You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/ai-gateway/configuration/websockets-api.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Websockets API
2
+
title: WebSockets API
3
3
pcx_content_type: configuration
4
4
sidebar:
5
5
badge:
@@ -8,7 +8,7 @@ sidebar:
8
8
9
9
The AI Gateway WebSockets API provides a single persistent connection, enabling continuous communication. By using WebSockets, you can establish a single connection for multiple AI requests, eliminating the need for repeated handshakes and TLS negotiations, which enhances performance and reduces latency. This API supports all AI providers connected to AI Gateway, including those that do not natively support WebSockets.
10
10
11
-
## When to use webSockets?
11
+
## When to use WebSockets?
12
12
13
13
WebSockets are long-lived TCP connections that enable bi-directional, real-time communication between client and server. Unlike HTTP connections, which require repeated handshakes for each request, WebSockets maintain the connection, supporting continuous data exchange with reduced overhead. WebSockets are ideal for applications needing low-latency, real-time data, such as voice assistants.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/saas-customers/product-compatibility.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ This is not an exhaustive list of Cloudflare products and features.
39
39
|[Page Rules](/rules/page-rules/)| Yes\*| Yes | Page Rules that match the subdomain used for O2O may block or interfere with the flow of visitors to your website. |
|[Origin Rules](/rules/origin-rules/)| Yes | Yes | Enterprise zones can configure Origin Rules, by setting the Host Header and DNS Overrides to direct traffic to a SaaS zone. |
42
-
|[Page Shield](/page-shield/)|No | Yes ||
42
+
|[Page Shield](/page-shield/)|Yes| Yes ||
43
43
|[Polish](/images/polish/)| Yes\*| Yes | Polish only runs on cached assets. If the customer zone is bypassing cache for SaaS zone destined traffic, then images optimized by Polish will not be loaded from origin. |
44
44
|[Rate Limiting](/waf/rate-limiting-rules/)| Yes\*| Yes | Rate Limiting rules that match the subdomain used for O2O may block or interfere with the flow of visitors to your website. |
45
45
|[Rocket Loader](/speed/optimization/content/rocket-loader/)| No | No ||
A partial setup is only available to customers on a Business or Enterprise plan.
18
17
:::
19
18
20
-
***
19
+
---
21
20
22
21
## Before you begin
23
22
24
23
<Steps>
24
+
25
25
1. Create a Cloudflare account and add your domain.
26
26
2. Choose **Business** or **Enterprise** as your plan.
27
27
3. If you are onboarding a new domain to Cloudflare, ignore the instructions to change your nameservers.
28
28
4. (Recommended) Plan for SSL/TLS certificates:
29
29
30
-
If you are only using [Universal SSL](/ssl/edge-certificates/universal-ssl/) prior to converting your zone, a certificate will be provisioned for your subdomains only after each of the respective DNS records ([step 3](#3-add-dns-records) below) are [proxied](/dns/manage-dns-records/reference/proxied-dns-records/). Refer to [Enable Universal SSL](/ssl/edge-certificates/universal-ssl/enable-universal-ssl/#partial-dns-setup) for details.
30
+
If you are only using [Universal SSL](/ssl/edge-certificates/universal-ssl/) prior to converting your zone, a certificate will be provisioned for your subdomains only after each of the respective DNS records ([step 3](#3-add-dns-records) below) are [proxied](/dns/manage-dns-records/reference/proxied-dns-records/). Refer to [Enable Universal SSL](/ssl/edge-certificates/universal-ssl/enable-universal-ssl/#partial-dns-setup) for details.
31
+
32
+
If your domain is sensitive to downtime, instead of using Universal SSL, consider using an [advanced certificate](/ssl/edge-certificates/advanced-certificate-manager/) with [delegated DCV](/ssl/edge-certificates/changing-dcv-method/methods/delegated-dcv/#setup).
31
33
32
-
If your domain is sensitive to downtime, instead of using Universal SSL, consider using an [advanced certificate](/ssl/edge-certificates/advanced-certificate-manager/) with [delegated DCV](/ssl/edge-certificates/changing-dcv-method/methods/delegated-dcv/#setup).
33
34
</Steps>
34
35
35
36
## 1. Convert your zone and review DNS records
36
37
37
38
<Steps>
39
+
38
40
1. On the **Overview** page, select **Convert to CNAME DNS Setup**.
39
41
2. Select **Convert** to confirm.
40
42
3. Save the information from the **Verification TXT Record**. If you lose the information, you can also access it by going to **DNS** > **Records** > **Verification TXT Record**.
41
43
4. Make sure that you have all the DNS records (A, AAAA, or CNAME) for subdomains that you want to proxy through Cloudflare.
44
+
42
45
</Steps>
43
46
44
47
## 2. Verify ownership for your domain
45
48
46
49
Add the **Verification TXT Record** at your authoritative DNS provider. Cloudflare will verify the TXT record and send a confirmation email. This can take up to a few hours.
If your authoritative DNS provider automatically appends DNS record `name` fields with your domain, make sure to only insert `cloudflare-verify` as the record name. Otherwise, it may result in an incorrect record name, such as `cloudflare-verify.example.com.example.com`.
58
64
59
-
After creating the record, you can use this [Dig Web Interface link](https://digwebinterface.com/?type=TXT\&ns=auth\&nameservers=) to search (`dig`) for `cloudflare-verify.<YOUR DOMAIN>` and validate if it is working.
65
+
After creating the record, you can use this [Dig Web Interface link](https://digwebinterface.com/?type=TXT&ns=auth&nameservers=) to search (`dig`) for `cloudflare-verify.<YOUR DOMAIN>` and validate if it is working.
66
+
60
67
:::
61
68
62
69
That record must remain in place for as long as your domain is active on the partial setup on Cloudflare.
@@ -66,25 +73,29 @@ If your organization has multiple Cloudflare accounts, also consider using zone
66
73
## 3. Add DNS records
67
74
68
75
<Steps>
76
+
69
77
1. At your authoritative DNS provider:
78
+
70
79
1. Create `CNAME` records pointing to `{your-hostname}.cdn.cloudflare.net` for every hostname you wish to proxy through Cloudflare.
71
80
72
-
<Detailsheader="Example CNAME record at authoritative DNS provider">
81
+
<Detailsheader="Example CNAME record at authoritative DNS provider">
82
+
83
+
The `CNAME` record for `www.example.com` would be:
73
84
74
-
The `CNAME` record for `www.example.com` would be:
2. Remove any previously existing `A`, `AAAA`, or `CNAME` records referencing the hostnames you want to proxy through Cloudflare. For these hostnames, leave only the records pointing to `{your-hostname}.cdn.cloudflare.net`.
91
+
2. Remove any previously existing `A`, `AAAA`, or `CNAME` records referencing the hostnames you want to proxy through Cloudflare. For these hostnames, leave only the records pointing to `{your-hostname}.cdn.cloudflare.net`.
82
92
83
93
2. Repeat this process for each subdomain that should be proxied to Cloudflare.
94
+
84
95
</Steps>
85
96
86
97
---
87
98
88
99
## Other record types
89
100
90
-
If you are preparing a conversion from partial to full setup, or if you have a more specific use case, you can use the [Create DNS Record](/api/operations/dns-records-for-a-zone-create-dns-record) API endpoint to create DNS records of any supported type.
101
+
If you are preparing a conversion from partial to full setup, or if you have a more specific use case, you can use the [Create DNS Record](/api/resources/dns/subresources/records/methods/create/) API endpoint to create DNS records of any supported type.
Copy file name to clipboardExpand all lines: src/content/docs/email-security/deployment/inline/reference/egress-ips.mdx
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,6 @@ title: Egress IPs
3
3
pcx_content_type: reference
4
4
sidebar:
5
5
order: 1
6
-
7
6
---
8
7
9
8
When you set up Email Security (formerly Area 1) using an [inline deployment](/email-security/deployment/inline/), you need to tell your existing email providers to accept messages coming from Email Security's egress IP addresses.
0 commit comments