Skip to content

Commit dd92249

Browse files
committed
Update even more broken links
1 parent bee826f commit dd92249

File tree

14 files changed

+52
-58
lines changed

14 files changed

+52
-58
lines changed

src/content/changelog/workers/2025-10-03-one-click-access-for-workers.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ You can now enable [Cloudflare Access](/cloudflare-one/access-controls/policies/
1212

1313
![Screenshot of the Enable/Disable Cloudflare Access button on the workers.dev route settings page](~/assets/images/workers/changelog/workers-access.png)
1414

15-
Access allows you to limit access to your Workers to specific users or groups. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [Access policy](/cloudflare-one/traffic-policies/access).
15+
Access allows you to limit access to your Workers to specific users or groups. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [Access policy](/cloudflare-one/access-controls/policies/access/).
1616

1717
To enable Cloudflare Access:
1818

@@ -36,9 +36,9 @@ export default {
3636
async fetch(request, env, ctx) {
3737
// Verify the POLICY_AUD environment variable is set
3838
if (!env.POLICY_AUD) {
39-
return new Response('Missing required audience', {
39+
return new Response("Missing required audience", {
4040
status: 403,
41-
headers: { 'Content-Type': 'text/plain' }
41+
headers: { "Content-Type": "text/plain" },
4242
});
4343
}
4444

@@ -89,4 +89,4 @@ Add these [environment variables](/workers/configuration/environment-variables/)
8989

9090
Both of these appear in the modal that appears when you enable Cloudflare Access.
9191

92-
You can set these variables by adding them to your Worker's [Wrangler configuration file](/workers/wrangler/configuration/), or via the Cloudflare dashboard under **Workers & Pages** > **your-worker** > **Settings** > **Environment Variables**.
92+
You can set these variables by adding them to your Worker's [Wrangler configuration file](/workers/wrangler/configuration/), or via the Cloudflare dashboard under **Workers & Pages** > **your-worker** > **Settings** > **Environment Variables**.

src/content/docs/ai-gateway/features/dlp/index.mdx

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,11 @@ sidebar:
99

1010
import { Feature } from "~/components";
1111

12-
1312
Data Loss Prevention (DLP) for AI Gateway helps protect your organization from inadvertent exposure of sensitive data through AI interactions. By integrating with Cloudflare's proven DLP technology, AI Gateway can scan both incoming prompts and outgoing AI responses for sensitive information, ensuring your AI applications maintain security and compliance standards.
1413

1514
## How it works
1615

17-
AI Gateway DLP leverages the same powerful detection engines used in [Cloudflare's Data Loss Prevention](/cloudflare-one/traffic-policies/data-loss-prevention/) solution to scan AI traffic in real-time. The system analyzes both user prompts sent to AI models and responses received from AI providers, identifying sensitive data patterns and taking appropriate protective actions.
18-
16+
AI Gateway DLP leverages the same powerful detection engines used in [Cloudflare's Data Loss Prevention](/cloudflare-one/data-loss-prevention/) solution to scan AI traffic in real-time. The system analyzes both user prompts sent to AI models and responses received from AI providers, identifying sensitive data patterns and taking appropriate protective actions.
1917

2018
## Key benefits
2119

@@ -43,7 +41,7 @@ AI Gateway DLP uses the same detection profiles and policies as Cloudflare's ent
4341
- **Centralized reporting** - All DLP events appear in the same dashboard and logs
4442
- **Shared profiles** - Reuse existing DLP detection profiles for AI traffic
4543

46-
For more information about Cloudflare's DLP capabilities, refer to the [Data Loss Prevention documentation](/cloudflare-one/traffic-policies/data-loss-prevention/).
44+
For more information about Cloudflare's DLP capabilities, refer to the [Data Loss Prevention documentation](/cloudflare-one/data-loss-prevention/).
4745

4846
## Getting started
4947

@@ -56,6 +54,6 @@ To enable DLP for your AI Gateway:
5654
## Related resources
5755

5856
- [Set up DLP for AI Gateway](/ai-gateway/features/dlp/set-up-dlp/)
59-
- [Cloudflare Data Loss Prevention](/cloudflare-one/traffic-policies/data-loss-prevention/)
57+
- [Cloudflare Data Loss Prevention](/cloudflare-one/data-loss-prevention/)
6058
- [AI Gateway Security Features](/ai-gateway/features/guardrails/)
61-
- [DLP Detection Profiles](/cloudflare-one/traffic-policies/data-loss-prevention/dlp-profiles/)
59+
- [DLP Detection Profiles](/cloudflare-one/data-loss-prevention/dlp-profiles/)

src/content/docs/ai-gateway/features/dlp/set-up-dlp.mdx

Lines changed: 19 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,13 @@ After enabling DLP, you can create policies to define how sensitive data should
2828
- **Policy ID**: Enter a unique name for this policy (e.g., "Block-PII-Requests")
2929
- **DLP Profiles**: Select the DLP profiles to check against. AI requests/responses will be checked against each of the selected profiles. Available profiles include:
3030
- **Financial Information** - Credit cards, bank accounts, routing numbers
31-
- **Personal Identifiable Information (PII)** - Names, addresses, phone numbers
31+
- **Personal Identifiable Information (PII)** - Names, addresses, phone numbers
3232
- **Government Identifiers** - SSNs, passport numbers, driver's licenses
3333
- **Healthcare Information** - Medical record numbers, patient data
3434
- **Custom Profiles** - Organization-specific data patterns
35-
35+
3636
:::note
37-
DLP profiles can be created and managed in the [Zero Trust DLP dashboard](/cloudflare-one/traffic-policies/data-loss-prevention/dlp-profiles/).
37+
DLP profiles can be created and managed in the [Zero Trust DLP dashboard](/cloudflare-one/data-loss-prevention/dlp-profiles/).
3838
:::
3939

4040
- **Action**: Choose the action to take when any of the selected profiles match:
@@ -89,7 +89,6 @@ To view only DLP-related requests:
8989
- **FLAG** - Show only requests where sensitive data was flagged
9090
- **BLOCK** - Show only requests that were blocked due to DLP policies
9191

92-
9392
## Error handling
9493

9594
When DLP policies are triggered, your application will receive additional information through response headers and error codes.
@@ -121,18 +120,21 @@ When a request matches DLP policies (whether flagged or blocked), an additional
121120

122121
```json
123122
{
124-
"findings": [
125-
{
126-
"profile": {
127-
"context": {},
128-
"entry_ids": ["a1b2c3d4-e5f6-7890-abcd-ef1234567890", "f7e8d9c0-b1a2-3456-789a-bcdef0123456"],
129-
"profile_id": "12345678-90ab-cdef-1234-567890abcdef"
130-
},
131-
"policy_ids": ["block_financial_data"],
132-
"check": "REQUEST"
133-
}
134-
],
135-
"action": "BLOCK"
123+
"findings": [
124+
{
125+
"profile": {
126+
"context": {},
127+
"entry_ids": [
128+
"a1b2c3d4-e5f6-7890-abcd-ef1234567890",
129+
"f7e8d9c0-b1a2-3456-789a-bcdef0123456"
130+
],
131+
"profile_id": "12345678-90ab-cdef-1234-567890abcdef"
132+
},
133+
"policy_ids": ["block_financial_data"],
134+
"check": "REQUEST"
135+
}
136+
],
137+
"action": "BLOCK"
136138
}
137139
```
138140

@@ -194,4 +196,4 @@ try {
194196
- Test with different sample data to understand detection patterns
195197
- Adjust profile selections if needed
196198

197-
For additional support with DLP configuration, refer to the [Cloudflare Data Loss Prevention documentation](/cloudflare-one/traffic-policies/data-loss-prevention/) or contact your Cloudflare support team.
199+
For additional support with DLP configuration, refer to the [Cloudflare Data Loss Prevention documentation](/cloudflare-one/data-loss-prevention/) or contact your Cloudflare support team.

src/content/docs/cloudflare-one/traffic-policies/egress-policies/host-selectors.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ import { Tabs, TabItem, Details, APIRequest } from "~/components";
1010
<Details header="Feature availability">
1111

1212
| [WARP modes](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
13-
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
14-
| Gateway with WARP | Enterprise |
13+
| ---------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
14+
| Gateway with WARP | Enterprise |
1515

1616
| System | Availability | Minimum WARP version |
1717
| -------- | ------------ | -------------------- |
@@ -24,7 +24,7 @@ import { Tabs, TabItem, Details, APIRequest } from "~/components";
2424

2525
</Details>
2626

27-
When Gateway receives a DNS query for hostname covered by the [Application](/cloudflare-one/policies/egress-policies/#application), [Content Categories](/cloudflare-one/policies/egress-policies/#content-categories), [Domain](/cloudflare-one/policies/egress-policies/#domain), and [Host](/cloudflare-one/policies/egress-policies/#host) selectors in an Egress policy, Gateway initially resolves DNS to an IP in the `100.80.0.0/16` or `2606:4700:0cf1:4000::/64` range. This process allows Gateway to map a destination IP with a hostname at [layer 4](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/) (where Gateway evaluates Egress policies). The destination IP for a hostname is not usually known at layer 4. Prior to evaluating Egress policies, the initially resolved IP is overwritten with the correct destination IP.
27+
When Gateway receives a DNS query for hostname covered by the [Application](/cloudflare-one/traffic-policies/egress-policies/#application), [Content Categories](/cloudflare-one/traffic-policies/egress-policies/#content-categories), [Domain](/cloudflare-one/traffic-policies/egress-policies/#domain), and [Host](/cloudflare-one/traffic-policies/egress-policies/#host) selectors in an Egress policy, Gateway initially resolves DNS to an IP in the `100.80.0.0/16` or `2606:4700:0cf1:4000::/64` range. This process allows Gateway to map a destination IP with a hostname at [layer 4](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/) (where Gateway evaluates Egress policies). The destination IP for a hostname is not usually known at layer 4. Prior to evaluating Egress policies, the initially resolved IP is overwritten with the correct destination IP.
2828

2929
![Example egress policy flow](~/assets/images/cloudflare-one/policies/host-selector-diagram.png)
3030

@@ -61,13 +61,13 @@ Use the [Patch Zero Trust account configuration](/api/resources/zero_trust/subre
6161

6262
Traffic must be on-ramped to Gateway with the following methods:
6363

64-
| On-ramp method | Compatibility |
65-
| ------------------------------------------------------------------------------------------ | ------------- |
66-
| [WARP](/cloudflare-one/team-and-resources/devices/warp/) ||
67-
| [PAC files](/cloudflare-one/team-and-resources/devices/agentless/pac-files/) ||
68-
| [Browser Isolation](/cloudflare-one/remote-browser-isolation/) ||
64+
| On-ramp method | Compatibility |
65+
| --------------------------------------------------------------------------------------------------- | ------------- |
66+
| [WARP](/cloudflare-one/team-and-resources/devices/warp/) ||
67+
| [PAC files](/cloudflare-one/team-and-resources/devices/agentless/pac-files/) ||
68+
| [Browser Isolation](/cloudflare-one/remote-browser-isolation/) ||
6969
| [WARP Connector](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/) ||
70-
| [Magic WAN](/magic-wan/zero-trust/cloudflare-gateway/) ||
70+
| [Magic WAN](/magic-wan/zero-trust/cloudflare-gateway/) ||
7171

7272
Unsupported traffic will be resolved with your default Gateway settings. If you use DNS locations to send a DNS query to Gateway with IPv4, IPv6, DoT, or DoH, Gateway will not return the initial resolved IP for supported traffic nor resolve unsupported traffic.
7373

src/content/docs/data-localization/compatibility.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ The table below provides a summary of the Data Localization Suite product's beha
166166

167167
[^30]: Regular/Generic and Custom Tiered Cache works; Smart Tiered Caching does not work with Customer Metadata Boundary (CMB). <br/> With CMB set to EU, the Zone Dashboard **Caching** > **Tiered Cache** > **Smart Tiered Caching** option will not populate the Dashboard Analytics.
168168

169-
[^31]: DLP is part of Gateway HTTP, however, [DLP detection entries](/cloudflare-one/traffic-policies/data-loss-prevention/detection-entries/) are not available outside US region when using Customer Metadata Boundary.
169+
[^31]: DLP is part of Gateway HTTP, however, [DLP detection entries](/cloudflare-one/data-loss-prevention/detection-entries/) are not available outside US region when using Customer Metadata Boundary.
170170

171171
[^32]: Dashboard Analytics are empty when using CMB outside the US region. Use Logpush instead.
172172

src/content/docs/data-localization/faq.mdx

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,18 @@ title: FAQs
44
structured_data: true
55
sidebar:
66
order: 9
7-
87
---
98

109
## Are DLP and DLS the same?
1110

12-
No, they are not. DLP stands for [Data Loss Prevention](/cloudflare-one/traffic-policies/data-loss-prevention/), and it is part of Cloudflare’s Zero Trust offering (requiring Gateway). It allows customers to scan web traffic and SaaS apps for sensitive data like secret keys, financial information (credit card numbers), and other keywords.
11+
No, they are not. DLP stands for [Data Loss Prevention](/cloudflare-one/data-loss-prevention/), and it is part of Cloudflare’s Zero Trust offering (requiring Gateway). It allows customers to scan web traffic and SaaS apps for sensitive data like secret keys, financial information (credit card numbers), and other keywords.
1312

1413
[Data Localization Suite](/data-localization/) (DLS) is a suite of features that can provide localization and data residency features.
1514

16-
1715
## Are Cloudflare’s services GDPR compliant?
1816

1917
Yes, even without DLS, Cloudflare services are designed to satisfy the GDPR’s requirements. Cloudflare services are also verified compliant with the EU Cloud CoC, Verification-ID: 2023LVL02SCOPE4316. For further information, visit EU Cloud CoC [public register](https://eucoc.cloud/en/public-register).
2018

21-
2219
## How can I use DLS?
2320

2421
Once you have purchased DLS, the post-sales team will entitle DLS for you, and you will be able to configure all features by yourself via dashboard or API. You can find more specific information under the [Configuration guides](/data-localization/how-to/) section.
@@ -27,19 +24,16 @@ Once you have purchased DLS, the post-sales team will entitle DLS for you, and y
2724

2825
Not yet.
2926

30-
3127
## Are there other options if I prefer not to have Cloudflare handle TLS termination (decryption)?
3228

3329
Yes, you have these options available:
3430

35-
* [Spectrum TCP/UDP Apps](/spectrum/) (without TLS Termination)
36-
* [Magic Transit](/magic-transit/)
37-
* [Privacy Gateway](/privacy-gateway/)
31+
- [Spectrum TCP/UDP Apps](/spectrum/) (without TLS Termination)
32+
- [Magic Transit](/magic-transit/)
33+
- [Privacy Gateway](/privacy-gateway/)
3834

3935
These options only offer L3/L4 DDoS protection and using them imply that no application / L7 security or performance services can be applied.
4036

4137
## I have configured [Customer Metadata Boundary](/data-localization/metadata-boundary/) for EU region, I'm accessing the Cloudflare Dashboard from Europe, why am I getting an error `Data not available due to your account's Customer Metadata Boundary configuration`?
4238

4339
Based on Internet conditions that vary over time, users may be dynamically steered to a data center that is physically further away. This can be based on a variety of factors, including latency and network congestion. [Out of region access](/data-localization/metadata-boundary/out-of-region-access/) allows requests arriving in the United States to pull Customer Logs from the European Union and vice-versa. The analytics are still exclusively stored in the CMB configured region.
44-
45-

src/content/docs/data-localization/how-to/zero-trust.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ As part of Regional Services, Cloudflare Gateway will only perform [TLS decrypti
2727

2828
#### Data Loss Prevention (DLP)
2929

30-
You are able to [log the payload of matched DLP rules](/cloudflare-one/traffic-policies/data-loss-prevention/dlp-policies/logging-options/#log-the-payload-of-matched-rules) and encrypt them with your public key so that only you can examine them later.
30+
You are able to [log the payload of matched DLP rules](/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#log-the-payload-of-matched-rules) and encrypt them with your public key so that only you can examine them later.
3131

32-
[Cloudflare cannot decrypt encrypted payloads](/cloudflare-one/traffic-policies/data-loss-prevention/dlp-policies/logging-options/#data-privacy).
32+
[Cloudflare cannot decrypt encrypted payloads](/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#data-privacy).
3333

3434
### Network policies
3535

src/content/docs/workers/configuration/previews.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The resulting alias would be associated with this version, and immediately avail
9494

9595
## Manage access to Preview URLs
9696

97-
When enabled, all preview URLs are available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/traffic-policies/access).
97+
When enabled, all preview URLs are available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/access-controls/policies/access/).
9898

9999
To limit your preview URLs to authorized emails only:
100100

src/content/docs/workers/configuration/routing/workers-dev.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ All Workers are assigned a `workers.dev` route when they are created or renamed
2323

2424
## Manage access to `workers.dev`
2525

26-
When enabled, your `workers.dev` URL is available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/traffic-policies/access).
26+
When enabled, your `workers.dev` URL is available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/access-controls/policies/access/).
2727

2828
To limit your `workers.dev` URL to authorized emails only:
2929

0 commit comments

Comments
 (0)