Skip to content

Commit 8250774

Browse files
SomeBadCodingpatriciasantaana
authored andcommitted
Update ddos-managed-rulesets.mdx (#19733)
* Update ddos-managed-rulesets.mdx Fix Terraform Deployment Errors / Warnings, and replace referenced rules with actual rules. * Update src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx --------- Co-authored-by: Patricia Santa Ana <[email protected]>
1 parent 5f8ccdd commit 8250774

File tree

1 file changed

+23
-8
lines changed

1 file changed

+23
-8
lines changed

src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ For more information on deploying and configuring rulesets using the Rulesets AP
3535

3636
## Example: Configure HTTP DDoS Attack Protection
3737

38-
This example configures the [HTTP DDoS Attack Protection](/ddos-protection/managed-rulesets/http/) managed ruleset for a zone using Terraform, changing the sensitivity level of rule with ID <RuleID id="fdfdac75430c4c47a959592f0aa5e68a" /> to `low`.
38+
This example configures the [HTTP DDoS Attack Protection](/ddos-protection/managed-rulesets/http/) managed ruleset for a zone using Terraform.
3939

4040
<Render file="v4-code-snippets" />
4141

@@ -48,21 +48,36 @@ resource "cloudflare_ruleset" "zone_level_http_ddos_config" {
4848
phase = "ddos_l7"
4949
5050
rules {
51-
ref = "override_l7_ddos_ruleset_all"
52-
description = "Override the HTTP DDoS Attack Protection managed ruleset"
53-
expression = "true"
54-
action = "execute"
51+
action = "execute"
5552
action_parameters {
5653
# Cloudflare L7 DDoS Attack Protection Ruleset
5754
id = "4d21379b4f9f4bb088e0729962c8b3cf"
5855
overrides {
56+
action = "block"
57+
sensitivity_level = "default"
5958
rules {
60-
# Rule: HTTP requests with unusual HTTP headers or URI path (signature #11).
61-
id = "fdfdac75430c4c47a959592f0aa5e68a"
62-
sensitivity_level = "low"
59+
# Adaptive DDoS Protection based on Locations (Available only to Enterprise zones with Advanced DDoS service)
60+
id = "a8c6333711ff4b0a81371d1c444be2c3"
61+
sensitivity_level = "default"
62+
action = "managed_challenge"
63+
}
64+
rules {
65+
# Adaptive DDoS Protection based on User-Agents (Available only to Enterprise zones with Advanced DDoS service)
66+
id = "7709d496081e458899c1e3a6e4fe8e55"
67+
sensitivity_level = "default"
68+
action = "managed_challenge"
69+
}
70+
rules {
71+
# HTTP requests causing a high number of origin errors.
72+
id = "dd42da7baabe4e518eaf11c393596a9d"
73+
sensitivity_level = "default"
74+
action = "managed_challenge"
6375
}
6476
}
6577
}
78+
expression = "true"
79+
description = "Zone-wide HTTP DDoS Override"
80+
enabled = true
6681
}
6782
}
6883
```

0 commit comments

Comments
 (0)