Skip to content

Commit bc99eb1

Browse files
committed
[Docs] Fix some anchor links
1 parent 9f87a59 commit bc99eb1

File tree

3 files changed

+68
-52
lines changed

3 files changed

+68
-52
lines changed

src/content/docs/byoip/service-bindings/magic-transit-with-cdn.mdx

Lines changed: 37 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ pcx_content_type: tutorial
44
sidebar:
55
order: 3
66
label: Magic Transit with CDN
7-
87
---
98

109
import { Details, Example, TabItem, Tabs, GlossaryTooltip } from "~/components";
@@ -21,24 +20,24 @@ It is important to note that traffic routed to the CDN pipeline is protected at
2120

2221
Although it is possible to add discrete bindings for non-contiguous CIDR blocks, implementing service bindings through an **aggregated** CIDR block is **strongly** recommended as it is more efficient.
2322

24-
<Details header="Example" >
23+
<Details header="Example">
2524

26-
**Magic Transit protected prefix:** `203.0.113.100/24`
25+
**Magic Transit protected prefix:** `203.0.113.100/24`
2726

28-
**IPs to upgrade to the CDN:**
27+
**IPs to upgrade to the CDN:**
2928

30-
`203.0.113.16`<br />
31-
`203.0.113.17`<br />
32-
`203.0.113.18`<br />
33-
`203.0.113.19`<br />
34-
`203.0.113.20`<br />
35-
`203.0.113.21`<br />
36-
`203.0.113.22`<br />
37-
`203.0.113.23`
29+
`203.0.113.16`<br />
30+
`203.0.113.17`<br />
31+
`203.0.113.18`<br />
32+
`203.0.113.19`<br />
33+
`203.0.113.20`<br />
34+
`203.0.113.21`<br />
35+
`203.0.113.22`<br />
36+
`203.0.113.23`
3837

39-
Add one discrete CDN service binding for `203.0.113.16` with a `/29` netmask.
38+
Add one discrete CDN service binding for `203.0.113.16` with a `/29` netmask.
4039

41-
</Details>
40+
</Details>
4241

4342
Once a service binding is created (or deleted), it will take **four** to **six** hours to propagate across Cloudflare's global network. Services for the IP addresses in scope will likely be disrupted during this window.
4443

@@ -56,14 +55,14 @@ This guide assumes that the prefix is tied to a single Cloudflare account that h
5655

5756
At this point, continuing the [example](#before-you-begin), you should have a mapping similar to the following:
5857

59-
| Variables | Description |
60-
|-------------------------------|----------------------------------------------------|
61-
| `{service_id}` | The ID of the CDN service within Cloudflare. <br /><br /> Example: `969xxxxxxxx000xxx0000000x00001bf` |
62-
| `{prefix_id}` | The ID of the Magic Transit protected prefix (`203.0.113.100/24`) you want to configure. <br /><br /> Example: `6b25xxxxxxx000xxx0000000x0000cfc` |
58+
| Variables | Description |
59+
| -------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- |
60+
| `{service_id}` | The ID of the CDN service within Cloudflare. <br /><br /> Example: `969xxxxxxxx000xxx0000000x00001bf` |
61+
| `{prefix_id}` | The ID of the Magic Transit protected prefix (`203.0.113.100/24`) you want to configure. <br /><br /> Example: `6b25xxxxxxx000xxx0000000x0000cfc` |
6362

6463
</Example>
6564

66-
4. To confirm you currently only have a Magic Transit service binding and that it spans across your entire prefix, make a `GET` request to the [List Service Bindings](/api/operations/ip-address-management-service-bindings-list-service-bindings) endpoint. Replace the `{prefix_id}` in the URI path by the actual prefix ID you got from the previous step.
65+
4. To confirm you currently only have a Magic Transit service binding and that it spans across your entire prefix, make a `GET` request to the [List Service Bindings](/api/operations/ip-address-management-service-bindings-list-service-bindings) endpoint. Replace the `{prefix_id}` in the URI path by the actual prefix ID you got from the previous step.
6766

6867
<Example>
6968

@@ -117,6 +116,7 @@ In the response body, the initial provisioning state should be `provisioning`.
117116
}
118117
}
119118
```
119+
120120
</Example>
121121

122122
You can periodically check the service binding status using the [List Service Bindings](/api/operations/ip-address-management-service-bindings-list-service-bindings) endpoint.
@@ -127,9 +127,8 @@ Once you have configured your IPs to have CDN service, you can use <GlossaryTool
127127

128128
You can choose between two different scopes:
129129

130-
* Account-level: uses the address map for all proxied DNS records across all of the zones within an account.
131-
132-
* Zone-level: uses the address map for all proxied DNS records within a zone.
130+
- Account-level: uses the address map for all proxied DNS records across all of the zones within an account.
131+
- Zone-level: uses the address map for all proxied DNS records within a zone.
133132

134133
:::note
135134
If you need to map only specific subdomains (and not all proxied DNS records) to specific IP addresses, you can use a [Subdomain setup](/dns/zone-setups/subdomain-setup/).
@@ -185,33 +184,36 @@ As you create the necessary DNS records, [Total TLS](/ssl/edge-certificates/addi
185184

186185
While the DNS record proxy status and address map will determine how Cloudflare's authoritative DNS responds to requests for your hostnames, the IP addresses specified in `A`/`AAAA` records will determine [how Cloudflare reaches the configured origin](/fundamentals/concepts/how-cloudflare-works/#how-cloudflare-works-as-a-reverse-proxy).
187186

188-
<Details header="Example" >
187+
<Details header="Example">
189188

190-
| Type | Name | IP address | Proxy status | TTL |
191-
| --- | --- | --- | --- | --- |
192-
| `A` | `www` | `203.0.113.150` | `Proxied` | `Auto` |
189+
| Type | Name | IP address | Proxy status | TTL |
190+
| ---- | ----- | --------------- | ------------ | ------ |
191+
| `A` | `www` | `203.0.113.150` | `Proxied` | `Auto` |
193192

194193
At this point, if an address map for a zone `example.com` specifies that Cloudflare should use `203.0.113.100` for proxied records and the above record exists in the same zone, you can expect the following:
195194

196195
1. Cloudflare responds to DNS requests with `203.0.113.100`.
197-
2. Cloudflare proxies requests through the CDN and then routes the requests via [GRE](/magic-transit/reference/tunnels/#gre-and-ipsec-tunnels) or [CNI](/magic-transit/network-interconnect/) to the origin server `203.0.113.150` (Magic Transit protected prefix).
196+
2. Cloudflare proxies requests through the CDN and then routes the requests via [GRE](/magic-transit/reference/tunnels/) or [CNI](/magic-transit/network-interconnect/) to the origin server `203.0.113.150` (Magic Transit protected prefix).
198197
3. Depending on whether Magic Transit is implemented with [direct server return model or with Magic Transit egress](/magic-transit/how-to/configure-tunnels/#bidirectional-vs-unidirectional-health-checks), the origin server responds back to Cloudflare either:
199198

200-
* Directly over the Internet in a Magic Transit direct server return model
201-
* Back through the Magic GRE tunnel(s) in a Magic Transit egress model
199+
- Directly over the Internet in a Magic Transit direct server return model
200+
- Back through the Magic GRE tunnel(s) in a Magic Transit egress model
201+
202202
4. As the HTTP response egresses the Cloudflare network back to the client side, the source IP address of the response becomes `203.0.113.100` (the IP address that the HTTP request originally landed on).
203203

204204
</Details>
205+
205206
:::note
206207
Having the same IP address as ingress IP (defined in the address map) and origin IP (listed in the DNS record) will not cause any loops.
207208
:::
208-
<Details header="Example" >
209+
210+
<Details header="Example">
209211

210212
Assuming `203.0.113.100` was also the origin IP, the DNS record would look like the following:
211213

212-
| Type | Name | IP address | Proxy status | TTL |
213-
| --- | --- | --- | --- | --- |
214-
| `A` | `www` | `203.0.113.100` | `Proxied` | `Auto` |
214+
| Type | Name | IP address | Proxy status | TTL |
215+
| ---- | ----- | --------------- | ------------ | ------ |
216+
| `A` | `www` | `203.0.113.100` | `Proxied` | `Auto` |
215217

216218
</Details>
217219

@@ -220,5 +222,5 @@ Assuming `203.0.113.100` was also the origin IP, the DNS record would look like
220222
Leverage other features according to your needs:
221223

222224
- [Cache](/cache/)
223-
- [WAF custom rules](/waf/custom-rules/#custom-rules)
224-
- [Security analytics](/waf/analytics/security-analytics/#security-analytics)
225+
- [WAF custom rules](/waf/custom-rules/)
226+
- [Security analytics](/waf/analytics/security-analytics/)

src/content/docs/queues/get-started.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ To create a binding, open your newly generated `wrangler.toml` configuration fil
7676
binding = "MY_QUEUE"
7777
```
7878

79-
Replace `MY-QUEUE-NAME` with the name of the queue you created in [step 3](/queues/get-started/#3-create-a-queue). Next, replace `MY_QUEUE` with the name you want for your `binding`. The binding must be a valid JavaScript variable name. This is the variable you will use to reference this queue in your Worker.
79+
Replace `MY-QUEUE-NAME` with the name of the queue you created in [step 2](/queues/get-started/#2-create-a-queue). Next, replace `MY_QUEUE` with the name you want for your `binding`. The binding must be a valid JavaScript variable name. This is the variable you will use to reference this queue in your Worker.
8080

8181
### Write your producer Worker
8282

@@ -193,7 +193,7 @@ To connect your queue to your consumer Worker, open your `wrangler.toml` file an
193193
max_batch_timeout = 5 # optional: defaults to 5 seconds
194194
```
195195

196-
Replace `MY-QUEUE-NAME` with the queue you created in [step 3](/queues/get-started/#3-create-a-queue).
196+
Replace `MY-QUEUE-NAME` with the queue you created in [step 2](/queues/get-started/#2-create-a-queue).
197197

198198
In your consumer Worker, you are using queues to auto batch messages using the `max_batch_size` option and the `max_batch_timeout` option. The consumer Worker will receive messages in batches of `10` or every `5` seconds, whichever happens first.
199199

@@ -219,7 +219,7 @@ Run `wrangler tail` to start waiting for our consumer to log the messages it rec
219219
npx wrangler tail
220220
```
221221

222-
With `wrangler tail` running, open the Worker URL you opened in [step 4](/queues/get-started/#4-set-up-your-producer-worker).
222+
With `wrangler tail` running, open the Worker URL you opened in [step 3](/queues/get-started/#3-set-up-your-producer-worker).
223223

224224
You should receive a `Success` message in your browser window.
225225

@@ -229,7 +229,7 @@ With `wrangler tail` running, your consumer Worker will start logging the reques
229229

230230
If you refresh less than 10 times, it may take a few seconds for the messages to appear because batch timeout is configured for 10 seconds. After 10 seconds, messages should arrive in your terminal.
231231

232-
If you get errors when you refresh, check that the queue name you created in [step 3](/queues/get-started/#3-create-a-queue) and the queue you referenced in your `wrangler.toml` file is the same. You should ensure that your producer Worker is returning `Success` and is not returning an error.
232+
If you get errors when you refresh, check that the queue name you created in [step 2](/queues/get-started/#2-create-a-queue) and the queue you referenced in your `wrangler.toml` file is the same. You should ensure that your producer Worker is returning `Success` and is not returning an error.
233233

234234
By completing this guide, you have now created a queue, a producer Worker that publishes messages to that queue, and a consumer Worker that consumes those messages from it.
235235

src/content/docs/zaraz/index.mdx

Lines changed: 27 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,54 +6,68 @@ sidebar:
66
head:
77
- tag: title
88
content: Cloudflare Zaraz
9-
109
---
1110

12-
import { CardGrid, Description, Feature, LinkTitleCard, Plan, Render } from "~/components"
11+
import {
12+
CardGrid,
13+
Description,
14+
Feature,
15+
LinkTitleCard,
16+
Plan,
17+
Render,
18+
} from "~/components";
1319

1420
<Description>
1521

16-
Offload third-party tools and services to the cloud and improve the speed and security of your website.
22+
Offload third-party tools and services to the cloud and improve the speed and security of your website.
23+
1724
</Description>
1825

1926
<Plan id="zaraz.zaraz.properties.availability.summary" />
2027

2128
<Render file="zaraz-definition" />
2229

23-
***
30+
---
2431

2532
## Features
2633

27-
<Feature header="Third-party tools" href="/zaraz/get-started/add-tool/">
28-
You can add many third-party tools to Zaraz, and offload them from your website.
34+
<Feature header="Third-party tools" href="/zaraz/get-started/">
35+
You can add many third-party tools to Zaraz, and offload them from your
36+
website.
2937
</Feature>
3038

31-
<Feature header="Custom Managed Components" href="/zaraz/advanced/load-custom-managed-component/">
32-
You can add Custom Managed Components to Zaraz and run them as a tool.
39+
<Feature
40+
header="Custom Managed Components"
41+
href="/zaraz/advanced/load-custom-managed-component/"
42+
>
43+
You can add Custom Managed Components to Zaraz and run them as a tool.
3344
</Feature>
3445

3546
<Feature header="Web API" href="/zaraz/web-api/">
36-
Zaraz provides a client-side web API that you can use anywhere inside the `<body>` tag of a page.
47+
Zaraz provides a client-side web API that you can use anywhere inside the `<body>` tag of a page.
3748
</Feature>
3849

3950
<Feature header="Consent management" href="/zaraz/consent-management/">
40-
Zaraz provides a Consent Management platform to help you address and manage required consents.
51+
Zaraz provides a Consent Management platform to help you address and manage
52+
required consents.
4153
</Feature>
4254

43-
***
55+
---
4456

4557
## More resources
4658

4759
<CardGrid>
4860

4961
<LinkTitleCard title="Discord Channel" href="https://discord.cloudflare.com" icon="discord">
5062

51-
If you have any comments, questions, or bugs to report, contact the Zaraz team on their Discord channel.
63+
If you have any comments, questions, or bugs to report, contact the Zaraz team on their Discord channel.
64+
5265
</LinkTitleCard>
5366

5467
<LinkTitleCard title="Community Forum" href="https://community.cloudflare.com/c/developers/zaraz/67" icon="open-book">
5568

56-
Engage with other users and the Zaraz team on Cloudflare support forum.
69+
Engage with other users and the Zaraz team on Cloudflare support forum.
70+
5771
</LinkTitleCard>
5872

5973
</CardGrid>

0 commit comments

Comments
 (0)