You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/dedibox-kvm-over-ip/concepts.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ KVM Over IP is a hardware-based solution that enables remote access to the **k**
12
12
13
13
## iDRAC
14
14
15
-
The **I**ntegrated **D**ell **R**emote **A**ccess **C**controller is the hardware allowing KVM Over IP and other management and monitoring features for Dell servers.
15
+
The **I**ntegrated **D**ell **R**emote **A**ccess **C**ontroller is the hardware allowing KVM Over IP and other management and monitoring features for Dell servers.
Copy file name to clipboardExpand all lines: pages/dedibox-kvm-over-ip/quickstart.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ import image from './assets/scaleway-idrac.webp'
11
11
importimage2from'./assets/scaleway-ilo.webp'
12
12
13
13
14
-
An **I**ntelligent **P**latform **M**anagement **I**nterface (IPMI) is an industry standard to describe the subsystem of a server providing remote management and monitoring capabilities. IPMI allows you to manage and monitor a server even if it is powered off or unresponsive, by using a network connection to the hardware. IPMI is made possible by the **B**aseboard **M**anagement **C**controller, an independent piece of hardware connected to your network card, composed of an I2C bus and a dedicated processor.
14
+
An **I**ntelligent **P**latform **M**anagement **I**nterface (IPMI) is an industry standard to describe the subsystem of a server providing remote management and monitoring capabilities. IPMI allows you to manage and monitor a server even if it is powered off or unresponsive, by using a network connection to the hardware. IPMI is made possible by the **B**aseboard **M**anagement **C**ontroller, an independent piece of hardware connected to your network card, composed of an I2C bus and a dedicated processor.
15
15
16
16
Some examples of features that can be remotely monitored via the IPMI include:
17
17
@@ -37,7 +37,7 @@ In this document, we show you how to access the IPMI for a Dell or HP server. Se
37
37
38
38
## How to use IPMI via Dell iDRAC
39
39
40
-
IPMI is a standard specification for a remote management subsystem. On a Dell server, IPMI is realized through the iDRAC: the **I**ntegrated **D**ell **R**emote **A**ccess **C**controller.
40
+
IPMI is a standard specification for a remote management subsystem. On a Dell server, IPMI is realized through the iDRAC: the **I**ntegrated **D**ell **R**emote **A**ccess **C**ontroller.
41
41
42
42
1. From the console, click **Server** > **Server list**. A list of your servers displays.
43
43
2. Click **Manage** next to the relevant server.
@@ -56,9 +56,9 @@ IPMI is a standard specification for a remote management subsystem. On a Dell se
56
56
- The **iDDRAC** tabs show you information about the iDRAC itself.
57
57
- Click the other relevant links on the left sidebar to see information about **Batteries**, **Temperatures**, **Voltages** etc., as required.
58
58
59
-
## How to use IPMI via HOPE iLO
59
+
## How to use IPMI via HPE iLO
60
60
61
-
IPMI is a standard specification for a remote management subsystem. On an HOPE server, IPMI is realized through the ILO: the **I**ntegrated **L**ights **O**ut processor.
61
+
IPMI is a standard specification for a remote management subsystem. On an HPE server, IPMI is realized through the ILO: the **I**ntegrated **L**ights **O**ut processor.
62
62
63
63
1. From the console, click **Server** > **Server list**. A list of your servers displays.
Copy file name to clipboardExpand all lines: pages/dedibox/how-to/use-ipmi-on-server.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ import image from './assets/scaleway-idrac.webp'
12
12
importimage2from'./assets/scaleway-ilo.webp'
13
13
14
14
15
-
An **I**ntelligent **P**latform **M**anagement **I**nterface (IPMI) is an industry standard to describe the subsystem of a server providing remote management and monitoring capabilities. IPMI gives you a way to manage and monitor a server even if it is powered off or unresponsive, by using a network connection to the hardware. IPMI is made possible by the **B**aseboard **M**anagement **C**controller, an independent piece of hardware connected to your network card, composed of an I2C bus and a dedicated processor.
15
+
An **I**ntelligent **P**latform **M**anagement **I**nterface (IPMI) is an industry standard to describe the subsystem of a server providing remote management and monitoring capabilities. IPMI gives you a way to manage and monitor a server even if it is powered off or unresponsive, by using a network connection to the hardware. IPMI is made possible by the **B**aseboard **M**anagement **C**ontroller, an independent piece of hardware connected to your network card, composed of an I2C bus and a dedicated processor.
16
16
17
17
Some examples of features that can be remotely monitored via the IPMI include:
18
18
@@ -38,7 +38,7 @@ In this document, we show you how to access the IPMI for a Dell or HP server. Se
38
38
39
39
## How to use IPMI via Dell iDRAC
40
40
41
-
IPMI is a standard specification for a remote management subsystem. On a Dell server, IPMI is realized through the iDRAC: the **I**ntegrated **D**ell **R**emote **A**ccess **C**controller.
41
+
IPMI is a standard specification for a remote management subsystem. On a Dell server, IPMI is realized through the iDRAC: the **I**ntegrated **D**ell **R**emote **A**ccess **C**ontroller.
42
42
43
43
1. From the console, click **Server** > **Server list**. A list of your servers displays.
Copy file name to clipboardExpand all lines: pages/edge-services/concepts.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,4 +79,4 @@ The protocol (HTTP or HTTPS) that the Edge Services pipeline should use when sen
79
79
80
80
## WAF
81
81
82
-
An Edge Services **W**eb **A**application**F**irewall (WAF) evaluates requests to your origin to determine whether they are potentially malicious. You can set the [paranoia level](#paranoia-level) to be used when evaluating requests. Requests that are judged to be malicious are then blocked or logged, depending on the settings you choose. Find out more about [configuring a WAF](/edge-services/how-to/configure-waf/).
82
+
An Edge Services **W**eb **A**pplication**F**irewall (WAF) evaluates requests to your origin to determine whether they are potentially malicious. You can set the [paranoia level](#paranoia-level) to be used when evaluating requests. Requests that are judged to be malicious are then blocked or logged, depending on the settings you choose. Find out more about [configuring a WAF](/edge-services/how-to/configure-waf/).
Copy file name to clipboardExpand all lines: pages/edge-services/faq.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Edge Services is a feature for Scaleway Load Balancers and Object Storage bucket
22
22
23
23
### What is WAF?
24
24
25
-
**W**eb **A**application**F**irewall is a feature available via Edge Services. When enabled, WAF filters requests to your origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that should not be filtered by WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose. Find out more about WAF in our [detailed documentation](/edge-services/reference-content/understanding-waf/).
25
+
**W**eb **A**pplication**F**irewall is a feature available via Edge Services. When enabled, WAF filters requests to your origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that should not be filtered by WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose. Find out more about WAF in our [detailed documentation](/edge-services/reference-content/understanding-waf/).
An Edge Services **W**eb **A**application**F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that shouldn't be filtered by WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose.
16
+
An Edge Services **W**eb **A**pplication**F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that shouldn't be filtered by WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose.
17
17
18
18
This page walks you through the process of enabling and configuring WAF to protect your Load Balancer origin.
Copy file name to clipboardExpand all lines: pages/edge-services/how-to/create-pipeline-lb.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ You can create an Edge Services pipeline from the Load Balancer section of the c
53
53
54
54
6. Optionally, configure **Advanced Settings:**
55
55
-**Cache**: When enabled, content from your Load Balancer origin is cached with Edge Services and served directly to users from Edge Services' servers. Set a **Lifetime** value, in seconds, to dictate how long objects should remain in the cache before being freshly retrieved from the origin. [Find out more about caching](/edge-services/how-to/configure-cache/).
56
-
-**WAF**: When enabled, requests to your Load Balancer origin are evaluated by a **W**eb **A**application**F**irewall. Malicious requests are blocked or logged, depending on your settings. Set a paranoia level to determine WAF's aggressivity, and a mode (block or log) for dealing with malicious requests. [Find out more about WAF](/edge-services/reference-content/understanding-waf/).
56
+
-**WAF**: When enabled, requests to your Load Balancer origin are evaluated by a **W**eb **A**pplication**F**irewall. Malicious requests are blocked or logged, depending on your settings. Set a paranoia level to determine WAF's aggressivity, and a mode (block or log) for dealing with malicious requests. [Find out more about WAF](/edge-services/reference-content/understanding-waf/).
57
57
58
58
The summary cost for the creation of this pipeline is displayed, notably whether it falls within the limits of your current [subscription plan](/edge-services/reference-content/understanding-pricing/)
Copy file name to clipboardExpand all lines: pages/edge-services/quickstart.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ You can create [pipelines](/edge-services/concepts/#pipeline) for either Object
82
82
83
83
7. Optionally, configure **Advanced Settings:**
84
84
-**Cache**: When enabled, content from your Load Balancer origin is cached with Edge Services and served directly to users from Edge Services' servers. Set a **Lifetime** value, in seconds, to dictate how long objects should remain in the cache before being freshly retrieved from the origin. [Find out more about caching](/edge-services/how-to/configure-cache/).
85
-
-**WAF**: When enabled, requests to your Load Balancer origin are evaluated by a **W**eb **A**application**F**irewall. Malicious requests are blocked or logged, depending on your settings. Set a paranoia level to determine WAF's aggressivity, and a mode (block or log) for dealing with malicious requests. [Find out more about WAF](/edge-services/reference-content/understanding-waf/).
85
+
-**WAF**: When enabled, requests to your Load Balancer origin are evaluated by a **W**eb **A**pplication**F**irewall. Malicious requests are blocked or logged, depending on your settings. Set a paranoia level to determine WAF's aggressivity, and a mode (block or log) for dealing with malicious requests. [Find out more about WAF](/edge-services/reference-content/understanding-waf/).
86
86
87
87
8. Check the summary cost for the pipeline, and click **Create Edge Services pipeline**.
88
88
@@ -178,7 +178,7 @@ Your customized domain is set up, and you are returned to the Edge Services dash
178
178
179
179
## How to configure caching and WAF
180
180
181
-
Enabling a cache and/or a **W**eb **A**application**F**irewall on your Edge Services pipeline are both optional steps.
181
+
Enabling a cache and/or a **W**eb **A**pplication**F**irewall on your Edge Services pipeline are both optional steps.
182
182
183
183
- Enabling a **cache** means that Edge Services stores copies of files from your origin, and can serve them directly to users from this cache rather then fetching them freshly from your bucket or Load Balancer origin each time. This reduces load on your origin and can improve performance. [Find out how to configure a cache](/edge-services/how-to/configure-cache/)
You can choose to enable the **W**eb **A**application**F**irewall (WAF) feature on your Edge Services pipeline, for added protection. This documentation page gives a detailed overview of WAF, and the different settings, modes and functionalities available.
13
+
You can choose to enable the **W**eb **A**pplication**F**irewall (WAF) feature on your Edge Services pipeline, for added protection. This documentation page gives a detailed overview of WAF, and the different settings, modes and functionalities available.
0 commit comments