Skip to content

Commit 18ffdd6

Browse files
committed
Replace TF Cloudflare account ID variables
1 parent 58a09bc commit 18ffdd6

File tree

9 files changed

+21
-21
lines changed

9 files changed

+21
-21
lines changed

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/create-list.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To create a new DNS policy using **Terraform** to allow access to all approved c
5252

5353
```tf
5454
resource "cloudflare_zero_trust_gateway_policy" "allow_corporate_domain_access" {
55-
account_id = var.account_id
55+
account_id = var.cloudflare_account_id
5656
name = "All-DNS-CorporateDomain-AllowList"
5757
description = "Allow access to the corporate domains defined under the Corporate Domains list"
5858
precedence = 1

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/create-policy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ To create a new DNS policy using **Terraform**:
6565
6666
```tf
6767
resource "cloudflare_zero_trust_gateway_policy" "security_risks_dns_policy" {
68-
account_id = var.account_id
68+
account_id = var.cloudflare_account_id
6969
name = "All-DNS-SecurityCategories-Blocklist"
7070
description = "Block known security risks based on Cloudflare's threat intelligence"
7171
precedence = 0

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/recommended-dns-policies.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
4949

5050
```tf
5151
resource "cloudflare_zero_trust_gateway_policy" "dns_whitelist_policy" {
52-
account_id = var.account_id
52+
account_id = var.cloudflare_account_id
5353
name = "All-DNS-Domain-Allowlist"
5454
description = "Allowlist any known domains and hostnames"
5555
precedence = 0
@@ -105,7 +105,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
105105

106106
```tf
107107
resource "cloudflare_zero_trust_gateway_policy" "dns_restrict_quarantined_users" {
108-
account_id = var.account_id
108+
account_id = var.cloudflare_account_id
109109
name = "Quarantined-Users-DNS-Restricted-Access"
110110
description = "Restrict access for users included in an identity provider (IdP) user group for risky users"
111111
precedence = 10
@@ -189,7 +189,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
189189

190190
```tf
191191
resource "cloudflare_zero_trust_gateway_policy" "dns_geolocation_block_policy" {
192-
account_id = var.account_id
192+
account_id = var.cloudflare_account_id
193193
name = "All-DNS-GeoCountryIP-Blocklist"
194194
description = "Block traffic hosted in countries categorized as high security risks"
195195
precedence = 50
@@ -242,7 +242,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
242242

243243
```tf
244244
resource "cloudflare_zero_trust_gateway_policy" "dns_blacklist_policy" {
245-
account_id = var.account_id
245+
account_id = var.cloudflare_account_id
246246
name = "All-DNS-DomainTopLevel-Blocklist"
247247
description = "Block DNS queries of known risky TLDs"
248248
precedence = 60
@@ -296,7 +296,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
296296

297297
```tf
298298
resource "cloudflare_zero_trust_gateway_policy" "dns_phishing_domains_block" {
299-
account_id = var.account_id
299+
account_id = var.cloudflare_account_id
300300
name = "All-DNS-DomainPhishing-Blocklist"
301301
description = "Block misused domains used in phishing campaigns"
302302
precedence = 70
@@ -351,7 +351,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
351351

352352
```tf
353353
resource "cloudflare_zero_trust_gateway_policy" "dns_resolvedip_blocklist_rule" {
354-
account_id = var.account_id
354+
account_id = var.cloudflare_account_id
355355
name = "All-DNS-ResolvedIP-Blocklist"
356356
description = "Block specific IP addresses deemed to be a risk to the Organization"
357357
precedence = 80
@@ -409,7 +409,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
409409

410410
```tf
411411
resource "cloudflare_zero_trust_gateway_policy" "block_dns_domain_host" {
412-
account_id = var.account_id
412+
account_id = var.cloudflare_account_id
413413
name = "All-DNS-DomainHost-Blocklist"
414414
description = "Block specific domains or hosts that are malicious or pose a threat to your organization."
415415
precedence = 90

src/content/docs/learning-paths/secure-internet-traffic/build-network-policies/recommended-network-policies.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
5454

5555
```tf
5656
resource "cloudflare_zero_trust_gateway_policy" "quarantined_users_net_restricted_access" {
57-
account_id = var.account_id
57+
account_id = var.cloudflare_account_id
5858
name = "Quarantined-Users-NET-Restricted-Access"
5959
description = "Restrict access for users included in an IdP user group for risky users"
6060
precedence = 0
@@ -114,7 +114,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
114114

115115
```tf
116116
resource "cloudflare_zero_trust_gateway_policy" "posture_fail_net_restricted_access" {
117-
account_id = var.account_id
117+
account_id = var.cloudflare_account_id
118118
name = "Posture-Fail-NET-Restricted-Access"
119119
description = "Restrict access for devices where baseline posture checks have not passed"
120120
precedence = 0
@@ -172,7 +172,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
172172

173173
```tf
174174
resource "cloudflare_zero_trust_gateway_policy" "finance_users_net_https_finance_servers" {
175-
account_id = var.account_id
175+
account_id = var.cloudflare_account_id
176176
name = "FinanceUsers-NET-HTTPS-FinanceServers"
177177
description = "Allow HTTPS access for user groups"
178178
precedence = 0
@@ -230,7 +230,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
230230

231231
```tf
232232
resource "cloudflare_zero_trust_gateway_policy" "finance_users_net_https_finance_servers" {
233-
account_id = var.account_id
233+
account_id = var.cloudflare_account_id
234234
name = "All-NET-Internet-Blocklist"
235235
description = "Block traffic to malicious or risky destination IPs, SNIs, and SNI domains"
236236
precedence = 0
@@ -293,7 +293,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
293293

294294
```tf
295295
resource "cloudflare_zero_trust_gateway_policy" "all_net_ssh_internet_allowlist" {
296-
account_id = var.account_id
296+
account_id = var.cloudflare_account_id
297297
name = "All-NET-SSH-Internet-Allowlist"
298298
description = "Allow SSH traffic to specific endpoints on the Internet for specific users"
299299
precedence = 0
@@ -348,7 +348,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
348348

349349
```tf
350350
resource "cloudflare_zero_trust_gateway_policy" "all_net_no_http_https_internet_deny" {
351-
account_id = var.account_id
351+
account_id = var.cloudflare_account_id
352352
name = "All-NET-NO-HTTP-HTTPS-Internet-Deny"
353353
description = "Block all non-web traffic towards the Internet"
354354
precedence = 0
@@ -401,7 +401,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
401401

402402
```tf
403403
resource "cloudflare_zero_trust_gateway_policy" "all_net_internalnetwork_implicitdeny" {
404-
account_id = var.account_id
404+
account_id = var.cloudflare_account_id
405405
name = "All-NET-InternalNetwork-ImplicitDeny"
406406
description = "Implicitly deny all of your internal IP ranges included in a list"
407407
precedence = 0

src/content/partials/cloudflare-one/gateway/policies/dash-plus-api/dns/block-applications.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rule \
3737

3838
```tf
3939
resource "cloudflare_zero_trust_gateway_policy" "block_unauthorized_apps" {
40-
account_id = var.account_id
40+
account_id = var.cloudflare_account_id
4141
name = "All-DNS-Application-Blocklist"
4242
description = "Block access to unauthorized AI applications"
4343
enabled = true

src/content/partials/cloudflare-one/gateway/policies/dash-plus-api/dns/block-content-categories.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rule \
3636

3737
```tf
3838
resource "cloudflare_zero_trust_gateway_policy" "block_content_categories" {
39-
account_id = var.account_id
39+
account_id = var.cloudflare_account_id
4040
name = "All-DNS-ContentCategories-Blocklist"
4141
description = "Block common content categories that may pose a risk"
4242
enabled = true

src/content/partials/cloudflare-one/gateway/policies/dash-plus-api/dns/block-security-categories.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rule \
3737
3838
```tf
3939
resource "cloudflare_zero_trust_gateway_policy" "block_security_threats" {
40-
account_id = var.account_id
40+
account_id = var.cloudflare_account_id
4141
name = "All-DNS-SecurityCategories-Blocklist"
4242
description = "Block security categories based on Cloudflare's threat intelligence"
4343
precedence = 20

src/content/partials/cloudflare-one/gateway/policies/dash-plus-api/http/block-content-categories.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rule \
3636

3737
```tf
3838
resource "cloudflare_zero_trust_gateway_policy" "block_unauthorized_apps" {
39-
account_id = var.account_id
39+
account_id = var.cloudflare_account_id
4040
name = "All-HTTP-Application-Blocklist"
4141
description = "Block access to unauthorized AI applications"
4242
enabled = true

src/content/partials/cloudflare-one/gateway/policies/dash-plus-api/network/enforce-device-posture.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To get the UUIDs of your device posture checks, use the [List device posture rul
4242

4343
```tf
4444
resource "cloudflare_zero_trust_gateway_policy" "all_net_applicationaccess_allow" {
45-
account_id = var.account_id
45+
account_id = var.cloudflare_account_id
4646
name = "All-NET-ApplicationAccess-Allow"
4747
description = "Ensure access to the application comes from authorized WARP clients"
4848
precedence = 5000

0 commit comments

Comments
 (0)