diff --git a/src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx b/src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx
index 813fc7d37cbc013..49d78683398a3a8 100644
--- a/src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx
+++ b/src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx
@@ -35,7 +35,7 @@ For more information on deploying and configuring rulesets using the Rulesets AP
## Example: Configure HTTP DDoS Attack Protection
-This example configures the [HTTP DDoS Attack Protection](/ddos-protection/managed-rulesets/http/) managed ruleset for a zone using Terraform, changing the sensitivity level of rule with ID to `low`.
+This example configures the [HTTP DDoS Attack Protection](/ddos-protection/managed-rulesets/http/) managed ruleset for a zone using Terraform.
@@ -48,21 +48,36 @@ resource "cloudflare_ruleset" "zone_level_http_ddos_config" {
phase = "ddos_l7"
rules {
- ref = "override_l7_ddos_ruleset_all"
- description = "Override the HTTP DDoS Attack Protection managed ruleset"
- expression = "true"
- action = "execute"
+ action = "execute"
action_parameters {
# Cloudflare L7 DDoS Attack Protection Ruleset
id = "4d21379b4f9f4bb088e0729962c8b3cf"
overrides {
+ action = "block"
+ sensitivity_level = "default"
rules {
- # Rule: HTTP requests with unusual HTTP headers or URI path (signature #11).
- id = "fdfdac75430c4c47a959592f0aa5e68a"
- sensitivity_level = "low"
+ # Adaptive DDoS Protection based on Locations (Available only to Enterprise zones with Advanced DDoS service)
+ id = "a8c6333711ff4b0a81371d1c444be2c3"
+ sensitivity_level = "default"
+ action = "managed_challenge"
+ }
+ rules {
+ # Adaptive DDoS Protection based on User-Agents (Available only to Enterprise zones with Advanced DDoS service)
+ id = "7709d496081e458899c1e3a6e4fe8e55"
+ sensitivity_level = "default"
+ action = "managed_challenge"
+ }
+ rules {
+ # HTTP requests causing a high number of origin errors.
+ id = "dd42da7baabe4e518eaf11c393596a9d"
+ sensitivity_level = "default"
+ action = "managed_challenge"
}
}
}
+ expression = "true"
+ description = "Zone-wide HTTP DDoS Override"
+ enabled = true
}
}
```