diff --git a/src/content/docs/terraform/additional-configurations/rate-limiting-rules.mdx b/src/content/docs/terraform/additional-configurations/rate-limiting-rules.mdx index 317ae6563f652d3..e563eac8ccfcb58 100644 --- a/src/content/docs/terraform/additional-configurations/rate-limiting-rules.mdx +++ b/src/content/docs/terraform/additional-configurations/rate-limiting-rules.mdx @@ -13,8 +13,12 @@ import { Details, Render } from "~/components"; This page provides examples of creating [rate limiting rules](/waf/rate-limiting-rules/) in a zone or account using Terraform. -:::note +If you are using the Cloudflare API, refer to the following resources: + +- [Create a rate limiting rule via API](/waf/rate-limiting-rules/create-api/) +- [Create a rate limiting ruleset via API](/waf/account/rate-limiting-rulesets/create-api/) +:::note For more information on configuring the previous version of rate limiting rules in Terraform, refer to the [`cloudflare_rate_limit` resource](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/rate_limit) in the Terraform documentation. ::: diff --git a/src/content/docs/terraform/additional-configurations/waf-custom-rules.mdx b/src/content/docs/terraform/additional-configurations/waf-custom-rules.mdx index e7ad62897d76814..a5d749a08b5ad80 100644 --- a/src/content/docs/terraform/additional-configurations/waf-custom-rules.mdx +++ b/src/content/docs/terraform/additional-configurations/waf-custom-rules.mdx @@ -18,6 +18,13 @@ This page provides examples of creating [WAF custom rules](/waf/custom-rules/) i The WAF documentation includes additional Terraform examples — refer to [More resources](#more-resources). +If you are using the Cloudflare API, refer to the following resources in the WAF documentation: + +- [Create a custom rule via API](/waf/custom-rules/create-api/) +- [Create a custom ruleset using the API](/waf/account/custom-rulesets/create-api/) + +For more information on deploying and configuring custom rulesets using the Rulesets API, refer to [Work with custom rulesets](/ruleset-engine/custom-rulesets/) in the Ruleset Engine documentation. + ## Before you start ### Obtain the necessary account or zone IDs diff --git a/src/content/docs/terraform/additional-configurations/waf-managed-rulesets.mdx b/src/content/docs/terraform/additional-configurations/waf-managed-rulesets.mdx index 8e29291ae9438ea..3b95c9112bf9d41 100644 --- a/src/content/docs/terraform/additional-configurations/waf-managed-rulesets.mdx +++ b/src/content/docs/terraform/additional-configurations/waf-managed-rulesets.mdx @@ -20,7 +20,12 @@ This page provides examples of deploying and configuring [WAF Managed Rules](/wa - [Configure overrides](#configure-overrides) - [Configure the OWASP paranoia level, score threshold, and action](#configure-the-owasp-paranoia-level-score-threshold-and-action) -For more information on deploying and configuring rulesets using the Rulesets API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation. +If you are using the Cloudflare API, refer to the following resources: + +- [Deploy a WAF managed ruleset via API](/waf/managed-rules/deploy-api/) +- [Deploy a WAF managed ruleset via API (account)](/waf/account/managed-rulesets/deploy-api/) + +For more information on deploying and configuring managed rulesets using the Rulesets API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation. ## Before you start diff --git a/src/content/docs/waf/account/custom-rulesets/create-api.mdx b/src/content/docs/waf/account/custom-rulesets/create-api.mdx index e128331094a6b9e..7a588ee5de00872 100644 --- a/src/content/docs/waf/account/custom-rulesets/create-api.mdx +++ b/src/content/docs/waf/account/custom-rulesets/create-api.mdx @@ -17,6 +17,8 @@ This feature requires an Enterprise plan with a paid add-on. To deploy custom rules at the account level, you must create a custom ruleset with one or more rules. Use the [Rulesets API](/ruleset-engine/rulesets-api/) to work with custom rulesets using the API. +If you are using Terraform, refer to [WAF custom rules configuration using Terraform](/terraform/additional-configurations/waf-custom-rules/#create-and-deploy-a-custom-ruleset). + ## Procedure To deploy a custom ruleset in your account, follow these general steps: diff --git a/src/content/docs/waf/account/managed-rulesets/deploy-api.mdx b/src/content/docs/waf/account/managed-rulesets/deploy-api.mdx index 9c43e56f9bed536..f6f2841cbed05f2 100644 --- a/src/content/docs/waf/account/managed-rulesets/deploy-api.mdx +++ b/src/content/docs/waf/account/managed-rulesets/deploy-api.mdx @@ -19,6 +19,8 @@ Use the [Rulesets API](/ruleset-engine/rulesets-api/) to deploy a WAF managed ru The [WAF Managed Rules](/waf/managed-rules/#managed-rulesets) page includes the IDs of the different WAF managed rulesets. You will need this information when deploying rulesets via API. +If you are using Terraform, refer to [WAF Managed Rules configuration using Terraform](/terraform/additional-configurations/waf-managed-rulesets/#deploy-managed-rulesets-at-the-account-level). + ## Example diff --git a/src/content/docs/waf/account/rate-limiting-rulesets/create-api.mdx b/src/content/docs/waf/account/rate-limiting-rulesets/create-api.mdx index 944583b668ffe48..666d12534500cf0 100644 --- a/src/content/docs/waf/account/rate-limiting-rulesets/create-api.mdx +++ b/src/content/docs/waf/account/rate-limiting-rulesets/create-api.mdx @@ -19,6 +19,8 @@ At the API level, a rate limiting ruleset is a regular [custom ruleset](/waf/acc Each rate limiting rule contains a `ratelimit` object with the rate limiting configuration. Refer to [Rate limiting parameters](/waf/rate-limiting-rules/parameters/) for more information on this object and its parameters. +If you are using Terraform, refer to [Rate limiting rules configuration using Terraform](/terraform/additional-configurations/rate-limiting-rules/#create-a-rate-limiting-rule-at-the-account-level). + ## Procedure To deploy a rate limiting ruleset in your account, follow these general steps: diff --git a/src/content/docs/waf/custom-rules/create-api.mdx b/src/content/docs/waf/custom-rules/create-api.mdx index 6555d63d8dd2d24..b419179191d0251 100644 --- a/src/content/docs/waf/custom-rules/create-api.mdx +++ b/src/content/docs/waf/custom-rules/create-api.mdx @@ -16,6 +16,8 @@ Use the [Rulesets API](/ruleset-engine/rulesets-api/) to create a custom rule vi You must deploy custom rules to the `http_request_firewall_custom` [phase entry point ruleset](/ruleset-engine/about/rulesets/#entry-point-ruleset). +If you are using Terraform, refer to [WAF custom rules configuration using Terraform](/terraform/additional-configurations/waf-custom-rules/). + ## Create a custom rule diff --git a/src/content/docs/waf/rate-limiting-rules/create-api.mdx b/src/content/docs/waf/rate-limiting-rules/create-api.mdx index 3ec1a70f62a5038..e74e12f042395e2 100644 --- a/src/content/docs/waf/rate-limiting-rules/create-api.mdx +++ b/src/content/docs/waf/rate-limiting-rules/create-api.mdx @@ -19,6 +19,8 @@ You must deploy rate limiting rules to the `http_ratelimit` [phase entry point r Rate limiting rules must appear at the end of the rules list. +If you are using Terraform, refer to [Rate limiting rules configuration using Terraform](/terraform/additional-configurations/rate-limiting-rules/). + ## Create a rate limiting rule