You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Edge Services is a feature for Scaleway Load Balancers and Object Storage buckets. Creating Edge Services [pipelines](/edge-services/concepts/#pipeline) towards your Load Balancers or Object Storage buckets provides:
16
16
-A [caching service](/edge-services/how-to/configure-cache/) to improve performance by reducing load on your [origin](/edge-services/concepts/#origin), and
17
+
- A [Web Application Firewall](/edge-services/how-to/configure-waf/) to protect your origin from threats and malicious activity, and
17
18
- A customizable and secure endpoint for accessing content via Edge Services, which can be set to a subdomain of your choice and secured with an SSL/TLS certificate.
18
19
19
-
<Lightboxsrc="scaleway-edge-services-pipeline.webp"alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer" />
20
+
<Lightboxsrc="scaleway-edge-services-pipeline.webp"alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer. A Web Application Firewall sits between the cache and origin, protecting the origin from threats." />
20
21
21
22
## Which products are compatible with Edge Services?
Copy file name to clipboardExpand all lines: pages/edge-services/concepts.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ The endpoint can be customized with a user-defined subdomain, allowing you to re
42
42
43
43
## Exclusions
44
44
45
-
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), exclusions let you define filters for requests that should not be evaluated by the WAF, but rather pass straight to the Load Balancer origin. Learn more about [creating exclusions](TODO)
45
+
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), exclusions let you define filters for requests that should not be evaluated by WAF, but rather pass straight to the Load Balancer origin. Learn more about [creating exclusions](/edge-services/how-to/configure-waf/#how-to-set-exclusions)
46
46
47
47
## Origin
48
48
@@ -63,7 +63,7 @@ The Load Balancer defined by the user as origin for a given Edge Services pipeli
63
63
64
64
## Paranoia level
65
65
66
-
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), the paranoia level determines how sensitive the request-evaluation mechanism is to potential threats. Four paranoia levels are available, with level 1 being the least sensitive, and level 4 being the most sensitive. The higher the paranoia level, the more likely it is that a given request will be judged to be malicious. For full details on paranoia levels, see [TODO](todo).
66
+
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), the paranoia level determines how sensitive the request-evaluation mechanism is to potential threats. Four paranoia levels are available, with level 1 being the least sensitive, and level 4 being the most sensitive. The higher the paranoia level, the more likely it is that a given request will be judged to be malicious. For full details on paranoia levels, see our [detailed documentation](/edge-services/reference-content/understanding-waf/#waf-ruleset-and-paranoia-levels).
67
67
68
68
## Pipeline
69
69
@@ -79,4 +79,4 @@ The protocol (HTTP or HTTPS) that the Edge Services pipeline should use when sen
79
79
80
80
## WAF
81
81
82
-
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can set the [paranoia level](#paranoia-level) to be used when evaluating requests. Requests that are judged to be malicious are then blocked or logged, depending on the settings you choose. Find out more about [configuring a WAF](/edge-services/how-to/configure-waf/).
82
+
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can set the [paranoia level](#paranoia-level) to be used when evaluating requests. Requests that are judged to be malicious are then blocked or logged, depending on the settings you choose. Find out more about [configuring WAF](/edge-services/how-to/configure-waf/).
Copy file name to clipboardExpand all lines: pages/edge-services/how-to/configure-waf.mdx
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,10 +13,12 @@ categories:
13
13
- network
14
14
---
15
15
16
-
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that shouldn't be filtered by the WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose.
16
+
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that shouldn't be filtered by WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose.
17
17
18
18
This page walks you through the processing of enabling and configuring WAF to protect your Load Balancer origin.
19
19
20
+
To read more about how WAF works, try our [Understanding WAF](/edge-services/reference-content/understanding-waf/) page.
21
+
20
22
<Messagetype="note">
21
23
WAF is not available for Object Storage bucket origins.
22
24
</Message>
@@ -39,10 +41,10 @@ WAF is not available for Object Storage bucket origins.
39
41
40
42
TODO SCREENSHOT
41
43
42
-
3. Choose the **paranoia level**, from 1 - 4, that is best adapted to your use case. The higher the paranoia level, the more sensitive WAF is to potential threats, and the more likely it is to class a request as malicious. For help with choosing a paranoia level, see our [dedicated documentation](TODO).
44
+
3. Choose the **paranoia level**, from 1 - 4, that is best adapted to your use case. The higher the paranoia level, the more sensitive WAF is to potential threats, and the more likely it is to class a request as malicious. For help with choosing a paranoia level, see our [dedicated documentation](/edge-services/reference-content/understanding-waf/#waf-ruleset-and-paranoia-levels).
43
45
44
46
<Messagetype="tip">
45
-
After enabling WAF, you will be able to [set exclusions](TODO) that filter out requests matching certain criteria from being evaluated by WAF.
47
+
After enabling WAF, you will be able to [set exclusions](#how-to-set-exclusions) that filter out requests matching certain criteria from being evaluated by WAF.
46
48
</Message>
47
49
48
50
4. Select a WAF **mode**. Requests judged to be malicious can either be **blocked** and prevented from passing to the Load Balancer origin, or **logged** but allowed to pass.
@@ -68,13 +70,13 @@ Once you have enabled WAF, you can choose to set **exclusions**. Exclusions are
68
70
<Lightboxsrc="scaleway-add-exclusions.webp"alt="A screenshot of the Add exclusions popup in the Scaleway console, with an 'if' box to set a path regex value, and a 'then' box pre-filled to 'Bypass WAF'" /> TODO CHANGE NEW BUTTON?
69
71
70
72
3. Set up to two filters for this exclusion. You can add either:
71
-
- One ***Path regex** filter, to match paths of requests to exclude. For example, TODO
72
-
- One **HTTP method** filter, to match te HTTP methods of requests to exclude. For example, enter one or more of `GET`, `PATCH`, `PUT`, `DELETE` etc. Requests that match any of these methods will be considered to match the HTTP method filter.
73
-
- One of each of the above (use the **Add filter** button to add the second filter)
73
+
- One ***Path regex** filter, to match paths of requests to exclude. For example, `/api/v1/.*`
74
+
- One **HTTP method** filter, to match te HTTP methods of requests to exclude. For example, enter one or more of `GET`, `PATCH`, `PUT`, `DELETE` etc. Requests that match any of these methods will be considered to match the HTTP method filter.
75
+
- One of each of the above (use the **Add filter** button to add the second filter)
74
76
75
-
If you include both a path regex and an HTTP method filter in the same exclusion, requests must match both of the filters in order to be excluded.
77
+
If you include both a path regex and an HTTP method filter in the same exclusion, requests must match both of the filters in order to be excluded.
76
78
77
-
Currently, the only action possible to set for matching requests is **Bypass WAF** (matching requests will not be evaluated by WAF and will proceed directly to the Load Balancer origin.) In the future, more actions will be added.
79
+
Currently, the only action possible to set for matching requests is **Bypass WAF** (matching requests will not be evaluated by WAF and will proceed directly to the Load Balancer origin.) In the future, more actions will be added.
78
80
79
81
4. Click **Add** to add the exclusion.
80
82
@@ -94,7 +96,7 @@ Once you have enabled WAF, you can choose to set **exclusions**. Exclusions are
94
96
95
97
4. Click **Confirm** when you have finished editing.
96
98
97
-
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
99
+
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
98
100
99
101
5. Continue to edit or delete other exclusions as necessary.
100
102
@@ -110,7 +112,7 @@ Once you have enabled WAF, you can choose to set **exclusions**. Exclusions are
110
112
111
113
3. Click **Delete**.
112
114
113
-
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
115
+
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
114
116
115
117
4. Continue to edit or delete other exclusions as necessary.
Copy file name to clipboardExpand all lines: pages/edge-services/how-to/subscribe-edge-services.mdx
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ content:
6
6
h1: How to subscribe to Edge Services
7
7
paragraph: Find out how to take your first steps with Scaleway Edge Services by subscribing to a pricing plan. Learn how to choose the best plan for your needs and change your plan at the click of a button.
@@ -19,6 +19,7 @@ To use Edge Services, you must subscribe to a [pricing plan](https://www.scalewa
19
19
20
20
- A fixed number of Edge Services [pipelines](/edge-services/concepts/#pipeline). You can create pipelines for either Load Balancers, Object Storage buckets, or a mixture of both, with your subscription plan.
21
21
- A certain amount of egress [cache](/edge-services/concepts/#cache) data (the quantity of data transferred from Edge Services' caches, not including the transfer from the origin bucket or Load Balancer).
22
+
- TODO
22
23
- A custom domain and SSL certificate (managed or custom) for each pipeline.
23
24
24
25
If you create more pipelines than are included in your plan, or your pipelines' caches egress more data than is included, you will be charged additionally for this. The rates per pipeline/GB of data are indicated on the [pricing](https://www.scaleway.com/en/pricing/network/#edge-services) page.
Copy file name to clipboardExpand all lines: pages/edge-services/reference-content/understanding-waf.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ You can set **exclusions**, so that certain requests are not evaluated by WAF an
31
31
32
32
In an Edge Services pipeline, WAF sits before the origin stage. This means that WAF only protects your origin, it does not protect or filter requests towards the cache.
33
33
34
-
<Lightboxsrc="scaleway-edge-services-pipeline.webp"alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer. A Web Application Firewall sits between the cache and origin, protecting the origin from threats." />
34
+
<Lightboxsrc="scaleway-edge-services-pipeline-diag.webp"alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer. A Web Application Firewall sits between the cache and origin, protecting the origin from threats." />
35
35
36
36
If you have both WAF and cache enabled, requests that can be served by the cache will not go through WAF. Only requests that cannot be served by the cache will be filtered by WAF, and allowed to pass to the origin or not depending on your WAF configuration.
0 commit comments