Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
13 changes: 6 additions & 7 deletions src/content/docs/en/homes/build-home.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ product_cards:
description: >-
Applications allows you to build your web applications to run on
Azion Web Platform.
link: /en/documentation/products/build/edge-application/
link: /en/documentation/products/build/applications/
- title: Modules
cards:
- icon: /assets/docs/images/uploads/app-aceleration.svg
Expand All @@ -24,32 +24,32 @@ product_cards:
Speed ​​up the performance of your applications and APIs with protocol
optimizations and advanced caching rules.
link: >-
/en/documentation/products/build/edge-application/application-accelerator/
/en/documentation/products/build/applications/application-accelerator/
- icon: /assets/docs/images/uploads/edge-caching.svg
title: Cache
description: >-
Turbocharge delivery by caching content at the edge of the network,
closer to your users.
link: /en/documentation/products/build/edge-application/edge-cache/
link: /en/documentation/products/build/applications/cache/
- icon: /assets/docs/images/uploads/edge-functions.svg
title: Functions
description: >-
Create event-driven, serverless applications, at the edge of the
network, closer to users.
link: /en/documentation/products/build/edge-application/edge-functions/
link: /en/documentation/products/build/applications/functions/
- icon: /assets/docs/images/uploads/image-processor.svg
title: Image Processor
description: >-
Optimize, convert, and manipulate your images just-in-time to enhance
the user experience.
link: /en/documentation/products/build/edge-application/image-processor/
link: /en/documentation/products/build/applications/image-processor/
- icon: /assets/docs/images/uploads/load-balancer.svg
title: Load Balancer
description: >-
Balance loads on your servers and across any cloud provider to boost
the reliability and availability of your content, applications, and
APIs.
link: /en/documentation/products/secure/edge-connector/load-balancer/
link: /en/documentation/products/secure/connectors/load-balancer/
- title: Resources
cards:
- icon: /assets/docs/images/uploads/icon-guides.svg
Expand All @@ -58,4 +58,3 @@ product_cards:
link: /en/documentation/products/guides/
permalink: /documentation/products/build/
---

3 changes: 1 addition & 2 deletions src/content/docs/en/homes/deliver-home.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ product_cards:
description: >-
Bring your applications closer to your users and devices by
distributing them on Azion’s edge or on your own edge.
link: /en/documentation/products/deploy/edge-orchestrator/
link: /en/documentation/products/deploy/orchestrator/
- title: Resources
cards:
- icon: /assets/docs/images/uploads/icon-guides.svg
Expand All @@ -25,4 +25,3 @@ product_cards:
link: /en/documentation/products/guides/
permalink: /documentation/products/deploy/
---

9 changes: 4 additions & 5 deletions src/content/docs/en/homes/secure-home.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ product_cards:
- icon: /assets/docs/images/uploads/edge-firewall.svg
title: Firewall
description: Protect your application from the network to the application layer.
link: /en/documentation/products/secure/edge-firewall/
link: /en/documentation/products/secure/firewall/
- icon: /assets/docs/images/uploads/edge-dns.svg
title: Edge DNS
description: >-
Expand All @@ -27,21 +27,21 @@ product_cards:
description: >-
Mitigate the largest and most complex network and transport-layer DDoS
attacks.
link: /en/documentation/products/secure/edge-firewall/ddos-protection/
link: /en/documentation/products/secure/firewall/ddos-protection/
- icon: /assets/docs/images/uploads/network-layer-protection.svg
title: Network Shield
description: >-
Get protection from a programmable security perimeter for inbound and
outbound traffic at the edge.
link: >-
/en/documentation/products/secure/edge-firewall/network-layer-protection/
/en/documentation/products/secure/firewall/network-shield/
- icon: /assets/docs/images/uploads/waf-rules.svg
title: Web Application Firewall
description: >-
Secure your web application from OWASP Top 10 threats to sophisticated
zero-day attacks.
link: >-
/en/documentation/products/secure/edge-firewall/web-application-firewall/
/en/documentation/products/secure/firewall/web-application-firewall/
- title: Resources
cards:
- icon: /assets/docs/images/uploads/icon-guides.svg
Expand All @@ -50,4 +50,3 @@ product_cards:
link: /en/documentation/products/guides/
permalink: /documentation/products/secure/
---

Original file line number Diff line number Diff line change
Expand Up @@ -45,12 +45,12 @@ Through this perimeter, you can implement solutions such as:

### Components

- [Applications](/en/documentation/products/build/edge-application/): allows you to set up an application to configure delivery and cache policies.
- [Firewall](/en/documentation/products/secure/edge-firewall/): provides main settings to set up your instance, enabling you to associate it with domains and activate modules to protect users, applications, and networks.
- [Web Application Firewall](/en/documentation/products/secure/edge-firewall/web-application-firewall/): allows you to configure protection against attacks and vulnerabilities.
- [DDoS Protection](/en/documentation/products/secure/edge-firewall/ddos-protection/): detects and mitigates DDoS and DoS attacks.
- [Network Shield](/en/documentation/products/secure/edge-firewall/network-layer-protection/): allows you to create lists with IP addresses or countries with suspicious behavior and restrict their access.
- [Functions for Firewall](/en/documentation/products/secure/edge-firewall/edge-functions/): build event-driven, serverless applications including functions with your own security source code.
- [Applications](/en/documentation/products/build/applications/): allows you to set up an application to configure delivery and cache policies.
- [Firewall](/en/documentation/products/secure/firewall/): provides main settings to set up your instance, enabling you to associate it with domains and activate modules to protect users, applications, and networks.
- [Web Application Firewall](/en/documentation/products/secure/firewall/web-application-firewall/): allows you to configure protection against attacks and vulnerabilities.
- [DDoS Protection](/en/documentation/products/secure/firewall/ddos-protection/): detects and mitigates DDoS and DoS attacks.
- [Network Shield](/en/documentation/products/secure/firewall/network-shield/): allows you to create lists with IP addresses or countries with suspicious behavior and restrict their access.
- [Functions for Firewall](/en/documentation/products/secure/firewall/functions/): build event-driven, serverless applications including functions with your own security source code.
- [Marketplace Integrations](/en/documentation/products/marketplace/integrations/): function-based functionalities to compose and improve your applications, enforcing security policies.
- [Data Stream](/en/documentation/products/observe/data-stream/) and [Real-Time Events](/en/documentation/products/observe/real-time-events/) enable you to monitor all API Gateway activity.

Expand All @@ -64,8 +64,8 @@ Through this perimeter, you can implement solutions such as:
- [Configure the application's main settings](/en/documentation/products/guides/build/configure-main-settings/).
3. Associate your API Gateway [custom domain](/en/documentation/products/guides/configure-a-domain/) with the application.
4. [Create your Digital Certificate](/en/documentation/products/guides/create-a-digital-certificate/).
5. [Create a firewall](/en/documentation/products/guides/secure/edge-firewall-configure-main-settings/) and select the domain you want to protect.
- Define any [WAF rules](/en/documentation/products/guides/secure/create-waf-rule-set/), [Rules Engine rules](/en/documentation/products/secure/edge-firewall/rules-engine/), or [Functions](/en/documentation/products/secure/edge-firewall/edge-functions/) you want to implement and instantiate in the firewall.
5. [Create a firewall](/en/documentation/products/guides/secure/firewall-configure-main-settings/) and select the domain you want to protect.
- Define any [WAF rules](/en/documentation/products/guides/secure/create-waf-rule-set/), [Rules Engine rules](/en/documentation/products/secure/firewall/rules-engine/), or [Functions](/en/documentation/products/secure/firewall/functions/) you want to implement and instantiate in the firewall.
- Install and configure the [Azion Integrations](/en/documentation/products/marketplace/integrations/) you want to use to enhance your security policies.
6. [Monitor your API Gateway behavior](/en/documentation/products/observe/overview/) through the Observe products.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,9 +37,9 @@ Considering the implementation of a ReAct agent in an Edge Computing Platform, t

### Components

- [Applications](/en/documentation/products/build/edge-application/): allows you to build applications that run in Azion Global Infrastructure.
- [Functions for Applications](/en/documentation/products/build/edge-application/edge-functions/): executes code closer to the end user, enhancing performance and enabling custom logic for handling requests and responses.- [SQL Database](/en/documentation/products/store/edge-sql/): an edge-native SQL solution designed for serverless applications.
- [Vector Search](/en/documentation/products/store/edge-sql/vector-search/): enables customers to implement semantic search engines.
- [Applications](/en/documentation/products/build/applications/): allows you to build applications that run in Azion Global Infrastructure.
- [Functions for Applications](/en/documentation/products/build/applications/functions/): executes code closer to the end user, enhancing performance and enabling custom logic for handling requests and responses.- [SQL Database](/en/documentation/products/store/sql-database/): an edge-native SQL solution designed for serverless applications.
- [Vector Search](/en/documentation/products/store/sql-database/vector-search/): enables customers to implement semantic search engines.
- [Global Infrastructure](https://www.azion.com/en/products/our-network/): a highly distributed architecture that includes strategically located edge nodes.

---
Expand All @@ -48,8 +48,8 @@ Considering the implementation of a ReAct agent in an Edge Computing Platform, t

1. Create an [application](/en/documentation/products/guides/build/build-an-application/).
2. Create the [SQL database](/en/documentation/products/store/sql/create-database/) that will be consulted.
3. [Create a function](/en/documentation/products/build/edge-application/edge-functions/#implementation) with your AI Agent's logic and [instantiate](/en/documentation/products/guides/build/instantiate-edge-functions/) it in the application.
4. Implement [Vector Search](/en/documentation/products/guides/edge-sql-vector-search/).
3. [Create a function](/en/documentation/products/build/applications/functions/#implementation) with your AI Agent's logic and [instantiate](/en/documentation/products/guides/build/instantiate-functions/) it in the application.
4. Implement [Vector Search](/en/documentation/products/guides/sql-database-vector-search/).
5. You can monitor your AI Agent through [Azion Observe products](/en/documentation/products/observe/overview/) and specialized tools such as LangGraph.

---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,10 +39,10 @@ This solution is ideal for organizations looking to mitigate security risks, pre

### Components

- [Firewall](/en/documentation/products/secure/edge-firewall/) executes the Bot Manager add-on and other security rules.
- [Bot Manager](/en/documentation/products/secure/edge-firewall/bot-manager/) is a Firewall add-on for bot management.
- [Firewall](/en/documentation/products/secure/firewall/) executes the Bot Manager add-on and other security rules.
- [Bot Manager](/en/documentation/products/secure/firewall/bot-manager/) is a Firewall add-on for bot management.
- This add-on is Azion's comprehensive solution for bot management. A [lite version integration](/en/documentation/products/guides/bot-manager-lite/) is also available in the Marketplace.
- [Applications](/en/documentation/products/build/edge-application/) is your application running on top of the Azion Web Platform.
- [Applications](/en/documentation/products/build/applications/) is your application running on top of the Azion Web Platform.
- [Data Stream](/en/documentation/products/observe/data-stream/) and [Real-Time Events](/en/documentation/products/observe/real-time-metrics/) enable you to monitor all Bot Manager activity.

---
Expand Down Expand Up @@ -85,7 +85,7 @@ You can test and implement Azion Bot Manager in two ways:
- From scratch: create an entire edge stack from zero, including Bot Manager. To do so:
1. [Create an application](/en/documentation/products/guides/build/build-an-application/).
2. [Add a custom domain to it](/en/documentation/products/guides/configure-a-domain/).
3. [Enable Bot Manager](/en/documentation/products/secure/edge-firewall/bot-manager/).
3. [Enable Bot Manager](/en/documentation/products/secure/firewall/bot-manager/).
- Contact the [Sales team](https://www.azion.com/en/contact-sales/) for more details on the Bot Manager subscription.
- [Configure Bot Manager Lite](/en/documentation/products/guides/bot-manager-lite/) if you've decided to use this version.
4. [Monitor bot activity](/en/documentation/products/observe/data-stream/first-steps/) and calibrate rules.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -54,12 +54,12 @@ Read more on the Azion [Shared Responsibility Model](/en/documentation/shared-re
- [Global Infrastructure](https://www.azion.com/en/products/our-network/): it processes data closer to the source, reducing latency and enhancing real-time analysis, including policies and technologies to make it safe and compliant.
- [Azion CLI](/en/documentation/products/azion-cli/overview/): an open-source command-line interface (CLI) that lets you interact with Azion Web Platform using a terminal.
- [Azion Console](/en/documentation/products/guides/getting-to-know-azion-console/): Azion's interface where you can access all the available products and their settings.
- [Firewall](/en/documentation/products/secure/edge-firewall/): provides main settings to set up your instance, enabling you to associate it with domains and activate modules to protect users, applications, and networks.
- [Web Application Firewall](/en/documentation/products/secure/edge-firewall/web-application-firewall/): allows you to configure protection against attacks and vulnerabilities.
- [DDoS Protection](/en/documentation/products/secure/edge-firewall/ddos-protection/): detects and mitigates DDoS and DoS attacks.
- [Network Shield](/en/documentation/products/secure/edge-firewall/network-layer-protection/): allows you to create lists with IP addresses or countries with suspicious behavior and restrict their access.
- [Functions for Firewall](/en/documentation/products/secure/edge-firewall/edge-functions/): build event-driven, serverless applications including functions with your own security source code.
- [Applications](/en/documentation/products/build/edge-application/): allows you to set up an application to configure delivery and cache policies.
- [Firewall](/en/documentation/products/secure/firewall/): provides main settings to set up your instance, enabling you to associate it with domains and activate modules to protect users, applications, and networks.
- [Web Application Firewall](/en/documentation/products/secure/firewall/web-application-firewall/): allows you to configure protection against attacks and vulnerabilities.
- [DDoS Protection](/en/documentation/products/secure/firewall/ddos-protection/): detects and mitigates DDoS and DoS attacks.
- [Network Shield](/en/documentation/products/secure/firewall/network-shield/): allows you to create lists with IP addresses or countries with suspicious behavior and restrict their access.
- [Functions for Firewall](/en/documentation/products/secure/firewall/functions/): build event-driven, serverless applications including functions with your own security source code.
- [Applications](/en/documentation/products/build/applications/): allows you to set up an application to configure delivery and cache policies.
- [Real-Time Events](/en/documentation/products/observe/real-time-events/) enables you to monitor all your applications' activity and by using [Data Stream](/en/documentation/products/observe/data-stream/) connectors you can feed event logs into your stream processing, SIEM, and big data platforms.

---
Expand All @@ -72,8 +72,8 @@ Read more on the Azion [Shared Responsibility Model](/en/documentation/shared-re
- [Configure the application's main settings](/en/documentation/products/guides/build/configure-main-settings/).
3. [Create a domain](/en/documentation/products/guides/configure-a-domain/) and associate it with the application, and [point your traffic to Azion](/en/documentation/products/guides/point-domain-to-azion/).
4. [Create your Digital Certificate](/en/documentation/products/guides/create-a-digital-certificate/).
5. [Create a firewall](/en/documentation/products/guides/secure/edge-firewall-configure-main-settings/) and select the domains you want to protect.
- Define any [WAF rules](/en/documentation/products/guides/secure/create-waf-rule-set/), [Rules Engine rules](/en/documentation/products/secure/edge-firewall/rules-engine/), or [functions](/en/documentation/products/secure/edge-firewall/edge-functions/) you want to implement and instantiate in the firewall.
5. [Create a firewall](/en/documentation/products/guides/secure/firewall-configure-main-settings/) and select the domains you want to protect.
- Define any [WAF rules](/en/documentation/products/guides/secure/create-waf-rule-set/), [Rules Engine rules](/en/documentation/products/secure/firewall/rules-engine/), or [functions](/en/documentation/products/secure/firewall/functions/) you want to implement and instantiate in the firewall.
6. Monitor your applications through the [Observe products](/en/documentation/products/observe/overview/) and the [Activity History](/en/documentation/products/accounts/activity-history/) page.

---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -68,4 +68,4 @@ Create an application.

## Related docs

- [Application Accelerator](/en/documentation/products/build/edge-application/application-accelerator/).
- [Application Accelerator](/en/documentation/products/build/applications/application-accelerator/).
Loading
Loading