You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/notifications/index.yaml
+1-16Lines changed: 1 addition & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ entries:
78
78
otherFilters: None.
79
79
80
80
- name: Secondary DNS Primaries Failing
81
-
audience: Enterprise customers who have at least one secondary zone and want to receive a notification if at least one of their primary nameservers is failing.
81
+
audience: Enterprise customers who have at least one secondary zone and want to receive a notification if at least one of their primary nameservers is failing while transfers from at least one other primary are still successful.
82
82
availability: Purchase of Secondary DNS.
83
83
associatedProducts: DNS
84
84
nextSteps: |-
@@ -104,21 +104,6 @@ entries:
104
104
105
105
otherFilters: None.
106
106
107
-
- name: Secondary DNSSEC Validation Warning
108
-
audience: Customers who are using Cloudflare for Secondary DNS and want to receive notifications about the failure or success of zone transfers from their primary nameservers.
109
-
availability: Enterprise plans.
110
-
associatedProducts: DNS
111
-
nextSteps: |-
112
-
Success alerts require no further action. Actions for failure notifications will depend on the type of failure.
113
-
114
-
Possible actions include:
115
-
116
-
* Checking the Access Control List (ACL) on your primary nameserver.
117
-
* Checking if Cloudflare IPs have been [configured correctly on your primary nameserver](/dns/zone-setups/zone-transfers/access-control-lists/cloudflare-ip-addresses/).
118
-
* Checking logs on primary nameservers for other errors.
119
-
120
-
otherFilters: None.
121
-
122
107
- name: HTTP DDoS Attack Alert
123
108
audience: "[WAF](/waf/) or [CDN](/cache/) customers who want to receive a notification when Cloudflare has mitigated HTTP attacks that generate more than 100 requests per second."
0 commit comments