Skip to content

Commit 1590316

Browse files
maxvpnevikashah
authored andcommitted
[ZT] Dash deep links (#24913)
1 parent c2b36ac commit 1590316

File tree

2 files changed

+37
-37
lines changed

2 files changed

+37
-37
lines changed

src/content/docs/cloudflare-one/tutorials/ai-wrapper-tenant-control.mdx

Lines changed: 29 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ tags:
77
- AI
88
---
99

10-
import { TabItem, Tabs, Details, Render } from "~/components";
10+
import { TabItem, Tabs, Details, Render, DashButton } from "~/components";
1111

1212
This tutorial explains how to use [Cloudflare AI Gateway](/ai-gateway/) and Zero Trust to create a functional and secure website wrapper for an AI agent. Cloudflare Zero Trust administrators can protect access to the wrapper with [Cloudflare Access](/cloudflare-one/policies/access/). Additionally, you can enforce [Gateway policies](/cloudflare-one/policies/gateway/) to control how your users interact with AI agents, including executing AI agents in an isolated browser with [Browser Isolation](/cloudflare-one/policies/browser-isolation/), enforcing [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) profiles to prevent your users from sharing sensitive data, and scanning content to avoid answers from AI agents that violate internal corporate guidelines. Creating an AI agent wrapper is also an effective way to enforce tenant control if you have an enterprise plan for a specific AI provider, such as ChatGPT Enterprise.
1313

@@ -24,14 +24,16 @@ Make sure you have:
2424

2525
First, create an AI gateway to control your AI app.
2626

27-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
28-
2. Go to **AI** > **AI Gateway**.
29-
3. Select **Create Gateway**.
30-
4. Name your gateway.
31-
5. Select **Create**.
32-
6. Configure your desired options for the gateway.
33-
7. [Connect your AI provider](/ai-gateway/get-started/#connect-application) to proxy queries to your AI agent of choice using your AI gateway.
34-
8. (Optional) Turn on [Authenticated Gateway](/ai-gateway/configuration/authentication/). The Authenticated Gateway feature ensures your AI gateway can only be called securely by enforcing a token in the form of a request header `cf-aig-authorization`.
27+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com/), go to the **AI Gateway** page.
28+
29+
<DashButton url="/?to=/:account/ai/ai-gateway" />
30+
31+
2. Select **Create Gateway**.
32+
3. Name your gateway.
33+
4. Select **Create**.
34+
5. Configure your desired options for the gateway.
35+
6. [Connect your AI provider](/ai-gateway/get-started/#connect-application) to proxy queries to your AI agent of choice using your AI gateway.
36+
7. (Optional) Turn on [Authenticated Gateway](/ai-gateway/configuration/authentication/). The Authenticated Gateway feature ensures your AI gateway can only be called securely by enforcing a token in the form of a request header `cf-aig-authorization`.
3537
1. Go to **AI** > **AI Gateway**.
3638
2. Select your AI gateway, then go to **Settings**.
3739
3. Turn on **Authenticated Gateway**, then choose **Confirm**.
@@ -44,7 +46,10 @@ For more information, refer to [Getting started with AI Gateway](/ai-gateway/get
4446

4547
[Guardrails](/ai-gateway/features/guardrails/) is an built-in AI Gateway security feature that allows Cloudflare to identify unsafe or inappropriate content in prompts and responses based on selected categories.
4648

47-
1. Go to **AI** > **AI Gateway**.
49+
1. In the Cloudflare dashboard, go to the **AI Gateway** page.
50+
51+
<DashButton url="/?to=/:account/ai/ai-gateway" />
52+
4853
2. Select your AI gateway.
4954
3. Go to **Guardrails**.
5055
4. Turn on Guardrails.
@@ -93,14 +98,16 @@ You can now build the Worker using the `index.js` file created by Wrangler.
9398

9499
</TabItem> <TabItem label="Dashboard">
95100

96-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
97-
2. Go to **Workers & Pages** > **Workers & Pages**.
98-
3. Select **Create**.
99-
4. In **Workers**, choose the **Hello world** template.
100-
5. Name your worker, then select **Deploy**.
101-
6. Select your Worker, then go to the **Settings** tab.
102-
7. Go to **Variables and Secrets**, then select **Add**.
103-
8. Choose _Secret_ as the type, name your secret (for example, `OPENAI_API_KEY`), and enter the value of your AI provider's API key in **Value**.
101+
1. In the Cloudflare dashboard, go to the **Workers & Pages** page.
102+
103+
<DashButton url="/?to=/:account/workers-and-pages" />
104+
105+
2. Select **Create**.
106+
3. In **Workers**, choose the **Hello world** template.
107+
4. Name your worker, then select **Deploy**.
108+
5. Select your Worker, then go to the **Settings** tab.
109+
6. Go to **Variables and Secrets**, then select **Add**.
110+
7. Choose _Secret_ as the type, name your secret (for example, `OPENAI_API_KEY`), and enter the value of your AI provider's API key in **Value**.
104111

105112
You can now build the Worker using the online code editor by selecting **Edit code** on your Worker page.
106113

@@ -377,7 +384,10 @@ If you built your Worker remotely using the [code editor](/workers/get-started/d
377384

378385
To ensure that the Worker is only accessible from the custom hostname:
379386

380-
1. Go to **Workers & Pages** > **Workers & Pages**.
387+
1. In the Cloudflare dashboard, go to the **Workers & Pages** page.
388+
389+
<DashButton url="/?to=/:account/workers-and-pages" />
390+
381391
2. Select your Worker.
382392
3. Go to **Settings**.
383393
4. Within **Domains & Routes**, select **Add**.

src/content/docs/cloudflare-one/tutorials/r2-logs.mdx

Lines changed: 8 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,49 +6,42 @@ pcx_content_type: tutorial
66
title: Use Cloudflare R2 as a Zero Trust log destination
77
products:
88
- R2
9-
109
---
1110

12-
:::note
13-
11+
import { DashButton } from "~/components";
1412

13+
:::note
1514
Only available on Zero Trust Enterprise plans.
16-
17-
1815
:::
1916

2017
This tutorial covers how to build a [Cloudflare R2 bucket](/r2/buckets/) to store logs, and how to connect the bucket to the Zero Trust [Logpush service](/cloudflare-one/insights/logs/logpush/) to store logs persistently and export them into other tools.
2118

22-
2319
## Before you begin
2420

25-
26-
* Ensure Cloudflare R2 and the Zero Trust Logpush integration are included in your plan. For more information, contact your account team.
27-
21+
- Ensure Cloudflare R2 and the Zero Trust Logpush integration are included in your plan. For more information, contact your account team.
2822

2923
## Create a Cloudflare R2 bucket
3024

25+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com/), go to the **R2 Overview** page.
3126

32-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
33-
2. Go to **R2** > **Overview**. Select **Create bucket**.
34-
3. Enter an identifiable name for the bucket, then select **Create bucket**.
27+
<DashButton url="/?to=/:account/r2/overview" />
3528

29+
2. Select **Create bucket**.
30+
3. Enter an identifiable name for the bucket, then select **Create bucket**.
3631

3732
## Create an R2 API token
3833

3934
1. Return to **R2**, then select **Manage R2 API tokens**.
4035
2. Select **Create API token**.
4136
3. In **Permissions**, select **Object Read & Write**.
42-
4. In **Specify bucket(s)**, choose *Apply to specific buckets only*. Select the bucket you created.
37+
4. In **Specify bucket(s)**, choose _Apply to specific buckets only_. Select the bucket you created.
4338
5. Configure other token settings to your preferences.
4439
6. Select **Create API Token**.
4540
7. Copy the **Access Key ID**, **Secret Access Key**, and endpoint URL values. You will not be able to access these values again.
4641
8. Select **Finish**.
4742

48-
4943
## Connect a Zero Trust Logpush job
5044

51-
5245
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Logs** > **Logpush**.
5346
2. Select **Connect a service**.
5447
3. Choose which data sets and fields you want to send to your bucket. Select **Next**.
@@ -59,6 +52,3 @@ This tutorial covers how to build a [Cloudflare R2 bucket](/r2/buckets/) to stor
5952
8. Select **Push**. If prompted, you do not need to prove ownership with a token challenge.
6053

6154
The Logpush job will send the selected Zero Trust logs to your R2 bucket.
62-
63-
64-

0 commit comments

Comments
 (0)