limiting (with captchas) and the like. None of which is stopping over 2 million fake requests in an hour for exhausting server resources.
What tools does Cloudflare provide that let me see the actual requests after they happen? As far as I know I can only browser the details of these requests while they’re happening through the Firewall tab.
All the IPs are linked to Cloudflare in the nginx request logs. Why doesn’t Cloudflare have a reliable logging system? I’d have to workaround the default way Cloudflare works when it logs IPs.
You could captcha challenge all visitors with a firewall rule temporarily, then look for a pattern in the requests in the firewall events log and then narrow down the firewall rule to reduce the impact on genuine visitors.
Yes, the problem is it’s hard to analyze these requests without a dashboard of some kind. I could try this, but I’m not sure if the request even matters. Just the number of requests is the reason my site is going down with bad gateway. So maybe firewall on the web server would help since Cloudflare for some reason isn’t blocking these requests with rate limiting?