diff --git a/public/assets/docs/images/uploads/app-modernization.png b/public/assets/docs/images/uploads/app-modernization.png index 9b582b7b3c..d11c74aef6 100644 Binary files a/public/assets/docs/images/uploads/app-modernization.png and b/public/assets/docs/images/uploads/app-modernization.png differ diff --git a/public/assets/docs/images/uploads/application-and-network-security/light-bot-management.png b/public/assets/docs/images/uploads/application-and-network-security/light-bot-management.png index 5e523697ce..cc8a742e29 100644 Binary files a/public/assets/docs/images/uploads/application-and-network-security/light-bot-management.png and b/public/assets/docs/images/uploads/application-and-network-security/light-bot-management.png differ diff --git a/public/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png b/public/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png index 7d1a6cdb82..edb52394b3 100644 Binary files a/public/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png and b/public/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png differ diff --git a/public/assets/docs/images/uploads/diagram-security-modernization.png b/public/assets/docs/images/uploads/diagram-security-modernization.png index f569312a5c..8dae17535b 100644 Binary files a/public/assets/docs/images/uploads/diagram-security-modernization.png and b/public/assets/docs/images/uploads/diagram-security-modernization.png differ diff --git a/public/assets/docs/images/uploads/diagram-waap.png b/public/assets/docs/images/uploads/diagram-waap.png index ba4d075a17..7b5ad48038 100644 Binary files a/public/assets/docs/images/uploads/diagram-waap.png and b/public/assets/docs/images/uploads/diagram-waap.png differ diff --git a/public/assets/docs/images/uploads/online-fraud-prevention-architecture.png b/public/assets/docs/images/uploads/online-fraud-prevention-architecture.png index 36a3229a40..a9e5c2101d 100644 Binary files a/public/assets/docs/images/uploads/online-fraud-prevention-architecture.png and b/public/assets/docs/images/uploads/online-fraud-prevention-architecture.png differ diff --git a/src/content/docs/en/pages/architectures/api-gateways/api-gateways-security.mdx b/src/content/docs/en/pages/architectures/api-gateways/api-gateways-security.mdx index d2a4a1c1f3..d4b12f01dd 100644 --- a/src/content/docs/en/pages/architectures/api-gateways/api-gateways-security.mdx +++ b/src/content/docs/en/pages/architectures/api-gateways/api-gateways-security.mdx @@ -25,7 +25,7 @@ Through this perimeter, you can implement solutions such as: ## API Gateway Security Architecture Diagram -![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png) +![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png?v=2) ### API Gateway Security Dataflow diff --git a/src/content/docs/en/pages/architectures/bot-management/bot-management-architecture.mdx b/src/content/docs/en/pages/architectures/bot-management/bot-management-architecture.mdx index 9a469abf4e..47eeb956c3 100644 --- a/src/content/docs/en/pages/architectures/bot-management/bot-management-architecture.mdx +++ b/src/content/docs/en/pages/architectures/bot-management/bot-management-architecture.mdx @@ -24,7 +24,7 @@ This solution is ideal for organizations looking to mitigate security risks, pre ## Bot Management Architecture Diagram {/* ![Architecture diagram](/assets/docs/images/uploads/diagram-bot-management.png) */} -![Architecture diagram](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png) +![Architecture diagram](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png?v=2) ### Bot Management Dataflow diff --git a/src/content/docs/en/pages/architectures/compliance/compliance-architecture.mdx b/src/content/docs/en/pages/architectures/compliance/compliance-architecture.mdx index 287c948512..ce26e35de9 100644 --- a/src/content/docs/en/pages/architectures/compliance/compliance-architecture.mdx +++ b/src/content/docs/en/pages/architectures/compliance/compliance-architecture.mdx @@ -34,7 +34,7 @@ Read more on the Azion [Shared Responsibility Model](/en/documentation/shared-re ## Governance, Risk, and Compliance Architecture Diagram -![Governance, Risk, and Compliance Architecture Diagram](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png) +![Governance, Risk, and Compliance Architecture Diagram](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png?v=2) ### Governance, Risk, and Compliance Dataflow diff --git a/src/content/docs/en/pages/architectures/edge-application/application-acceleration.mdx b/src/content/docs/en/pages/architectures/edge-application/application-acceleration.mdx index cc1c559d3d..b1d69fd447 100644 --- a/src/content/docs/en/pages/architectures/edge-application/application-acceleration.mdx +++ b/src/content/docs/en/pages/architectures/edge-application/application-acceleration.mdx @@ -19,7 +19,7 @@ This solution is ideal for developers and organizations aiming to enhance transa ## Application acceleration architecture diagram -![Overview of a request/response through Applications](/assets/docs/images/uploads/app-acceleration-arch.png) +![Overview of a request/response through Applications](/assets/docs/images/uploads/app-acceleration-arch.png?v=2) ### Application acceleration dataflow diff --git a/src/content/docs/en/pages/architectures/edge-application/application-modernization.mdx b/src/content/docs/en/pages/architectures/edge-application/application-modernization.mdx index 5392aa0d1b..527b5b59db 100644 --- a/src/content/docs/en/pages/architectures/edge-application/application-modernization.mdx +++ b/src/content/docs/en/pages/architectures/edge-application/application-modernization.mdx @@ -22,7 +22,7 @@ Your application can be completely hosted at Azion, but there's the possibility ## Architecture -![Overview of a request/response through Applications](/assets/docs/images/uploads/app-modernization.png) +![Overview of a request/response through Applications](/assets/docs/images/uploads/app-modernization.png?v=2) ### Dataflow diff --git a/src/content/docs/en/pages/architectures/edge-application/microservices.mdx b/src/content/docs/en/pages/architectures/edge-application/microservices.mdx index 08090264f7..3df13b39df 100644 --- a/src/content/docs/en/pages/architectures/edge-application/microservices.mdx +++ b/src/content/docs/en/pages/architectures/edge-application/microservices.mdx @@ -19,7 +19,7 @@ Additionally, it enhances flexibility by allowing each service to be developed, ## Architecture -![Representation of a request/response in a microservices setup](/assets/docs/images/uploads/microservices-arch.png) +![Representation of a request/response in a microservices setup](/assets/docs/images/uploads/microservices-arch.png?v=2) ### Dataflow diff --git a/src/content/docs/en/pages/architectures/edge-application/serverless-apps.mdx b/src/content/docs/en/pages/architectures/edge-application/serverless-apps.mdx index 62240faa5b..aaf6e477e6 100644 --- a/src/content/docs/en/pages/architectures/edge-application/serverless-apps.mdx +++ b/src/content/docs/en/pages/architectures/edge-application/serverless-apps.mdx @@ -20,7 +20,7 @@ The benefits of serverless are numerous: it offers scalability, cost-efficiency, ## Architecture -![Overview of a request/response through Applications](/assets/docs/images/uploads/serverless-apps.png) +![Overview of a request/response through Applications](/assets/docs/images/uploads/serverless-apps.png?v=2) ### Dataflow diff --git a/src/content/docs/en/pages/architectures/edge-enhanced/edge-enhanced.mdx b/src/content/docs/en/pages/architectures/edge-enhanced/edge-enhanced.mdx index 50817e7853..023cd942f0 100644 --- a/src/content/docs/en/pages/architectures/edge-enhanced/edge-enhanced.mdx +++ b/src/content/docs/en/pages/architectures/edge-enhanced/edge-enhanced.mdx @@ -14,7 +14,7 @@ Using Azion services and products, it's possible to demonstrate how an e-commerc ## Enhanced Applications Architecture -![Overview of a request/response of shopping cart through Applications](/assets/docs/images/uploads/edge-enhanced.png) +![Overview of a request/response of shopping cart through Applications](/assets/docs/images/uploads/edge-enhanced.png?v=2) ### Dataflow diff --git a/src/content/docs/en/pages/architectures/edge-firewall/online-fraud-prevention.mdx b/src/content/docs/en/pages/architectures/edge-firewall/online-fraud-prevention.mdx index 78731cc3c5..44cb8b155a 100644 --- a/src/content/docs/en/pages/architectures/edge-firewall/online-fraud-prevention.mdx +++ b/src/content/docs/en/pages/architectures/edge-firewall/online-fraud-prevention.mdx @@ -21,7 +21,7 @@ This approach performs fraud detection directly at the edge before reaching your ## Online Fraud Prevention Architecture Diagram -![Azion Online Fraud Prevention Architecture Diagram](/assets/docs/images/uploads/online-fraud-prevention-architecture.png) +![Azion Online Fraud Prevention Architecture Diagram](/assets/docs/images/uploads/online-fraud-prevention-architecture.png?v=2) ### Online Fraud Prevention Dataflow diff --git a/src/content/docs/en/pages/architectures/edge-firewall/waap-architecture.mdx b/src/content/docs/en/pages/architectures/edge-firewall/waap-architecture.mdx index d8c52f450c..72d376f582 100644 --- a/src/content/docs/en/pages/architectures/edge-firewall/waap-architecture.mdx +++ b/src/content/docs/en/pages/architectures/edge-firewall/waap-architecture.mdx @@ -22,7 +22,7 @@ This solution is ideal for organizations looking to safeguard their digital infr ## Web Application and API Protection (WAAP) Architecture Diagram -![Architecture diagram](/assets/docs/images/uploads/diagram-waap.png) +![Architecture diagram](/assets/docs/images/uploads/diagram-waap.png?v=2) ### Web Application and API Protection (WAAP) Dataflow diff --git a/src/content/docs/en/pages/architectures/edge-native/edge-native-apps.mdx b/src/content/docs/en/pages/architectures/edge-native/edge-native-apps.mdx index 590b8ba6f6..1132af46c2 100644 --- a/src/content/docs/en/pages/architectures/edge-native/edge-native-apps.mdx +++ b/src/content/docs/en/pages/architectures/edge-native/edge-native-apps.mdx @@ -14,7 +14,7 @@ Azion provides services and products to craft robust API-based [applications](ht ## Edge-Native Applications Architecture -![Edge-native applications architecture](/assets/docs/images/uploads/edge-native-arch.png) +![Edge-native applications architecture](/assets/docs/images/uploads/edge-native-arch.png?v=2) ### Dataflow diff --git a/src/content/docs/en/pages/architectures/jamstack/jamstack.mdx b/src/content/docs/en/pages/architectures/jamstack/jamstack.mdx index c78be51386..00db65f96d 100644 --- a/src/content/docs/en/pages/architectures/jamstack/jamstack.mdx +++ b/src/content/docs/en/pages/architectures/jamstack/jamstack.mdx @@ -20,7 +20,7 @@ This solution is ideal for organizations looking to enhance website performance, ## Jamstack Website Architecture Diagram -![Architecture diagram](/assets/docs/images/uploads/jamstack-deploy.png) +![Architecture diagram](/assets/docs/images/uploads/jamstack-deploy.png?v=2) ### Jamstack Website Dataflow diff --git a/src/content/docs/en/pages/architectures/orch/application-deliver-operation.mdx b/src/content/docs/en/pages/architectures/orch/application-deliver-operation.mdx index 62bcc5c62d..d34098baae 100644 --- a/src/content/docs/en/pages/architectures/orch/application-deliver-operation.mdx +++ b/src/content/docs/en/pages/architectures/orch/application-deliver-operation.mdx @@ -18,7 +18,7 @@ namespace: docs_arch_infra_auto_apps_delivery This flow assumes a service has been created for saving an HTML page containing a list of products. For further information, check the [Implementation](#implementation) section. ::: -![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png) +![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png?v=2) ### Application Delivery and Operations Dataflow diff --git a/src/content/docs/en/pages/architectures/orch/infra-automation.mdx b/src/content/docs/en/pages/architectures/orch/infra-automation.mdx index 008ca8159a..242bc8e68b 100644 --- a/src/content/docs/en/pages/architectures/orch/infra-automation.mdx +++ b/src/content/docs/en/pages/architectures/orch/infra-automation.mdx @@ -18,7 +18,7 @@ namespace: docs_arch_infra_auto_apps This flow assumes a service has been created for installing Azion CLI on the edge node. For further information, check the [Implementation](#implementation) section. ::: -![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png) +![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png?v=2) ### Dataflow diff --git a/src/content/docs/en/pages/architectures/security-automation/security-automation.mdx b/src/content/docs/en/pages/architectures/security-automation/security-automation.mdx index 9fcd04f7ae..68c86477b1 100644 --- a/src/content/docs/en/pages/architectures/security-automation/security-automation.mdx +++ b/src/content/docs/en/pages/architectures/security-automation/security-automation.mdx @@ -26,7 +26,7 @@ In this context, autonomous systems operate with minimal or no human interventio ## Security Automation Architecture Diagram -![Azion Security Automation Architecture Diagram](/assets/docs/images/uploads/diagram-security-automation.png) +![Azion Security Automation Architecture Diagram](/assets/docs/images/uploads/diagram-security-automation.png?v=2) ### Security Automation Dataflow diff --git a/src/content/docs/en/pages/architectures/security-modernization/security-modernization-with-edge-computing.mdx b/src/content/docs/en/pages/architectures/security-modernization/security-modernization-with-edge-computing.mdx index be0669fae5..b7504fb6ca 100644 --- a/src/content/docs/en/pages/architectures/security-modernization/security-modernization-with-edge-computing.mdx +++ b/src/content/docs/en/pages/architectures/security-modernization/security-modernization-with-edge-computing.mdx @@ -25,7 +25,7 @@ This use case is ideal for organizations looking to build a strong online presen ## Security Modernization Architecture Diagram -![Security Modernization Architecture Diagram](/assets/docs/images/uploads/diagram-security-modernization.png) +![Security Modernization Architecture Diagram](/assets/docs/images/uploads/diagram-security-modernization.png?v=2) 1. A request reaches Azion Web Platform. 2. Firewall processes the request. diff --git a/src/content/docs/pt-br/pages/arquiteturas/api-gateways/api-gateways-security.mdx b/src/content/docs/pt-br/pages/arquiteturas/api-gateways/api-gateways-security.mdx index f4849e14db..64bb7f8120 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/api-gateways/api-gateways-security.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/api-gateways/api-gateways-security.mdx @@ -25,7 +25,7 @@ Através desse perímetro, você pode implementar soluções como: ## Diagrama de arquitetura de segurança de API Gateways -![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png) +![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png?v=2) ### Fluxo de dados de segurança de API Gateways diff --git a/src/content/docs/pt-br/pages/arquiteturas/bot-management/bot-management-arquitetura.mdx b/src/content/docs/pt-br/pages/arquiteturas/bot-management/bot-management-arquitetura.mdx index aa8c284190..68450c719c 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/bot-management/bot-management-arquitetura.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/bot-management/bot-management-arquitetura.mdx @@ -24,7 +24,7 @@ Essa solução é ideal para organizações que buscam mitigar riscos de seguran ## Diagrama da arquitetura de gerenciamento de bots {/* ![Diagrama de arquitetura](/assets/docs/images/uploads/diagram-bot-management.png) */} -![Diagrama de arquitetura](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png) +![Diagrama de arquitetura](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png?v=2) ### Fluxo de dados do gerenciamento de bots diff --git a/src/content/docs/pt-br/pages/arquiteturas/compliance/compliance-architecture.mdx b/src/content/docs/pt-br/pages/arquiteturas/compliance/compliance-architecture.mdx index 099cc0b4be..b40eb954e0 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/compliance/compliance-architecture.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/compliance/compliance-architecture.mdx @@ -34,7 +34,7 @@ Leia mais sobre o [Modelo de Responsabilidade Compartilhada](/pt-br/documentacao ## Diagrama de Arquitetura de Governança, Risco e Conformidade -![Diagrama de Arquitetura de Governança, Risco e Conformidade](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png) +![Diagrama de Arquitetura de Governança, Risco e Conformidade](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png?v=2) ### Fluxo de Dados de Governança, Risco e Conformidade diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-acceleration.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-acceleration.mdx index 81332e2866..48505ea750 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-acceleration.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-acceleration.mdx @@ -16,7 +16,7 @@ Esta solução é ideal para desenvolvedores e organizações que desejam aprimo ## Diagrama da arquitetura de aceleração de aplicações -![Visão geral de uma requisição/resposta através do Application](/assets/docs/images/uploads/app-acceleration-arch.png) +![Visão geral de uma requisição/resposta através do Application](/assets/docs/images/uploads/app-acceleration-arch.png?v=2) ### Fluxo de dados de aceleração de aplicações diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-modernization.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-modernization.mdx index ac54d7f79c..ec29ce9c64 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-modernization.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-application/application-modernization.mdx @@ -22,7 +22,7 @@ Sua aplicação pode ser completamente hospedada na Azion, mas há também a pos ## Arquitetura -![Visão geral de uma requisição/resposta via Application](/assets/docs/images/uploads/app-modernization.png) +![Visão geral de uma requisição/resposta via Application](/assets/docs/images/uploads/app-modernization.png?v=2) ### Fluxo de dados diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-application/microservices.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-application/microservices.mdx index 35fa32a6b5..7ddb9c2ac1 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-application/microservices.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-application/microservices.mdx @@ -21,7 +21,7 @@ Além disso, aumenta a flexibilidade ao permitir que cada serviço seja desenvol ## Arquitetura -![Representação de uma requisição/resposta em uma configuração de microsserviços](/assets/docs/images/uploads/microservices-arch.png) +![Representação de uma requisição/resposta em uma configuração de microsserviços](/assets/docs/images/uploads/microservices-arch.png?v=2) ### Fluxo de dados diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-application/serverless-apps.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-application/serverless-apps.mdx index 656810fba0..8017f4ccc2 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-application/serverless-apps.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-application/serverless-apps.mdx @@ -21,7 +21,7 @@ Os benefícios do serverless são numerosos: oferece escalabilidade, eficiência ## Arquitetura -![Visão geral de uma requisição/resposta através da application](/assets/docs/images/uploads/serverless-apps.png) +![Visão geral de uma requisição/resposta através da application](/assets/docs/images/uploads/serverless-apps.png?v=2) ### Fluxo de Dados diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-enhanced/edge-enhanced.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-enhanced/edge-enhanced.mdx index 50ddb5cbed..f698daa9f9 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-enhanced/edge-enhanced.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-enhanced/edge-enhanced.mdx @@ -21,7 +21,7 @@ Usando os serviços e produtos da Azion, é possível demonstrar como a funciona ## Arquitetura de Aplicações Melhoradas -![Visão geral de uma requisição/resposta do carrinho de compras através de Application](/assets/docs/images/uploads/edge-enhanced.png) +![Visão geral de uma requisição/resposta do carrinho de compras através de Application](/assets/docs/images/uploads/edge-enhanced.png?v=2) ### Fluxo de dados diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/prevencao-fraude-online.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/prevencao-fraude-online.mdx index a37d157163..614c4e88e6 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/prevencao-fraude-online.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/prevencao-fraude-online.mdx @@ -21,7 +21,7 @@ Essa abordagem executa a detecção de fraude diretamente no edge, antes de atin ## Diagrama de prevenção de fraudes online -![Diagrama de prevenção de fraudes online na Azion](/assets/docs/images/uploads/online-fraud-prevention-architecture.png) +![Diagrama de prevenção de fraudes online na Azion](/assets/docs/images/uploads/online-fraud-prevention-architecture.png?v=2) ### Fluxo de dados na prevenção de fraudes online diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/waap-arquitetura.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/waap-arquitetura.mdx index 891618813b..6ca654ef0c 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/waap-arquitetura.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-firewall/waap-arquitetura.mdx @@ -24,7 +24,7 @@ Esta solução é ideal para organizações que buscam proteger sua infraestrutu ## Diagrama da arquitetura de proteção de aplicações web e APIs (WAAP) -![Diagrama de arquitetura](/assets/docs/images/uploads/diagram-waap.png) +![Diagrama de arquitetura](/assets/docs/images/uploads/diagram-waap.png?v=2) ### Fluxo de dados da proteção de aplicações web e APIs (WAAP) diff --git a/src/content/docs/pt-br/pages/arquiteturas/edge-native/edge-native-apps.mdx b/src/content/docs/pt-br/pages/arquiteturas/edge-native/edge-native-apps.mdx index c034896577..863971bfba 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/edge-native/edge-native-apps.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/edge-native/edge-native-apps.mdx @@ -14,7 +14,7 @@ A Azion fornece serviços e produtos para criar [aplicações](https://www.azion ## Arquitetura de aplicações edge-native -![Arquitetura de aplicações edge-native](/assets/docs/images/uploads/edge-native-arch.png) +![Arquitetura de aplicações edge-native](/assets/docs/images/uploads/edge-native-arch.png?v=2) ### Fluxo de dados diff --git a/src/content/docs/pt-br/pages/arquiteturas/jamstack/jamstack.mdx b/src/content/docs/pt-br/pages/arquiteturas/jamstack/jamstack.mdx index f058a627e7..31d6cd9f27 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/jamstack/jamstack.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/jamstack/jamstack.mdx @@ -20,7 +20,7 @@ Essa solução é ideal para organizações que buscam melhorar o desempenho do ## Diagrama de Arquitetura Jamstack -![Diagrama de Arquitetura](/assets/docs/images/uploads/jamstack-deploy.png) +![Diagrama de Arquitetura](/assets/docs/images/uploads/jamstack-deploy.png?v=2) ### Fluxo de Dados Jamstack diff --git a/src/content/docs/pt-br/pages/arquiteturas/orch/application-deliver-automation.mdx b/src/content/docs/pt-br/pages/arquiteturas/orch/application-deliver-automation.mdx index 487f96627c..e357745c4d 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/orch/application-deliver-automation.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/orch/application-deliver-automation.mdx @@ -18,7 +18,7 @@ O [Azion Orchestrator](/pt-br/documentacao/produtos/deploy/edge-orchestrator/) p Este fluxo pressupõe que um serviço foi criado para salvar uma página HTML contendo uma lista de produtos. Para mais informações, verifique a seção [Implementação](#implementacao). ::: -![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png) +![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png?v=2) ### Fluxo de dados da entrega e operações de aplicações diff --git a/src/content/docs/pt-br/pages/arquiteturas/orch/infra-automation.mdx b/src/content/docs/pt-br/pages/arquiteturas/orch/infra-automation.mdx index 9c7720028e..f50840e49a 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/orch/infra-automation.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/orch/infra-automation.mdx @@ -18,7 +18,7 @@ O [Azion Orchestrator](/pt-br/documentacao/produtos/deploy/edge-orchestrator/) p Este fluxo pressupõe que um serviço foi criado para instalar a Azion CLI no edge node. Para mais informações, verifique a seção [Implementação](#implementacao). ::: -![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png) +![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png?v=2) ### Fluxo de dados diff --git a/src/content/docs/pt-br/pages/arquiteturas/security-automation/security-automation.mdx b/src/content/docs/pt-br/pages/arquiteturas/security-automation/security-automation.mdx index fae42569e7..d38c25d340 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/security-automation/security-automation.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/security-automation/security-automation.mdx @@ -26,7 +26,7 @@ Nesse contexto, sistemas autônomos operam com mínima ou nenhuma intervenção ## Diagrama de Arquitetura de Automação de Segurança -![Diagrama de Arquitetura de Automação de Segurança da Azion](/assets/docs/images/uploads/diagram-security-automation.png) +![Diagrama de Arquitetura de Automação de Segurança da Azion](/assets/docs/images/uploads/diagram-security-automation.png?v=2) ### Fluxo de Dados da Automação de Segurança diff --git a/src/content/docs/pt-br/pages/arquiteturas/security-modernization/security-modernization-com-edge-computing.mdx b/src/content/docs/pt-br/pages/arquiteturas/security-modernization/security-modernization-com-edge-computing.mdx index ba000c6b8e..240b638c1f 100644 --- a/src/content/docs/pt-br/pages/arquiteturas/security-modernization/security-modernization-com-edge-computing.mdx +++ b/src/content/docs/pt-br/pages/arquiteturas/security-modernization/security-modernization-com-edge-computing.mdx @@ -26,7 +26,7 @@ Este caso de uso é ideal para organizações que buscam construir uma forte pre ## Diagrama de arquitetura de modernização de segurança -![Diagrama de arquitetura de modernização de segurança](/assets/docs/images/uploads/diagram-security-modernization.png) +![Diagrama de arquitetura de modernização de segurança](/assets/docs/images/uploads/diagram-security-modernization.png?v=2) 1. Uma requisição chega na Azion Web Platform. 2. O Firewall processa a requisição.