Skip to content

Commit bef2cdc

Browse files
committed
more DNS reshuffling
1 parent 90b6637 commit bef2cdc

File tree

9 files changed

+18
-18
lines changed

9 files changed

+18
-18
lines changed

src/content/docs/dns/dns-firewall/analytics.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66

77
---
88

9-
To access analytics for your DNS Firewall, use the [Cloudflare API](/api/resources/dns/subresources/firewall/subresources/analytics/subresources/reports/methods/get/).
9+
To access analytics for your DNS Firewall, use the [Cloudflare API](/api/resources/dns_firewall/subresources/analytics/subresources/reports/methods/get/).
1010

1111
Alternatively, [set up Logpush](/logs/about/) to deliver [DNS Firewall logs](/logs/reference/log-fields/account/dns_firewall_logs/) to a storage service, SIEM, or log management provider.
1212

src/content/docs/dns/dns-firewall/faq.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ As long as there is enough allocated memory, Cloudflare does not clear items fro
2626

2727
<Details header="Does the DNS Firewall cache SERVFAIL?">
2828

29-
Yes. `SERVFAIL` is treated like any other negative answer for caching purposes. The default TTL is 30 seconds. You can use the [API](/api/resources/dns/subresources/firewall/methods/edit/) to set a different `negative_cache_ttl`.
29+
Yes. `SERVFAIL` is treated like any other negative answer for caching purposes. The default TTL is 30 seconds. You can use the [API](/api/resources/dns_firewall/methods/edit/) to set a different `negative_cache_ttl`.
3030

3131
</Details>
3232

@@ -47,13 +47,13 @@ EDNS limits the effectiveness of the DNS cache.
4747

4848
:::
4949

50-
Some resolvers might not be sending any EDNS data. When you set the `ecs_fallback` parameter to `true` via the [API](/api/resources/dns/subresources/firewall/methods/edit/), DNS Firewall will forward the IP subnet of the resolver instead only if there is no EDNS data present in incoming the DNS query.
50+
Some resolvers might not be sending any EDNS data. When you set the `ecs_fallback` parameter to `true` via the [API](/api/resources/dns_firewall/methods/edit/), DNS Firewall will forward the IP subnet of the resolver instead only if there is no EDNS data present in incoming the DNS query.
5151

5252
</Details>
5353

5454
<Details header="Does DNS Firewall cache negative answers?">
5555

56-
Yes. The default TTL is 30 seconds. You can set `negative_cache_ttl` via the [API](/api/resources/dns/subresources/firewall/methods/edit/). This will affect the TTL of responses with status `REFUSED`, `NXDOMAIN`, or `SERVFAIL`.
56+
Yes. The default TTL is 30 seconds. You can set `negative_cache_ttl` via the [API](/api/resources/dns_firewall/methods/edit/). This will affect the TTL of responses with status `REFUSED`, `NXDOMAIN`, or `SERVFAIL`.
5757

5858
</Details>
5959

src/content/docs/dns/dns-firewall/random-prefix-attacks/setup.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ head:
1212
In order to enable automatic mitigation of [random prefix attacks](/dns/dns-firewall/random-prefix-attacks/about/):
1313

1414
1. Set up [DNS Firewall](/dns/dns-firewall/setup/).
15-
2. Send a [`PATCH` request](/api/resources/dns/subresources/firewall/methods/edit/) to update your DNS Firewall cluster.
15+
2. Send a [`PATCH` request](/api/resources/dns_firewall/methods/edit/) to update your DNS Firewall cluster.
1616

1717
```bash
1818
curl --request PATCH "https://api.cloudflare.com/client/v4/accounts/{account_id}/dns_firewall/{cluster_tag}" \

src/content/docs/dns/dns-firewall/setup.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ If you forget to save your new IP addresses, find your cluster and click **IP Ad
4545

4646
</TabItem> <TabItem label="API">
4747

48-
You can also create a DNS Firewall cluster by sending a [POST request](/api/resources/dns/subresources/firewall/methods/create/) to the API.
48+
You can also create a DNS Firewall cluster by sending a [POST request](/api/resources/dns_firewall/methods/create/) to the API.
4949

5050
</TabItem> </Tabs>
5151

@@ -67,6 +67,6 @@ Configure security policy in your DNS servers and Firewall to allow only [Cloudf
6767

6868
## Additional options
6969

70-
When you use the API, you can also specify other parameters, such as rate limit (in queries per second per data center). You can find the parameters descriptions and examples in the [API documentation](/api/resources/dns/subresources/firewall/methods/create/).
70+
When you use the API, you can also specify other parameters, such as rate limit (in queries per second per data center). You can find the parameters descriptions and examples in the [API documentation](/api/resources/dns_firewall/methods/create/).
7171

72-
To configure rate limiting and other options for already existing clusters, use the [Update DNS Firewall Cluster](/api/resources/dns/subresources/firewall/methods/edit/) endpoint.
72+
To configure rate limiting and other options for already existing clusters, use the [Update DNS Firewall Cluster](/api/resources/dns_firewall/methods/edit/) endpoint.

src/content/docs/dns/dnssec/dnssec-active-migration.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The provider you are migrating from must allow you to add DNSKEY records on the
3434

3535
To import the zone file using the API, refer to the [Import DNS Records endpoint](/api/resources/dns/subresources/records/methods/import/).
3636

37-
3. Go to **DNS** > **Settings**, and select **Enable DNSSEC**. Or use the following [API request](/api/resources/dnssec/methods/edit/).
37+
3. Go to **DNS** > **Settings**, and select **Enable DNSSEC**. Or use the following [API request](/api/resources/dns/subresources/dnssec/methods/edit/).
3838

3939
```bash
4040
curl --request PATCH \
@@ -45,7 +45,7 @@ https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec \
4545
--data '{"status": "active"}'
4646
```
4747

48-
4. Go to **DNS** > **Settings**, and enable **Multi-signer DNSSEC**. Or use the following [API request](/api/resources/dnssec/methods/edit/).
48+
4. Go to **DNS** > **Settings**, and enable **Multi-signer DNSSEC**. Or use the following [API request](/api/resources/dns/subresources/dnssec/methods/edit/).
4949

5050
```bash
5151
curl --request PATCH \

src/content/docs/dns/dnssec/dnssec-states.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,19 +6,19 @@ sidebar:
66

77
---
88

9-
This page describes different DNSSEC states and how they relate to the responses you get from the [DNSSEC details API endpoint](/api/resources/dnssec/methods/get/).
9+
This page describes different DNSSEC states and how they relate to the responses you get from the [DNSSEC details API endpoint](/api/resources/dns/subresources/dnssec/methods/get/).
1010

1111
| State | API response | Description |
1212
| ---------------- | ---------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
1313
| Pending | `"status":"pending"`<br /> `"modified_on":<TIME_STAMP>` | DNSSEC has been enabled but the Cloudflare DS record has not been added at the registrar. |
1414
| Active | `"status":"active"`<br /> `"modified_on":<TIME_STAMP>` | DNSSEC has been enabled and the Cloudflare DS record is present at the registrar. |
1515
| Pending-disabled | `"status":"pending-disabled"`<br /> `"modified_on":<TIME_STAMP>` | DNSSEC has been disabled but the Cloudflare DS record is still added at the registrar. |
1616
| Disabled | `"status":"disabled"`<br /> `"modified_on":<TIME_STAMP>` | DNSSEC has been disabled and the Cloudflare DS record has been removed from the registrar. |
17-
| Deleted | `"status":"disabled"`<br /> `"modified_on": null` | DNSSEC has never been enabled for the zone or DNSSEC has been disabled and then deleted using the [Delete DNSSEC records endpoint](/api/resources/dnssec/methods/delete/). |
17+
| Deleted | `"status":"disabled"`<br /> `"modified_on": null` | DNSSEC has never been enabled for the zone or DNSSEC has been disabled and then deleted using the [Delete DNSSEC records endpoint](/api/resources/dns/subresources/dnssec/methods/delete/). |
1818

1919
:::caution
2020

21-
Once you have enabled DNSSEC on a zone for the first time, you cannot transition directly from an `active` state to a `deleted` state. You can only [delete DNSSEC records](/api/resources/dnssec/methods/delete/) once your zone DNSSEC is in a `disabled` state. Cloudflare prevents you from deleting DNSSEC records before removing the DS record from the registrar to avoid DNS resolution issues.
21+
Once you have enabled DNSSEC on a zone for the first time, you cannot transition directly from an `active` state to a `deleted` state. You can only [delete DNSSEC records](/api/resources/dns/subresources/dnssec/methods/delete/) once your zone DNSSEC is in a `disabled` state. Cloudflare prevents you from deleting DNSSEC records before removing the DS record from the registrar to avoid DNS resolution issues.
2222
:::
2323

2424
In both `pending` and `active` states, Cloudflare signs the zone and responds with `RRSIG`, `NSEC`, `DNSKEY`, `CDS`, and `CDNSKEY` record types.

src/content/docs/dns/dnssec/multi-signer-dnssec/setup.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Note that:
2525
The following steps also apply if you use [Cloudflare as a secondary DNS provider](/dns/zone-setups/zone-transfers/cloudflare-as-secondary/), with the difference that, in such case, the records in steps 2 and 3 should be transferred from the primary, and step 4 is not necessary.
2626
:::
2727

28-
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. This is done by setting `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example.
28+
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. This is done by setting `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example.
2929

3030
```bash
3131
curl --request PATCH \

src/content/docs/dns/zone-setups/zone-transfers/cloudflare-as-primary/dnssec-for-primary.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Note that:
2525

2626
## Steps
2727

28-
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. This is done by setting `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example.
28+
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. This is done by setting `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example.
2929

3030
```bash
3131
curl --request PATCH \

src/content/docs/dns/zone-setups/zone-transfers/cloudflare-as-secondary/dnssec-for-secondary.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ In this setup, DNSSEC on your pirmary DNS provider does not need to be enabled.
4242

4343
</TabItem> <TabItem label="API">
4444

45-
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dnssec/methods/edit/) and set a `status` of `active` for your zone.
45+
1. Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) and set a `status` of `active` for your zone.
4646

4747
```bash
4848
curl --request PATCH \
@@ -55,7 +55,7 @@ https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec \
5555
}'
5656
```
5757

58-
2. Use the [DNSSEC Details endpoint](/api/resources/dnssec/methods/get/) to get the necessary values to create a **DS** record at your registrar.
58+
2. Use the [DNSSEC Details endpoint](/api/resources/dns/subresources/dnssec/methods/get/) to get the necessary values to create a **DS** record at your registrar.
5959

6060
3. <Render file="dnssec-registrar-steps" />
6161

@@ -95,7 +95,7 @@ b. Under **DNSSEC with Secondary DNS** select **Pre-signed**.
9595

9696
</TabItem> <TabItem label="API">
9797

98-
Use the [Edit DNSSEC Status endpoint](/api/resources/dnssec/methods/edit/) and set the `dnssec_presigned` value to `true`.
98+
Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) and set the `dnssec_presigned` value to `true`.
9999

100100
```bash
101101
curl --request PATCH \

0 commit comments

Comments
 (0)