Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions src/content/docs/waf/rate-limiting-rules/best-practices.mdx
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: Rate limiting practices
title: Rate limiting best practices
pcx_content_type: configuration
sidebar:
order: 21
Expand Down Expand Up @@ -415,4 +415,4 @@ When the origin server processes a request, it adds a `score` HTTP header to the

API Shield customers can use GraphQL malicious query protection to protect their GraphQL APIs. GraphQL malicious query protection scans your GraphQL traffic for queries that could overload your origin and result in a denial of service. You can build rules that limit the query depth and size of incoming GraphQL queries in order to block suspiciously large or complex queries.

Refer to [API Shield documentation](https://developers.cloudflare.com/api-shield/security/graphql-protection/) for more information on GraphQL malicious query protection.
Refer to [API Shield documentation](https://developers.cloudflare.com/api-shield/security/graphql-protection/) for more information on GraphQL malicious query protection.
Loading