Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file modified public/assets/docs/images/uploads/app-modernization.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified public/assets/docs/images/uploads/diagram-waap.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Through this perimeter, you can implement solutions such as:

## API Gateway Security Architecture Diagram

![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png)
![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png?v=2)

### API Gateway Security Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ This solution is ideal for organizations looking to mitigate security risks, pre
## Bot Management Architecture Diagram

{/* ![Architecture diagram](/assets/docs/images/uploads/diagram-bot-management.png) */}
![Architecture diagram](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png)
![Architecture diagram](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png?v=2)

### Bot Management Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Read more on the Azion [Shared Responsibility Model](/en/documentation/shared-re

## Governance, Risk, and Compliance Architecture Diagram

![Governance, Risk, and Compliance Architecture Diagram](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png)
![Governance, Risk, and Compliance Architecture Diagram](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png?v=2)

### Governance, Risk, and Compliance Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ This solution is ideal for developers and organizations aiming to enhance transa

## Application acceleration architecture diagram

![Overview of a request/response through Applications](/assets/docs/images/uploads/app-acceleration-arch.png)
![Overview of a request/response through Applications](/assets/docs/images/uploads/app-acceleration-arch.png?v=2)

### Application acceleration dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Your application can be completely hosted at Azion, but there's the possibility

## Architecture

![Overview of a request/response through Applications](/assets/docs/images/uploads/app-modernization.png)
![Overview of a request/response through Applications](/assets/docs/images/uploads/app-modernization.png?v=2)


### Dataflow
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Additionally, it enhances flexibility by allowing each service to be developed,

## Architecture

![Representation of a request/response in a microservices setup](/assets/docs/images/uploads/microservices-arch.png)
![Representation of a request/response in a microservices setup](/assets/docs/images/uploads/microservices-arch.png?v=2)

### Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ The benefits of serverless are numerous: it offers scalability, cost-efficiency,

## Architecture

![Overview of a request/response through Applications](/assets/docs/images/uploads/serverless-apps.png)
![Overview of a request/response through Applications](/assets/docs/images/uploads/serverless-apps.png?v=2)


### Dataflow
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Using Azion services and products, it's possible to demonstrate how an e-commerc

## Enhanced Applications Architecture

![Overview of a request/response of shopping cart through Applications](/assets/docs/images/uploads/edge-enhanced.png)
![Overview of a request/response of shopping cart through Applications](/assets/docs/images/uploads/edge-enhanced.png?v=2)

### Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ This approach performs fraud detection directly at the edge before reaching your

## Online Fraud Prevention Architecture Diagram

![Azion Online Fraud Prevention Architecture Diagram](/assets/docs/images/uploads/online-fraud-prevention-architecture.png)
![Azion Online Fraud Prevention Architecture Diagram](/assets/docs/images/uploads/online-fraud-prevention-architecture.png?v=2)

### Online Fraud Prevention Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ This solution is ideal for organizations looking to safeguard their digital infr

## Web Application and API Protection (WAAP) Architecture Diagram

![Architecture diagram](/assets/docs/images/uploads/diagram-waap.png)
![Architecture diagram](/assets/docs/images/uploads/diagram-waap.png?v=2)

### Web Application and API Protection (WAAP) Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Azion provides services and products to craft robust API-based [applications](ht

## Edge-Native Applications Architecture

![Edge-native applications architecture](/assets/docs/images/uploads/edge-native-arch.png)
![Edge-native applications architecture](/assets/docs/images/uploads/edge-native-arch.png?v=2)

### Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ This solution is ideal for organizations looking to enhance website performance,

## Jamstack Website Architecture Diagram

![Architecture diagram](/assets/docs/images/uploads/jamstack-deploy.png)
![Architecture diagram](/assets/docs/images/uploads/jamstack-deploy.png?v=2)

### Jamstack Website Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ namespace: docs_arch_infra_auto_apps_delivery
This flow assumes a service has been created for saving an HTML page containing a list of products. For further information, check the [Implementation](#implementation) section.
:::

![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png)
![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png?v=2)

### Application Delivery and Operations Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ namespace: docs_arch_infra_auto_apps
This flow assumes a service has been created for installing Azion CLI on the edge node. For further information, check the [Implementation](#implementation) section.
:::

![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png)
![Orchestrator architecture diagram](/assets/docs/images/uploads/infrastructure-arch.png?v=2)


### Dataflow
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ In this context, autonomous systems operate with minimal or no human interventio

## Security Automation Architecture Diagram

![Azion Security Automation Architecture Diagram](/assets/docs/images/uploads/diagram-security-automation.png)
![Azion Security Automation Architecture Diagram](/assets/docs/images/uploads/diagram-security-automation.png?v=2)

### Security Automation Dataflow

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ This use case is ideal for organizations looking to build a strong online presen

## Security Modernization Architecture Diagram

![Security Modernization Architecture Diagram](/assets/docs/images/uploads/diagram-security-modernization.png)
![Security Modernization Architecture Diagram](/assets/docs/images/uploads/diagram-security-modernization.png?v=2)

1. A request reaches Azion Web Platform.
2. Firewall processes the request.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Através desse perímetro, você pode implementar soluções como:

## Diagrama de arquitetura de segurança de API Gateways

![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png)
![API Gateway Security Architecture Diagram](/assets/docs/images/uploads/api-gateways-security-flow.png?v=2)

### Fluxo de dados de segurança de API Gateways

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ Essa solução é ideal para organizações que buscam mitigar riscos de seguran
## Diagrama da arquitetura de gerenciamento de bots

{/* ![Diagrama de arquitetura](/assets/docs/images/uploads/diagram-bot-management.png) */}
![Diagrama de arquitetura](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png)
![Diagrama de arquitetura](/assets/docs/images/uploads/application-and-network-security/light-bot-management.png?v=2)

### Fluxo de dados do gerenciamento de bots

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Leia mais sobre o [Modelo de Responsabilidade Compartilhada](/pt-br/documentacao

## Diagrama de Arquitetura de Governança, Risco e Conformidade

![Diagrama de Arquitetura de Governança, Risco e Conformidade](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png)
![Diagrama de Arquitetura de Governança, Risco e Conformidade](/assets/docs/images/uploads/azion-governance-risk-compliance-architecture.png?v=2)

### Fluxo de Dados de Governança, Risco e Conformidade

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ Esta solução é ideal para desenvolvedores e organizações que desejam aprimo

## Diagrama da arquitetura de aceleração de aplicações

![Visão geral de uma requisição/resposta através do Application](/assets/docs/images/uploads/app-acceleration-arch.png)
![Visão geral de uma requisição/resposta através do Application](/assets/docs/images/uploads/app-acceleration-arch.png?v=2)

### Fluxo de dados de aceleração de aplicações

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Sua aplicação pode ser completamente hospedada na Azion, mas há também a pos

## Arquitetura

![Visão geral de uma requisição/resposta via Application](/assets/docs/images/uploads/app-modernization.png)
![Visão geral de uma requisição/resposta via Application](/assets/docs/images/uploads/app-modernization.png?v=2)

### Fluxo de dados

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Além disso, aumenta a flexibilidade ao permitir que cada serviço seja desenvol

## Arquitetura

![Representação de uma requisição/resposta em uma configuração de microsserviços](/assets/docs/images/uploads/microservices-arch.png)
![Representação de uma requisição/resposta em uma configuração de microsserviços](/assets/docs/images/uploads/microservices-arch.png?v=2)

### Fluxo de dados

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Os benefícios do serverless são numerosos: oferece escalabilidade, eficiência

## Arquitetura

![Visão geral de uma requisição/resposta através da application](/assets/docs/images/uploads/serverless-apps.png)
![Visão geral de uma requisição/resposta através da application](/assets/docs/images/uploads/serverless-apps.png?v=2)


### Fluxo de Dados
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Usando os serviços e produtos da Azion, é possível demonstrar como a funciona

## Arquitetura de Aplicações Melhoradas

![Visão geral de uma requisição/resposta do carrinho de compras através de Application](/assets/docs/images/uploads/edge-enhanced.png)
![Visão geral de uma requisição/resposta do carrinho de compras através de Application](/assets/docs/images/uploads/edge-enhanced.png?v=2)

### Fluxo de dados

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Essa abordagem executa a detecção de fraude diretamente no edge, antes de atin

## Diagrama de prevenção de fraudes online

![Diagrama de prevenção de fraudes online na Azion](/assets/docs/images/uploads/online-fraud-prevention-architecture.png)
![Diagrama de prevenção de fraudes online na Azion](/assets/docs/images/uploads/online-fraud-prevention-architecture.png?v=2)

### Fluxo de dados na prevenção de fraudes online

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ Esta solução é ideal para organizações que buscam proteger sua infraestrutu

## Diagrama da arquitetura de proteção de aplicações web e APIs (WAAP)

![Diagrama de arquitetura](/assets/docs/images/uploads/diagram-waap.png)
![Diagrama de arquitetura](/assets/docs/images/uploads/diagram-waap.png?v=2)

### Fluxo de dados da proteção de aplicações web e APIs (WAAP)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ A Azion fornece serviços e produtos para criar [aplicações](https://www.azion

## Arquitetura de aplicações edge-native

![Arquitetura de aplicações edge-native](/assets/docs/images/uploads/edge-native-arch.png)
![Arquitetura de aplicações edge-native](/assets/docs/images/uploads/edge-native-arch.png?v=2)

### Fluxo de dados

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Essa solução é ideal para organizações que buscam melhorar o desempenho do

## Diagrama de Arquitetura Jamstack

![Diagrama de Arquitetura](/assets/docs/images/uploads/jamstack-deploy.png)
![Diagrama de Arquitetura](/assets/docs/images/uploads/jamstack-deploy.png?v=2)

### Fluxo de Dados Jamstack

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ O [Azion Orchestrator](/pt-br/documentacao/produtos/deploy/edge-orchestrator/) p
Este fluxo pressupõe que um serviço foi criado para salvar uma página HTML contendo uma lista de produtos. Para mais informações, verifique a seção [Implementação](#implementacao).
:::

![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png)
![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png?v=2)

### Fluxo de dados da entrega e operações de aplicações

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ O [Azion Orchestrator](/pt-br/documentacao/produtos/deploy/edge-orchestrator/) p
Este fluxo pressupõe que um serviço foi criado para instalar a Azion CLI no edge node. Para mais informações, verifique a seção [Implementação](#implementacao).
:::

![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png)
![Diagrama de arquitetura do Orchestrator](/assets/docs/images/uploads/infrastructure-arch.png?v=2)


### Fluxo de dados
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Nesse contexto, sistemas autônomos operam com mínima ou nenhuma intervenção

## Diagrama de Arquitetura de Automação de Segurança

![Diagrama de Arquitetura de Automação de Segurança da Azion](/assets/docs/images/uploads/diagram-security-automation.png)
![Diagrama de Arquitetura de Automação de Segurança da Azion](/assets/docs/images/uploads/diagram-security-automation.png?v=2)

### Fluxo de Dados da Automação de Segurança

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Este caso de uso é ideal para organizações que buscam construir uma forte pre

## Diagrama de arquitetura de modernização de segurança

![Diagrama de arquitetura de modernização de segurança](/assets/docs/images/uploads/diagram-security-modernization.png)
![Diagrama de arquitetura de modernização de segurança](/assets/docs/images/uploads/diagram-security-modernization.png?v=2)

1. Uma requisição chega na Azion Web Platform.
2. O Firewall processa a requisição.
Expand Down