Skip to content

Commit 481ec43

Browse files
committed
Replace other variables
1 parent 3990d9a commit 481ec43

File tree

4 files changed

+19
-18
lines changed

4 files changed

+19
-18
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/configure-tunnels/remote-management.mdx

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -187,14 +187,15 @@ To rotate a tunnel token:
187187

188188
1. Refresh the token on Cloudflare:
189189

190-
<Tabs syncKey="dashPlusAPI">
190+
<Tabs syncKey="dashPlusAPI">
191191
<TabItem label="Dashboard">
192+
192193
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Networks** > **Tunnels**.
193-
2. Select a `cloudflared` tunnel and select **Edit**.
194-
3. Select **Refresh token**.
195-
4. Copy the `cloudflared` installation command for your operating system. This command contains the new token.
194+
1. Select a `cloudflared` tunnel and select **Edit**.
195+
1. Select **Refresh token**.
196+
1. Copy the `cloudflared` installation command for your operating system. This command contains the new token.
196197

197-
</TabItem>
198+
</TabItem>
198199
<TabItem label="API">
199200

200201
1. Generate a random base64 string (minimum size 32 bytes) to use as a tunnel secret:
@@ -211,7 +212,7 @@ To rotate a tunnel token:
211212

212213
```sh
213214
curl --request PATCH \
214-
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/cfd_tunnel/{tunnel_id} \
215+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/cfd_tunnel/$TUNNEL_ID \
215216
--header 'Content-Type: application/json' \
216217
--header "Authorization: Bearer <API_TOKEN>" \
217218
--data '{
@@ -245,34 +246,34 @@ To rotate a tunnel token:
245246

246247
3. Copy the `token` value shown in the output.
247248

248-
</TabItem>
249+
</TabItem>
249250
</Tabs>
250251

251252
After refreshing the token, `cloudflared` can no longer establish new connections to Cloudflare using the old token. However, existing connectors will remain active and the tunnel will continue serving traffic.
252253

253-
2. On half of your `cloudflared` replicas, update `cloudflared` to use the new token. For example, on a Linux host:
254+
1. On half of your `cloudflared` replicas, update `cloudflared` to use the new token. For example, on a Linux host:
254255

255256
```sh
256257
sudo cloudflared service install <TOKEN>
257258
```
258259

259-
3. Restart `cloudflared`:
260+
1. Restart `cloudflared`:
260261

261262
```sh
262263
sudo systemctl restart cloudflared.service
263264
```
264265

265-
4. Confirm that the service started correctly:
266+
1. Confirm that the service started correctly:
266267

267268
```sh
268269
sudo systemctl status cloudflared
269270
```
270271

271272
While these replicas are connecting to Cloudflare with the new token, traffic will automatically route through the other replicas.
272273

273-
5. Wait 10 minutes for traffic to route through the new connectors.
274+
1. Wait 10 minutes for traffic to route through the new connectors.
274275

275-
6. Repeat steps 2, 3, and 4 for the second half of the replicas.
276+
1. Repeat steps 2, 3, and 4 for the second half of the replicas.
276277

277278
The tunnel token is now fully rotated. The old token is no longer in use.
278279

@@ -285,7 +286,7 @@ If your tunnel token is compromised, we recommend taking the following steps:
285286

286287
```sh
287288
curl --request DELETE \
288-
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/cfd_tunnel/{tunnel_id}/connections \
289+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/cfd_tunnel/$TUNNEL_ID/connections \
289290
--header "Authorization: Bearer <API_TOKEN>"
290291
```
291292

src/content/docs/cloudflare-one/identity/idp-integration/entra-id.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -278,7 +278,7 @@ You can require users to re-enter their credentials into Entra ID whenever they
278278
2. [Update the Entra ID identity provider](/api/resources/zero_trust/subresources/identity_providers/methods/update/) using a `PUT` request. In the request body, include all existing configurations and set the `prompt` parameter to either `login` or `select_account`. For example,
279279
```sh {17}
280280
curl --request PUT \
281-
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/access/identity_providers/{identity_provider_id} \
281+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/access/identity_providers/$IDENTITY_PROVIDER_ID \
282282
--header "Authorization: Bearer <API_TOKEN>" \
283283
--header "Content-Type: application/json" \
284284
--data '{

src/content/docs/cloudflare-one/policies/access/policy-management.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@ You can use the API to convert a legacy policy into a reusable policy. To conver
8282

8383
```bash
8484
curl --request PUT \
85-
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/access/apps/{app_id}/policies/{policy_id}/make_reusable \
85+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/access/apps/$APP_ID/policies/$POLICY_ID/make_reusable \
8686
--header "Authorization: Bearer <API_TOKEN>"
8787
```
8888

89-
The policy is now removed from the applications endpoint (`/access/apps/{app_id}/policies`) and managed using the [reusable policies endpoints](/api/resources/zero_trust/subresources/access/subresources/policies/)(`/access/policies/{policy_id}`).
89+
The policy is now removed from the applications endpoint (`/access/apps/$APP_ID/policies`) and managed using the [reusable policies endpoints](/api/resources/zero_trust/subresources/access/subresources/policies/)(`/access/policies/$POLICY_ID`).

src/content/docs/cloudflare-one/tutorials/user-selectable-egress-ips.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ After creating your virtual networks, route your private network CIDRs over each
9090

9191
```bash
9292
curl --request PATCH \
93-
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/teamnet/routes/{route_id} \
93+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/teamnet/routes/$ROUTE_ID \
9494
--header "Authorization: Bearer <API_TOKEN>" \
9595
--header "Content-Type: application/json" \
9696
--data '{
@@ -106,7 +106,7 @@ After creating your virtual networks, route your private network CIDRs over each
106106

107107
```bash
108108
curl --request PATCH \
109-
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/teamnet/routes/{route_id} \
109+
https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/teamnet/routes/$ROUTE_ID \
110110
--header "Authorization: Bearer <API_TOKEN>" \
111111
--header "Content-Type: application/json" \
112112
--data '{

0 commit comments

Comments
 (0)