All Products
Search
Document Center

Web Application Firewall:View dashboards

Last Updated:Mar 31, 2026

The Log Service for WAF feature includes three built-in dashboards—Operation Center, Access Center, and Security Center—that display real-time log analysis results as charts. To view website traffic and security data, select a time range on a dashboard. No query statement is required.

Which dashboard to use

DashboardUse it to
Operation CenterCheck your website's overall health, including traffic protection data and attack summaries
Access CenterAnalyze access patterns, including traffic trends, request distribution, and client behavior
Security CenterInvestigate attacks, including attack targets, trends, and the geographic distribution of attack sources

You can also manually create dashboards for your own query and analysis scenarios, then add custom charts based on your commonly used query statements. For more information, see Overview of visualization.

Prerequisites

Before you begin, ensure that you have:

View a dashboard

  1. Log on to the WAF console. In the top navigation bar, select the resource group and the region where your WAF instance is deployed. The region can be Chinese Mainland or Outside Chinese Mainland.

  2. In the left-side navigation pane, choose Security Operations > Log Service.

  3. Select a domain name from the domain name drop-down list and turn on Status to enable log collection for the domain name. Enable log collection

  4. Click the Log Analysis tab.

  5. Click Operation Center, Access Center, or Security Center, then specify a time range to query data.

What's next

Specify a time range

Each dashboard and chart reads from raw log data within a time range. Two types of time selectors are available:

  • Dashboard time selector: Applies to all charts on the current dashboard. Click the dashboard tab, then click Time Range. In the Time panel, select a relative time, a time frame, or a custom range. The selected range applies only to the current dashboard—switch to another dashboard and you must specify a new time range.

  • Chart time selector: Applies to a single chart. Move the pointer over the 时间按钮 icon in the upper-right corner of a chart, then select Select Time Range. In the Time panel, select a time range for that chart.

By default, no time range is set when you open the Log Analysis tab. Specify a time range before reading dashboard data.

Subscribe to a dashboard

Subscribe to a dashboard to receive chart data automatically by email or DingTalk group message on a regular schedule. In the upper-right corner of a dashboard, click Subscribe and complete the Create Subscription wizard. For details, see Subscribe to a dashboard.

Drill down into chart data

Drill-down is pre-configured on specific charts, indicated by underlined numbers. Click an underlined number to see the underlying data. For example, clicking the underlined number in the Attacked Hosts chart of the Security Center dashboard shows which domain names were attacked and how many times.

To check whether drill-down is available for a chart, move the pointer over the 时间按钮 icon in the upper-right corner. If the 按钮 icon appears, drill-down is configured.

Switch to the Raw Logs tab to view unprocessed log entries. For details, see Configure an interaction occurrence for a dashboard to perform drill-down analysis.

Download chart data

Move the pointer over the 时间按钮 icon in the upper-right corner of a chart, then select Download Chart or Download Chart Data to save the data as a CSV file.

Preview a chart's query statement

Move the pointer over the 时间按钮 icon in the upper-right corner of a chart, then select the 预览 icon to see the query statement behind the chart.

Charts supported by the built-in dashboards

For an overview of chart types, see Chart overview.

Operation Center

Displays the overall status of a website, including traffic protection data and an attack overview.

Chart nameChart typeDefault time rangeDescriptionExample value
User RequestSingle value chartCompared with last dayNumber of page views (PVs) and unique visitors (UVs)48,300
Peak TrafficSingle value chartCompared with last dayPeak inbound and outbound Internet traffic and peak attack traffic. Unit: Kbit/s4.6
Valid Request RatioSingle value chartCompared with last hourPercentage of valid requests routed over the Internet and forwarded by WAF98.41%
Valid TrafficSingle value chartCompared with last hourVolume of traffic forwarded by WAF to the origin server. Unit: MB10.7
Request TrendLine chart1 week (relative)Trends in request count, valid request ratio, and inbound/outbound bandwidth. Unit: Kbit/sNone
Attack StatisticsSingle-value chart, world map, and China mapCompared with last hourNumber of attacks, traffic volume in KB, and geographic attack distributionNone
Attacker ListTable1 hour (relative)IP addresses from which attacks originateNone
Top 100 Attacked WebsitesTable1 hour (relative)Top 100 domain names that received the most attacksNone

Access Center

Displays access information for a website, including access metrics, traffic trends, and request distribution.

Chart nameChart typeDefault time rangeDescriptionExample value
PVSingle value chart1 hour (relative)Total number of PVs100,000
UVSingle value chart1 hour (relative)Total number of UVs100
Traffic InSingle value chart1 hour (relative)Total inbound traffic. Unit: MB300 MB
Peak Network In TrafficSingle value chartToday (time frame)Peak inbound traffic. Unit: Kbit/s0.5 KB/s
Peak Network Out TrafficSingle value chartToday (time frame)Peak outbound traffic. Unit: Kbit/s1.3 KB/s
Traffic Network TrendArea chartToday (time frame)Inbound and outbound traffic trends. Unit: Kbit/sNone
PV/UV TrendsLine chartToday (time frame)PV and UV trends over timeNone
Access Status DistributionFlow chartToday (time frame)Request trends by HTTP status code (such as 400, 304, and 200). Unit: count/hNone
Access SourceWorld map1 hour (relative)Distribution of requests by countryNone
Traffic In Source (World)World map1 hour (relative)Distribution of inbound traffic by countryNone
Traffic In Source (China)China map1 hour (relative)Distribution of inbound traffic by province in ChinaNone
Access HeatmapAMAP1 hour (relative)Geographic heat map of request sourcesNone
Network Provider SourcePie chart1 hour (relative)Distribution of requests by Internet service provider (ISP), including China Telecom, China Unicom, China Mobile, and China Education and Research NetworkNone
RefererTable1 hour (relative)Top 100 most frequently detected Referers, including Referer URLs, Referer hosts, and detection countNone
Mobile Client DistributionPie chart1 hour (relative)Distribution of mobile client requests by client typeNone
PC Client DistributionPie chart1 hour (relative)Distribution of PC client requests by client typeNone
Request Content Type DistributionPie chart1 hour (relative)Distribution of requested resources by content type, including HTML, form, JSON, and streaming dataNone
Accessed SitesTreemap chart1 hour (relative)Top 30 most frequently accessed domain namesNone
Top ClientsTable1 hour (relative)Top 100 clients by visit frequency, including IP address, region and city, network information, request method, inbound traffic, access errors, and attack countNone
URL With Slowest ResponseTable1 hour (relative)Top 100 URLs with the longest response times, including domain name, URL, average response time, and request countNone

Security Center

Displays attack information for a website, including attack targets, trends, and the geographic distribution of attack sources.

Chart nameChart typeDefault time rangeDescriptionExample value
Peak Attack SizeSingle value chart1 hour (relative)Peak attack traffic. Unit: bit/s100 Bps
Attacked HostsSingle value chartToday (time frame)Number of attacked websites3
Source Country Of AttackSingle value chartToday (time frame)Number of countries from which attacks originate2
Attack TrafficSingle value chart1 hour (relative)Total traffic generated by attacks. Unit: bytes1 B
Attacker UVSingle value chart1 hour (relative)Number of unique attacking visitors (UVs)40
Attack type distributionFlow chartToday (time frame)Distribution of attacks by attack typeNone
Intercepted AttackSingle value chart1 hour (relative)Total number of attacks blocked by WAF100
CC Attack InterceptionSingle value chart1 hour (relative)Number of HTTP flood attacks blocked by WAF10 times
Web Attack InterceptionSingle value chart1 hour (relative)Number of web application attacks blocked by WAF80
Access Control EventSingle value chart1 hour (relative)Number of requests blocked by custom protection policies (ACL policies)10 times
CC Attack (World)World map1 hour (relative)Distribution of HTTP flood attacks by countryNone
CC Attack (China)China map1 hour (relative)Distribution of HTTP flood attacks by province in ChinaNone
Web Attack (World)World map1 hour (relative)Distribution of web application attacks by countryNone
Web Attack (China)China map1 hour (relative)Distribution of web application attacks by province in ChinaNone
Access Control Attack (World)World map1 hour (relative)Distribution of requests blocked by ACL policies by countryNone
Access Control Attack (China)China map1 hour (relative)Distribution of requests blocked by ACL policies by province in ChinaNone
Attacked HostsTreemap chart1 hour (relative)Most frequently attacked websitesNone
CC Attack Strategy DistributionPie chart1 hour (relative)Distribution of attacks that triggered HTTP flood protection policiesNone
Web Attack Type DistributionPie chart1 hour (relative)Distribution of web attacks by attack typeNone
Top AttackersTable1 hour (relative)Top 100 attacking clients, including IP addresses, province, carrier, attacks per type, and traffic volumeNone
Attacker RefererTable1 hour (relative)Referer information for attacks, including Referer URLs, Referer hosts, and detection countNone