Skip to content

Commit d01cdb5

Browse files
authored
[Ruleset Engine] Add glossary entry (#29138)
1 parent 491e365 commit d01cdb5

File tree

3 files changed

+22
-7
lines changed

3 files changed

+22
-7
lines changed

src/content/docs/bots/additional-configurations/custom-rules.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ description: >-
88
Settings versus creating WAF custom rules for bot management.
99
---
1010

11-
import { Render } from "~/components";
11+
import { GlossaryTooltip, Render } from "~/components";
1212

1313
Bot protection on Cloudflare works through two complementary mechanisms: built-in settings configured through toggles in **Security Settings**, and [WAF custom rules](/waf/custom-rules/) that you write using [bot management fields](/bots/reference/bot-management-variables/). Understanding when to use each approach helps you avoid creating duplicate rules and simplifies your security configuration.
1414

@@ -36,7 +36,7 @@ Custom rules are valuable when you need capabilities that built-in settings do n
3636

3737
Since Bot settings apply to all traffic across your domain, you may need an alternative approach to bot handling for different paths using custom rules — for example, stricter protection on `/login/` than on `/public/`.
3838

39-
#### Example
39+
#### Example
4040

4141
Block likely automated traffic only on your login endpoint:
4242

@@ -62,7 +62,7 @@ Challenge likely automated traffic only from specific ASNs:
6262

6363
### Custom actions
6464

65-
Bot settings offer **Block**, **Managed Challenge**, and **Allow** as actions.
65+
Bot settings offer **Block**, **Managed Challenge**, and **Allow** as actions.
6666

6767
If you need other actions, such as **Log** (for testing rules before enforcement), **Interactive Challenge**, or **Skip** (to bypass other rules), you need custom rules.
6868

@@ -76,6 +76,6 @@ To send bot scores, verified bot status, or JA3/JA4 fingerprints to your origin
7676

7777
## Execution order
7878

79-
Custom rules execute before Super Bot Fight Mode managed rules. If a custom rule takes a terminating action (such as **Block** or **Managed Challenge**), the request does not reach bot settings.
79+
Custom rules execute before Super Bot Fight Mode managed rules. If a custom rule takes a <GlossaryTooltip term="terminating action">terminating action</GlossaryTooltip> (such as _Block_ or _Managed Challenge_), the request does not reach bot settings.
8080

81-
Refer to [Security features interoperability](/waf/feature-interoperability/) for more information.
81+
Refer to [Security features interoperability](/waf/feature-interoperability/) for more information.

src/content/docs/waf/feature-interoperability.mdx

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,20 @@ sidebar:
66
description: How Cloudflare security features interact and execute in order.
77
---
88

9-
import { Details, Tabs, TabItem, Steps, DashButton } from "~/components";
9+
import {
10+
Details,
11+
Tabs,
12+
TabItem,
13+
Steps,
14+
DashButton,
15+
GlossaryTooltip,
16+
} from "~/components";
1017

1118
Cloudflare applies multiple security features to every incoming request. Each feature runs at a specific stage, and the order determines which feature acts first. Understanding this order helps you avoid conflicts and reduce false positives.
1219

1320
## Execution order
1421

15-
Cloudflare security features powered by the [Ruleset Engine](/ruleset-engine/) run in a fixed sequence of phases. When a request arrives, it passes through each phase in order. If a rule takes a [terminating action](/ruleset-engine/rules-language/actions/) (for example, _Block_ or _Managed Challenge_), the request stops and does not reach later phases.
22+
Cloudflare security features powered by the [Ruleset Engine](/ruleset-engine/) run in a fixed sequence of phases. When a request arrives, it passes through each phase in order. If a rule takes a <GlossaryTooltip term="terminating action" link="/ruleset-engine/rules-language/actions/">terminating action</GlossaryTooltip> (for example, _Block_ or _Managed Challenge_), the request stops and does not reach later phases.
1623

1724
The security-related request phases, in execution order, are:
1825

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
productName: Ruleset Engine
3+
entries:
4+
- term: terminating action
5+
general_definition: |-
6+
a rule action like _Block_ that stops the evaluation of remaining rules.
7+
associated_products:
8+
- WAF

0 commit comments

Comments
 (0)