| Index: appengine/monorail/dos.yaml
|
| diff --git a/appengine/monorail/dos.yaml b/appengine/monorail/dos.yaml
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..97e4e4d1ace77574a6dfdb78d94c6e0c1bd3d984
|
| --- /dev/null
|
| +++ b/appengine/monorail/dos.yaml
|
| @@ -0,0 +1,27 @@
|
| +# Copyright 2016 The Chromium Authors. All rights reserved.
|
| +# Use of this source code is govered by a BSD-style
|
| +# license that can be found in the LICENSE file or at
|
| +# https://developers.google.com/open-source/licenses/bsd
|
| +
|
| +blacklist:
|
| +# Edit this file to enable GAE's built-in DoS protection.
|
| +# Run some aggregate queries in the Cloud Console BigQuery
|
| +# interface to see if you can block larger subnets rathe
|
| +# than individual IP addresses. Also, this list is limited
|
| +# to 100 entries, so if it's a DDoS you might run out
|
| +# subnets.
|
| +# On-Call Playbook:
|
| +# https://docs.google.com/document/d/1acGea37jlb5FEp1BGdqca6tY_hiH1QGXKxbt4iBfAug
|
| +#
|
| +# See the playbook for other measures you can take, such
|
| +# as setting ratelimiting_enabled = True in settings.py.
|
| +
|
| +# Example entries:
|
| +# - subnet: 192.0.2.1
|
| +# description: a single IP address
|
| +# - subnet: 192.0.2.0/24
|
| +# description: an IPv4 subnet
|
| +# - subnet: 2001:DB8::1
|
| +# description: an IPv6 address
|
| +# - subnet: 2001:DB8::/32
|
| +# description: an IPv6 subnet
|
|
|