Skip to content

Commit 8127a2c

Browse files
pedrosousaOxyjun
andauthored
Apply suggestions from PCX review
Co-authored-by: Jun Lee <[email protected]>
1 parent 0f41fd1 commit 8127a2c

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

src/content/docs/terraform/additional-configurations/waf-custom-rules.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,5 +122,5 @@ For more information on configuring and deploying custom rulesets, refer to [Wor
122122

123123
## More resources
124124

125-
- [Malicious uploads detection: Add a custom rule blocking malicious uploads](/waf/detections/malicious-uploads/terraform-examples/#add-a-custom-rule-blocking-malicious-uploads)
126-
- [Leaked credentials detection: Add a custom rule challenging requests with leaked credentials](/waf/detections/leaked-credentials/terraform-examples/#add-a-custom-rule-challenging-requests-with-leaked-credentials)
125+
- [Malicious uploads detection: Add a custom rule to block malicious uploads](/waf/detections/malicious-uploads/terraform-examples/#add-a-custom-rule-to-block-malicious-uploads)
126+
- [Leaked credentials detection: Add a custom rule to challenge requests with leaked credentials](/waf/detections/leaked-credentials/terraform-examples/#add-a-custom-rule-to-challenge-requests-with-leaked-credentials)

src/content/docs/waf/detections/leaked-credentials/terraform-examples.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ If you are using the Cloudflare API, refer to [Common API calls](/waf/detections
2727

2828
You only need to provide an expression for the username in custom detection locations.
2929

30-
## Add a custom rule challenging requests with leaked credentials
30+
## Add a custom rule to challenge requests with leaked credentials
3131

3232
This example adds a [custom rule](/waf/custom-rules/) that challenges requests with leaked credentials by using one of the [leaked credentials fields](/waf/detections/leaked-credentials/#leaked-credentials-fields) in the rule expression.
3333

src/content/docs/waf/detections/malicious-uploads/terraform-examples.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ If you are using the Cloudflare API, refer to [Common API calls](/waf/detections
2727

2828
For more information, refer to [Custom scan expressions](/waf/detections/malicious-uploads/#custom-scan-expressions).
2929

30-
## Add a custom rule blocking malicious uploads
30+
## Add a custom rule to block malicious uploads
3131

3232
This example adds a [custom rule](/waf/custom-rules/) that blocks requests with one or more <GlossaryTooltip term="content object">content objects</GlossaryTooltip> considered malicious by using one of the [content scanning fields](/waf/detections/malicious-uploads/#content-scanning-fields) in the rule expression.
3333

src/content/docs/waf/managed-rules/check-for-exposed-credentials/configure-terraform.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure using Terraform
2+
title: Configure with Terraform
33
pcx_content_type: configuration
44
sidebar:
55
order: 5
@@ -18,7 +18,7 @@ If you are using the Cloudflare API, refer to [Configure via API](/waf/managed-r
1818

1919
<Render file="leaked-credentials-recommend-detection" />
2020

21-
## Add a custom rule checking for exposed credentials
21+
## Add a custom rule to check for exposed credentials
2222

2323
The following configuration creates a custom ruleset with a single rule that [checks for exposed credentials](/waf/managed-rules/check-for-exposed-credentials/configure-api/#create-a-custom-rule-checking-for-exposed-credentials).
2424

0 commit comments

Comments
 (0)