Skip to content

Commit e168b91

Browse files
committed
Added note to additional pages
1 parent 7a7ec95 commit e168b91

13 files changed

+20
-18
lines changed

src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ For more information on DDoS managed rulesets, refer to [Managed rulesets](/ddos
3636

3737
This example configures the [HTTP DDoS Attack Protection](/ddos-protection/managed-rulesets/http/) managed ruleset for a zone using Terraform, changing the sensitivity level of rule with ID fdfdac75430c4c47a959592f0aa5e68a to `low`.
3838

39+
<Render file="v4-code-snippets" />
40+
3941
```tf
4042
resource "cloudflare_ruleset" "zone_level_http_ddos_config" {
4143
zone_id = "<ZONE_ID>"

src/content/docs/terraform/additional-configurations/rate-limiting-rules.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ For more information on configuring the previous version of rate limiting rules
3535

3636
This example creates a rate limiting rule in zone with ID `<ZONE_ID>` blocking traffic that exceeds the configured rate:
3737

38+
<Render file="v4-code-snippets" />
39+
3840
```tf
3941
resource "cloudflare_ruleset" "zone_rl" {
4042
zone_id = "<ZONE_ID>"

src/content/docs/terraform/additional-configurations/transform-rules.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ For more information on Transform Rules, refer to [Transform Rules](/rules/trans
3333

3434
The following example creates a Rewrite URL Rule that rewrites requests for `example.com/old-folder` to `example.com/new-folder`:
3535

36+
<Render file="v4-code-snippets" />
37+
3638
```tf
3739
resource "cloudflare_ruleset" "transform_url_rewrite" {
3840
zone_id = "<ZONE_ID>"

src/content/docs/terraform/additional-configurations/waf-custom-rules.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ For more information on custom rules, refer to [Custom rules](/waf/custom-rules/
4040

4141
The following example configures a custom rule in the zone entry point ruleset for the `http_request_firewall_custom` phase for zone with ID `<ZONE_ID>`. The rule will block all traffic on non-standard HTTP(S) ports:
4242

43+
<Render file="v4-code-snippets" />
44+
4345
```tf
4446
resource "cloudflare_ruleset" "zone_custom_firewall" {
4547
zone_id = "<ZONE_ID>"

src/content/docs/terraform/additional-configurations/waf-managed-rulesets.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ For more information on WAF Managed Rules, refer to [WAF Managed Rules](/waf/man
3636

3737
The following example deploys two managed rulesets to the zone with ID `<ZONE_ID>` using Terraform, using a `cloudflare_ruleset` resource with two rules that execute the managed rulesets.
3838

39+
<Render file="v4-code-snippets" />
40+
3941
```tf
4042
# Configure a ruleset at the zone level for the "http_request_firewall_managed" phase
4143
resource "cloudflare_ruleset" "zone_level_managed_waf" {

src/content/docs/terraform/advanced-topics/import-cloudflare-resources.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ To start managing existing Cloudflare resources in Terraform, for example, DNS r
5454

5555
If you do not have a Terraform configuration file defined, you need the `provider` block defined as follows:
5656

57+
<Render file="v4-code-snippets" />
58+
5759
```hcl
5860
provider 'cloudflare' {
5961
# Cloudflare email saved in $CLOUDFLARE_EMAIL

src/content/docs/terraform/advanced-topics/remote-backend.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,8 @@ After your token has been successfully created, review your **Secret Access Key*
3838

3939
Update your [`cloudflare.tf`](/terraform/tutorial/initialize-terraform/) file to include a [backend](https://developer.hashicorp.com/terraform/language/settings/backends/configuration) for the `<YOUR_BUCKET_NAME>` bucket you created above.
4040

41+
<Render file="v4-code-snippets" />
42+
4143
```tf
4244
terraform {
4345
backend "s3" {

src/content/docs/terraform/tutorial/add-page-rules.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,7 @@ In the [Configure HTTPS settings](/terraform/tutorial/configure-https-settings/)
1212

1313
Specifically, you will increase the security level for a URL known to be expensive to render and cannot be cached: `https://www.example.com/expensive-db-call`. Additionally, you will add a redirect from the previous URL used to host this page.
1414

15-
:::note
16-
Terraform code snippets below refer to the v4 SDK only.
17-
:::
15+
<Render file="v4-code-snippets" />
1816

1917
## 1. Create a new branch and append the page rule
2018

src/content/docs/terraform/tutorial/configure-https-settings.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,7 @@ After proxying a basic website through Cloudflare, you can use Terraform to adju
1212

1313
You will use a new Git branch for the changes and then merge it into the `master` branch before applying. On a team, you might consider using this step as an opportunity for others to review your change before merging and deploying it. You can also integrate Terraform into your CI/CD system to perform tests automatically using another Cloudflare domain.
1414

15-
:::note
16-
Terraform code snippets below refer to the v4 SDK only.
17-
:::
15+
<Render file="v4-code-snippets" />
1816

1917
## 1. Create a new branch and append the new zone settings
2018

src/content/docs/terraform/tutorial/initialize-terraform.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,7 @@ This tutorial shows you how to get started with Terraform. The tutorial uses an
1212

1313
Before you begin, ensure you have [installed Terraform](/terraform/installing/). You will also need to [create an API Token](/fundamentals/api/get-started/create-token/) with permissions to edit resources for this tutorial.
1414

15-
:::note
16-
Terraform code snippets below refer to the v4 SDK only.
17-
:::
15+
<Render file="v4-code-snippets" />
1816

1917
## 1. Define your first Terraform config file
2018

0 commit comments

Comments
 (0)