Skip to content

Commit f3f84aa

Browse files
authored
[Ref Architecture] Remove trailing spaces (#21195)
1 parent 687a8ae commit f3f84aa

File tree

7 files changed

+18
-18
lines changed

7 files changed

+18
-18
lines changed

src/content/docs/reference-architecture/architectures/load-balancing.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -698,7 +698,7 @@ Endpoint draining is only applicable for session affinity because without sessio
698698

699699
##### Zero-downtime failover
700700

701-
Zero-downtime failover automatically sends traffic to endpoints within an endpoint pool during transient network issues. <Render file="zero-downtime-failover-retry-on-error" product="fundamentals" />
701+
Zero-downtime failover automatically sends traffic to endpoints within an endpoint pool during transient network issues. <Render file="zero-downtime-failover-retry-on-error" product="fundamentals" />
702702
These response codes are not returned from the endpoint, but from requests made by upstream Cloudflare services to an organization's endpoints.
703703

704704
Zero-downtime failover has three modes of operation:

src/content/docs/reference-architecture/design-guides/leveraging-cloudflare-for-your-saas-applications.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Also, a customer of your application might wish to have their main website domai
2121

2222
Many SaaS applications have caching and security solutions, such as Cloudflare, in front of their applications and as such need to onboard these hostnames. This is often done using a "Zone" model, where inside Cloudflare, or another vendor such as AWS Cloudfront, a "Zone" is created for `app.customer.com`. This means that, as each new customer is onboarded, a new "Zone" must be created - this might be manageable in the tens and hundreds of customers but, when you get to thousands and millions, management of all these zones and their configurations is hard.
2323

24-
Cloudflare for Platforms extends far beyond this traditional model of most edge providers, by managing traffic across many hostnames and domains in one "Zone". You can now manage `www.customer1.com` and `www.customer2.net`, and millions more hostnames, through the same configuration while also customizing features as needed.
24+
Cloudflare for Platforms extends far beyond this traditional model of most edge providers, by managing traffic across many hostnames and domains in one "Zone". You can now manage `www.customer1.com` and `www.customer2.net`, and millions more hostnames, through the same configuration while also customizing features as needed.
2525

2626
This document provides a reference and guidance for using Cloudflare for Platforms. The document is split into three main sections.
2727

src/content/docs/reference-architecture/design-guides/streamlined-waf-deployment-across-zones-and-applications.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ updated: 2024-12-11
1111

1212
Security perimeters have become less defined compared to the traditional "Castle and Moat" deployments that were popular in the past. Within a fixed perimeter, it was relatively easier to secure multiple applications using a single Web Application Firewall (WAF) deployment inside a datacenter. Today this approach does not provide enough flexibility as applications and services expand beyond the traditional datacenter. There are several good reasons to configure networks and services in a hybrid approach and to adopt SaaS platforms, so it is valuable to update the WAF approach to cover this scenario.
1313

14-
Cloud-based WAF solutions can control the perimeter sprawl with a flexible deployment model that covers applications and services deployed on-premises, on cloud-based IaaS and PaaS environments, and in hybrid environments.
14+
Cloud-based WAF solutions can control the perimeter sprawl with a flexible deployment model that covers applications and services deployed on-premises, on cloud-based IaaS and PaaS environments, and in hybrid environments.
1515

1616
At the same time, an incorrect implementation of a cloud-based WAF can lead to security policy fragmentation and duplication, causing increased overheads both in maintenance and in monitoring. Aside from the clear economic impact that such inefficiencies bring, the lower efficiency can also degrade the security posture itself. This ultimately can lead to security incidents of varying degrees of severity depending on the scenario.
1717

@@ -23,7 +23,7 @@ Cloudflare offers comprehensive Application Security & Performance solutions, wh
2323

2424
In this guide, you will learn:
2525

26-
* How to implement the Cloudflare WAF and factor common rules.
26+
* How to implement the Cloudflare WAF and factor common rules.
2727
* How to easily implement common configurations across multiple applications.
2828
* How to deploy exceptions and specific configurations when needed.
2929
* What are the best practices to follow when deploying the Cloudflare WAF.
@@ -96,7 +96,7 @@ Let's visualize the complete configuration in the below diagram:
9696

9797
![Diagram depicting the implemented WAF configuration at the account level](~/assets/images/reference-architecture/streamlined-waf-deployment-across-zones-apps/diagram-3.svg "Figure 3: The Account WAF implementation to protect multiple applications across different hostnames with repeatable configurations.")
9898

99-
This setup will provide three instances of the Managed Ruleset, calibrated for each application group.
99+
This setup will provide three instances of the Managed Ruleset, calibrated for each application group.
100100

101101
If you have additional applications to be protected in the future, it is sufficient to include the new application FQDN to the filter expression. Generally, most will be added to the standard ruleset instance that is using the recommended Cloudflare configuration. Another common strategy is to add new applications to the `Log` mode instance, so that it can be monitored and eventually transitioned to the `Default` mode ruleset or to a more specific variation if required.
102102

@@ -115,7 +115,7 @@ If this is your scenario, you can simplify the above setup in the following way
115115
This approach can be simpler when there are few exceptions to the norm, and when the initial calibration confirms that the fine tuning already done by Cloudflare to minimize false positives is appropriate in your situation.
116116

117117
### Using Lists
118-
Cloudflare provides the ability to create [lists of hostnames](/waf/tools/lists/create-dashboard/). In this case, the Filter expression can be changed to reference such list variables.
118+
Cloudflare provides the ability to create [lists of hostnames](/waf/tools/lists/create-dashboard/). In this case, the Filter expression can be changed to reference such list variables.
119119

120120
You can then update the lists directly and re-use them across multiple rulesets. For example, use the same list for the Cloudflare Managed Rules and also for the OWASP Ruleset and Rate Limiting. Your filters [will reference the lists directly](/waf/tools/lists/use-in-expressions/), meaning a cleaner and maintainable configuration.
121121

src/content/docs/reference-architecture/diagrams/ai/bigquery-workers-ai.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ updated: 2024-10-26
1818

1919
## Introduction
2020

21-
You can connect a Cloudflare Worker to get data from Google BigQuery and pass it to Workers AI, to run AI Models, powered by serverless GPUs. This will allow you to enhance data with AI-generated responses, such as detecting the sentiment score of some text or generating tags for an article. This document describes a simple way to get started if you are looking to give Workers AI a try and see how the [new and different AI models](/workers-ai/models/) would perform with your data hosted in BigQuery.
21+
You can connect a Cloudflare Worker to get data from Google BigQuery and pass it to Workers AI, to run AI Models, powered by serverless GPUs. This will allow you to enhance data with AI-generated responses, such as detecting the sentiment score of some text or generating tags for an article. This document describes a simple way to get started if you are looking to give Workers AI a try and see how the [new and different AI models](/workers-ai/models/) would perform with your data hosted in BigQuery.
2222

2323
## User-based approach
2424

@@ -46,7 +46,7 @@ For periodic or longer workflows, you may opt for a batch approach. This diagram
4646
* Into [D1](/d1/), a SQL database.
4747
* If in step four you used Workers AI to generate embeddings, you can store them in [Vectorize](/vectorize/). To learn more about this type of solution, please consider reviewing the reference architecture diagram on [Retrieval Augmented Generation](/reference-architecture/diagrams/ai/ai-rag/).
4848
* To [Workers KV](/kv/) if the output of your data will be stored and consumed in a key/value fashion.
49-
* If you prefer to save the data fetched from BigQuery and Workers AI into objects (such as images, files, JSONs), you can use [R2](/r2/), our egress-free object storage to do so.
49+
* If you prefer to save the data fetched from BigQuery and Workers AI into objects (such as images, files, JSONs), you can use [R2](/r2/), our egress-free object storage to do so.
5050
6. You can set up an integration so a system or a user gets notified whenever a new result is available or if an error occurs. It's also worth mentioning that Workers by themselves can already provide additional [observability](/workers/observability/).
5151
* Sending an email with all the data retrieved and generated in the previous step is possible using [Email Routing](/email-routing/email-workers/send-email-workers/).
5252
* Since Workers allows you to issue HTTP requests, you can notify a webhook or API endpoint once the process finishes or if there's an error.
@@ -59,10 +59,10 @@ For periodic or longer workflows, you may opt for a batch approach. This diagram
5959
- [Workers: Cron Triggers](/workers/runtime-apis/handlers/scheduled/)
6060
- [Email Routing](/email-routing/email-workers/send-email-workers/)
6161
- [Create a GCP service account](https://cloud.google.com/iam/docs/service-accounts-create#iam-service-accounts-create-console)
62-
- [Create a GCP service account key](https://cloud.google.com/iam/docs/keys-create-delete#iam-service-account-keys-create-console)
62+
- [Create a GCP service account key](https://cloud.google.com/iam/docs/keys-create-delete#iam-service-account-keys-create-console)
6363
- [Retrieval Augmented Generation (RAG) Reference Architecture](/reference-architecture/diagrams/ai/ai-rag/)
64-
- [Vectorize](/vectorize/)
65-
- [Workers KV](/kv/)
66-
- [R2](/r2/)
67-
- [D1](/d1/)
64+
- [Vectorize](/vectorize/)
65+
- [Workers KV](/kv/)
66+
- [R2](/r2/)
67+
- [D1](/d1/)
6868

src/content/docs/reference-architecture/diagrams/network/bring-your-own-ip-space-to-cloudflare.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ For example, partners or other B2B relationships may use the public IP space own
2222

2323
The default behavior when a DNS query is made to a Cloudflare proxied hostname will be to return one of Cloudflare's [default anycast IP addresses](https://www.cloudflare.com/ips/). The traffic is then accelerated, protected, and, if not served by Cloudflare cache, sent to the customer's origin server.
2424

25-
In the diagram below, instead of the default behavior, traffic will proxy through Cloudflare's application services platform but DNS queries will return an IP address that is owned by the customer while also benefiting from Cloudflare's anycast network.
25+
In the diagram below, instead of the default behavior, traffic will proxy through Cloudflare's application services platform but DNS queries will return an IP address that is owned by the customer while also benefiting from Cloudflare's anycast network.
2626

2727
There are two different network ranges used in this example:
2828

src/content/docs/reference-architecture/diagrams/sase/augment-access-with-serverless.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ import { RelatedProduct, LinkCard} from "~/components";
1414

1515
## Introduction
1616

17-
Companies using Zero Trust Network Access (ZTNA) services build policies to determine if a user can access a protected resource such as a privately hosted Wiki server or source code repository. Policies typically use group membership, authentication methods, device security posture to determine which users can access which resources.
17+
Companies using Zero Trust Network Access (ZTNA) services build policies to determine if a user can access a protected resource such as a privately hosted Wiki server or source code repository. Policies typically use group membership, authentication methods, device security posture to determine which users can access which resources.
1818

19-
Secure access requires a range of attributes being available to the policy engine for evaluation. With Cloudflare's ZTNA service, [Access](/cloudflare-one/policies/access/), it is possible to include in the policy an external request to another API that provides part of the data required for the access decision.
19+
Secure access requires a range of attributes being available to the policy engine for evaluation. With Cloudflare's ZTNA service, [Access](/cloudflare-one/policies/access/), it is possible to include in the policy an external request to another API that provides part of the data required for the access decision.
2020

2121
For example, you might have a policy which states all members of the group "Engineers", who have authenticated with credentials that required a hard token, can have access to the self-hosted source code repository. But you also want to only allow engineers who have completed security training. That data might be available in another system, so Cloudflare allows you to, as part of the policy check, make a call using [Workers](https://workers.cloudflare.com/) to the training system to determine if this user has passed security training.
2222

@@ -64,7 +64,7 @@ The code typically makes calls to either a [database](/d1/) or another API to ev
6464

6565
### 2. Analyze and validate the authentication material (JWT)
6666

67-
When a user successfully authenticates and is authorized to access a protected application, Cloudflare inserts a [JSON Web Token (JWT)](/cloudflare-one/identity/authorization-cookie/validating-json/) into the HTTP traffic sent to the origin. This token serves as a valuable asset for expanding custom business logic through secure processing. The format for that JWT is deterministic and rather lightweight to avoid overloading the requests towards origin unnecessarily.
67+
When a user successfully authenticates and is authorized to access a protected application, Cloudflare inserts a [JSON Web Token (JWT)](/cloudflare-one/identity/authorization-cookie/validating-json/) into the HTTP traffic sent to the origin. This token serves as a valuable asset for expanding custom business logic through secure processing. The format for that JWT is deterministic and rather lightweight to avoid overloading the requests towards origin unnecessarily.
6868

6969
Here is an example of a JWT sent to an origin (use [JWT.io](http://jwt.io) to read the contents of a JWT)
7070

src/content/docs/reference-architecture/diagrams/serverless/programmable-platforms.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ For many use cases, it makes sense to retrieve additional metadata, user data, o
6060

6161
![Figure 3: Workers for Platforms: Egress Control](~/assets/images/reference-architecture/programmable-platforms/programmable-platforms-3.svg "Figure 3: Workers for Platforms: Egress Control")
6262

63-
Data observability and control is crucial for security. [Outbound Workers](/cloudflare-for-platforms/workers-for-platforms/configuration/outbound-workers/) allow for interception of all outgoing requests in User Worker scripts.
63+
Data observability and control is crucial for security. [Outbound Workers](/cloudflare-for-platforms/workers-for-platforms/configuration/outbound-workers/) allow for interception of all outgoing requests in User Worker scripts.
6464

6565
1. **Worker Invocation**: Route requests to the appropriate User Worker in the Dispatch Namespace. Optionally pass additional parameters to the Outbound Worker during User Worker invocation.
6666

0 commit comments

Comments
 (0)