Skip to content

Commit 0abd491

Browse files
authored
[DDoS Protection] Improve linking (#21876)
1 parent 4d02f7c commit 0abd491

File tree

3 files changed

+15
-6
lines changed

3 files changed

+15
-6
lines changed

src/content/docs/ddos-protection/managed-rulesets/http/configure-api.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ Configure the HTTP DDoS Attack Protection managed ruleset by defining overrides
1414

1515
Each zone has the HTTP DDoS Attack Protection managed ruleset enabled by default. This means that you do not need to deploy the managed ruleset to the `ddos_l7` phase ruleset explicitly. You only have to create a rule in the phase ruleset to deploy the managed ruleset if you need to configure overrides.
1616

17+
If you are using Terraform, refer to [DDoS managed rulesets configuration using Terraform](/terraform/additional-configurations/ddos-managed-rulesets/#example-configure-http-ddos-attack-protection).
18+
1719
## Configure an override for the HTTP DDoS Attack Protection managed ruleset
1820

1921
Use overrides to configure the HTTP DDoS Attack Protection managed ruleset. Overrides allow you to define a different action or sensitivity level from the default values. For more information on the available action and sensitivity level values, refer to [Ruleset parameters](/ddos-protection/managed-rulesets/http/override-parameters/).

src/content/docs/ddos-protection/managed-rulesets/network/configure-api.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,16 @@ sidebar:
66
head:
77
- tag: title
88
content: Configure Network-layer DDoS Attack Protection via API
9-
109
---
1110

12-
import { Details, Render } from "~/components"
11+
import { Details, Render } from "~/components";
1312

1413
Configure the Cloudflare Network-layer DDoS Attack Protection managed ruleset by defining overrides at the account level using the [Rulesets API](/ruleset-engine/rulesets-api/).
1514

1615
Each account has the Network-layer DDoS Attack Protection managed ruleset enabled by default. This means that you do not need to deploy the managed ruleset to the `ddos_l4` phase entry point ruleset explicitly. You only have to create a rule in the phase entry point to deploy the managed ruleset if you need to configure overrides.
1716

17+
If you are using Terraform, refer to [DDoS managed rulesets configuration using Terraform](/terraform/additional-configurations/ddos-managed-rulesets/#example-configure-network-layer-ddos-attack-protection).
18+
1819
## Configure an override for the Network-layer DDoS Attack Protection managed ruleset
1920

2021
You can define overrides at the ruleset, tag, and rule level for all managed rulesets.
@@ -26,6 +27,7 @@ When configuring the Network-layer DDoS Attack Protection managed ruleset, use o
2627
- The Network-layer DDoS Attack Protection managed ruleset is always enabled. You cannot disable its rules using an override with `"enabled": false`.
2728
- <Render file="managed-rulesets/read-only-rules-note" />
2829
- You can only define overrides for the Network-layer DDoS Attack Protection managed ruleset at the account level.
30+
2931
:::
3032

3133
## Example

src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@ This page provides examples of configuring [DDoS managed rulesets](/ddos-protect
1919

2020
DDoS managed rulesets are always enabled. Depending on your Cloudflare services, you may be able to adjust their behavior.
2121

22+
If you are using the Cloudflare API, refer to the following resources:
23+
24+
- [Configure HTTP DDoS Attack Protection via API](/ddos-protection/managed-rulesets/http/configure-api/)
25+
- [Configure Network-layer DDoS Attack Protection via API](/ddos-protection/managed-rulesets/network/configure-api/)
26+
2227
For more information on deploying and configuring rulesets using the Rulesets API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
2328

2429
## Before you start
@@ -58,14 +63,14 @@ resource "cloudflare_ruleset" "zone_level_http_ddos_config" {
5863
rules {
5964
# Adaptive DDoS Protection based on Locations (Available only to Enterprise zones with Advanced DDoS service)
6065
id = "a8c6333711ff4b0a81371d1c444be2c3"
61-
sensitivity_level = "default"
62-
action = "managed_challenge"
66+
sensitivity_level = "default"
67+
action = "managed_challenge"
6368
}
6469
rules {
6570
# Adaptive DDoS Protection based on User-Agents (Available only to Enterprise zones with Advanced DDoS service)
6671
id = "7709d496081e458899c1e3a6e4fe8e55"
67-
sensitivity_level = "default"
68-
action = "managed_challenge"
72+
sensitivity_level = "default"
73+
action = "managed_challenge"
6974
}
7075
rules {
7176
# HTTP requests causing a high number of origin errors.

0 commit comments

Comments
 (0)