Skip to content

Commit 887d3a7

Browse files
[Maintenance] Update docs to reflect new global nav (#25020)
* [Maintenance] Update docs to reflect new global nav * grammar fix
1 parent afdd781 commit 887d3a7

File tree

5 files changed

+85
-50
lines changed

5 files changed

+85
-50
lines changed

src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar:
55
order: 9
66
---
77

8+
import { DashButton} from "~/components"
9+
810
Email Security allows you to configure Logpush to send detection data to an endpoint of your choice.
911

1012
## Enable detection logs
@@ -23,12 +25,14 @@ Before you can enable audit logs for Email Security, you will have to enable log
2325

2426
Once you have configured your destination, you can set up audit logs for user action:
2527

26-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/).
27-
2. Select **Analytics & Logs** > **Logpush**.
28-
3. Select **Audit logs**.
28+
1. In the Cloudflare dashboard, go to the **Logpush** page.
29+
30+
<DashButton url="/?to=/:account/logs" />
31+
2. Select your storage destination.
32+
3. Select the three dots > **Edit**.
2933
4. Under **Configure logpush job**:
30-
- **Job name**: Enter the job name.
31-
- **If logs match**: Select **Filtered logs**:
34+
- **Job name**: Enter the job name, if it is not already prepopulated.
35+
- **If logs match** > Select **Filtered logs**:
3236
- **Field**: Choose `ResourceType`.
3337
- **Operator**: Choose `starts with`.
3438
- **Value**: Enter `email_security`.

src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ sidebar:
77
text: Beta
88
---
99

10+
import { DashButton } from "~/components";
11+
1012
Rate limiting rules (beta) allow you to manage incoming traffic to your network for specific locations.
1113

1214
This guide will teach you how to create a rule for when incoming packets match, and in cases where your rate exceeds a certain value (in packets or bits).
@@ -19,8 +21,10 @@ For Advanced Magic Firewall customers, rate limiting (beta) is available by requ
1921

2022
To add a rule:
2123

22-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
23-
2. On the sidebar, select **Magic Firewall** > **Rate limiting**.
24+
1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
25+
26+
<DashButton url="/?to=/:account/network-security/magic_firewall" />
27+
2. On the sidebar, select **Rate limiting**.
2428
3. Fill out the information for your new rule:
2529
- Select the **Field**: At the moment, you can only choose a [colo name](https://developers.cloudflare.com/ruleset-engine/rules-language/fields/magic-firewall/).
2630
- Select the **Operator**: Choose among **equals** or **is in**.
@@ -31,17 +35,21 @@ To add a rule:
3135

3236
To edit a rule:
3337

34-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
35-
2. On the sidebar, select **Magic Firewall** > **Rate limiting**.
38+
1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
39+
40+
<DashButton url="/?to=/:account/network-security/magic_firewall" />
41+
2. On the sidebar, select **Rate limiting**.
3642
3. Locate the rule you want to edit in the list and select **View**.
3743
4. Edit the rule with your changes and select **Add new rule**.
3844

3945
## Delete an existing rule
4046

4147
To delete an existing rule:
4248

43-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
44-
2. On the sidebar, select **Magic Firewall** > **Rate limiting**.
49+
1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
50+
51+
<DashButton url="/?to=/:account/network-security/magic_firewall" />
52+
2. On the sidebar, select **Rate limiting**.
4553
3. Locate the rule you want to delete from the list.
4654
4. From the end of the row, select **Delete**.
4755
5. Select **Delete** again to confirm deletion.

src/content/docs/magic-firewall/how-to/enable-ids.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Enable Intrusion Detection System (IDS)
99
---
1010

11-
import { TabItem, Tabs } from "~/components";
11+
import { TabItem, Tabs, DashButton } from "~/components";
1212

1313
Cloudflare's IDS takes advantage of the threat intelligence powered by our global network and extends the capabilities of the Cloudflare Firewall to monitor and protect your network from malicious actors.
1414

@@ -20,9 +20,10 @@ This feature is available for Advanced Magic Firewall users. For access, contact
2020

2121
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
2222

23-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account.
24-
2. Select **Magic Firewall** > **IDS**.
25-
3. Enable IDS.
23+
1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
24+
25+
<DashButton url="/?to=/:account/network-security/magic_firewall" />
26+
2. Select **IDS** and turn on **IDS**.
2627

2728
</TabItem> <TabItem label="API">
2829

src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx

Lines changed: 33 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
---
77

8-
import { Details, GlossaryTooltip, TabItem, Tabs } from "~/components";
8+
import { Details, GlossaryTooltip, TabItem, Tabs, DashButton } from "~/components";
99

1010
After a <GlossaryTooltip term="data packet">packet</GlossaryTooltip> capture is requested and the capture is collected, the output is contained within one or more files in PCAP file format. Before starting a `full` type packet capture, you must first follow instructions for [configuring a bucket](/magic-firewall/packet-captures/pcaps-bucket-setup/).
1111

@@ -38,12 +38,16 @@ For help determining which data center to select for a packet capture, visit [ht
3838

3939
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
4040

41-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
42-
2. Select **Magic Transit** or **Magic WAN**.
43-
3. In **Captures**, select **Start a capture**.
44-
4. Select the **Captures** tab > **Start a capture**.
45-
5. Choose the type of capture you want to perform, and select **Next**.
46-
6. Fill out the required fields to begin the capture and then select **Start**.
41+
1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
42+
43+
To set up a packet capture in Magic Transit: <DashButton url="/?to=/:account/magic-transit/packet-captures/captures" />
44+
45+
To set up a packet capture in Magic WAN: <DashButton url="/?to=/:account/magic-wan/packet-captures/captures" />
46+
47+
2. In **Captures**, select **Start a capture**.
48+
3. Select the **Captures** tab > **Start a capture**.
49+
4. Choose the type of capture you want to perform, and select **Next**.
50+
5. Fill out the required fields to begin the capture and then select **Start**.
4751

4852
The main **Packet captures** page displays a list of captures.
4953

@@ -163,10 +167,13 @@ The response is a JSON body that contains the details of the job running to buil
163167

164168
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
165169

166-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
167-
2. Select **Magic Transit** or **Magic WAN**.
168-
3. In **Packet captures**, select **Start a capture**.
169-
4. Select the **Captures** tab.
170+
1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
171+
172+
To set up a packet capture in Magic Transit: <DashButton url="/?to=/:account/magic-transit/packet-captures/captures" />
173+
174+
To set up a packet capture in Magic WAN: <DashButton url="/?to=/:account/magic-wan/packet-captures/captures" />
175+
2. In **Packet captures**, select **Start a capture**.
176+
3. Select the **Captures** tab.
170177

171178
</TabItem> <TabItem label="API">
172179

@@ -218,11 +225,14 @@ After your request finishes processing, you can download your packet captures.
218225

219226
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
220227

221-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
222-
2. Select **Magic Transit** or **Magic WAN**.
223-
3. In **Packet captures**, select **Start a capture**.
224-
4. Select the **Captures** tab.
225-
5. Locate your packet capture you want to download, and select **Download**.
228+
1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
229+
230+
To set up a packet capture in Magic Transit: <DashButton url="/?to=/:account/magic-transit/packet-captures/captures" />
231+
232+
To set up a packet capture in Magic WAN: <DashButton url="/?to=/:account/magic-wan/packet-captures/captures" />
233+
2. In **Packet captures**, select **Start a capture**.
234+
3. Select the **Captures** tab.
235+
4. Locate your packet capture you want to download, and select **Download**.
226236

227237
Packet captures are available to download when the **Status** displays **Success**.
228238

@@ -251,10 +261,13 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/pcaps/{pcap_id}/
251261

252262
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
253263

254-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
255-
2. Select **Magic Transit** or **Magic WAN**.
256-
3. In **Packet captures**, select **Start a capture**.
257-
4. Select the **Captures** tab.
264+
1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
265+
266+
To set up a packet capture in Magic Transit: <DashButton url="/?to=/:account/magic-transit/packet-captures/captures" />
267+
268+
To set up a packet capture in Magic WAN: <DashButton url="/?to=/:account/magic-wan/packet-captures/captures" />
269+
2. In **Packet captures**, select **Start a capture**.
270+
3. Select the **Captures** tab.
258271

259272
The list of packet captures associated with your account displays.
260273

src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx

Lines changed: 24 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 2
66
---
77

8-
import { GlossaryTooltip, TabItem, Tabs } from "~/components";
8+
import { GlossaryTooltip, TabItem, Tabs, DashButton } from "~/components";
99

1010
Before you can begin a full <GlossaryTooltip term="data packet">packet</GlossaryTooltip> capture, you must first configure a bucket that Cloudflare can use to upload your files. Setting up a bucket is not required for sample packet captures.
1111

@@ -17,13 +17,16 @@ Learn how to set up a bucket for use with full packet captures.
1717

1818
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
1919

20-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
21-
2. Select **Magic Transit** or **Magic WAN**.
22-
3. From the **Packet captures** page, select the **Buckets** tab.
23-
4. Select **Add a bucket**.
24-
5. Under **Bucket configuration**, select a bucket service and select **Next**.
25-
6. Enter the information related to your bucket for your service provider.
26-
7. When you are done, select **Next**.
20+
1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
21+
22+
To set up a bucket in Magic Transit: <DashButton url="/?to=/:account/magic-transit/packet-captures/captures" />
23+
24+
To set up a bucket in Magic WAN: <DashButton url="/?to=/:account/magic-wan/packet-captures/captures" />
25+
2. Select the **Buckets** tab.
26+
3. Select **Add a bucket**.
27+
4. Under **Bucket configuration**, select a bucket service and select **Next**.
28+
5. Enter the information related to your bucket for your service provider.
29+
6. When you are done, select **Next**.
2730

2831
The **Prove ownership** step of the **Bucket configuration** displays.
2932

@@ -126,10 +129,13 @@ View a list of all buckets configured on your account.
126129

127130
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
128131

129-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
130-
2. Select **Magic Transit** or **Magic WAN**.
131-
3. In **Packet captures**, select **Start a capture**.
132-
4. Select the **Buckets** tab.
132+
1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
133+
134+
To set up a packet capture in Magic Transit: <DashButton url="/?to=/:account/magic-transit/packet-captures/captures" />
135+
136+
To set up a packet capture in Magic WAN: <DashButton url="/?to=/:account/magic-wan/packet-captures/captures" />
137+
2. In **Packet captures**, select **Start a capture**.
138+
3. Select the **Buckets** tab.
133139

134140
The list of buckets associated with your account displays.
135141

@@ -169,8 +175,11 @@ To start collecting packet captures with R2, you first need to configure it prop
169175

170176
### Create bucket and API token
171177

172-
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
173-
2. Select **R2** > **Create bucket**.
178+
1. In the Cloudflare dashboard, go to the **R2** page.
179+
180+
<DashButton url="/?to=/:account/r2/overview" />
181+
182+
2. Select **Create bucket**.
174183
3. Give your bucket a name > **Create bucket**.
175184
4. Go to the R2 Overview page, and select **Manage R2 API Tokens**.
176185
5. Select **Create API Token**.
@@ -212,4 +221,4 @@ The [response](/api/resources/magic_transit/subresources/pcaps/subresources/owne
212221

213222
### Validate bucket ownership
214223

215-
Refer to the [Validate a bucket](#validate-a-bucket) API instructions for more details on the entire process to [validate your R2 bucket](/api/resources/magic_transit/subresources/pcaps/subresources/ownership/methods/validate/). When specifying the R2 destination for this validation, exclude the secret and access keys from the URL.
224+
Refer to the [Validate a bucket](#validate-a-bucket) API instructions for more details on the entire process to [validate your R2 bucket](/api/resources/magic_transit/subresources/pcaps/subresources/ownership/methods/validate/). When specifying the R2 destination for this validation, exclude the secret and access keys from the URL.

0 commit comments

Comments
 (0)