Skip to content

Commit 4ea5ba7

Browse files
committed
Remove Upgrade partial
1 parent 65950bc commit 4ea5ba7

File tree

1 file changed

+18
-10
lines changed

1 file changed

+18
-10
lines changed

src/content/docs/cloudflare-one/applications/casb/troubleshooting/troubleshoot-compute-accounts.mdx

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,25 +5,33 @@ sidebar:
55
order: 2
66
---
77

8+
import { Render, Tabs, TabItem } from "~/components";
9+
10+
{/* TODO: create preamble specifically for compute accounts */}
11+
812
Cloudflare CASB detects when integrations are unhealthy or outdated.
913

1014
Common integration issues include changes to SaaS app or cloud environment configurations, user access, or permission scope. Integrations may need to be updated to support new features or permissions.
1115

1216
## Upgrade a compute account
1317

14-
Upgrading a compute account applies the latest software features, bug fixes, and infrastructure changes to a cloud compute account. Upgrades should be run periodically to keep the compute account software up to date or when recommended by Cloudflare to address an issue.
18+
Upgrading a compute account applies the latest software features, bug fixes, and infrastructure changes to a cloud compute account. You should run upgrades periodically to keep the compute account software up to date or when recommended by Cloudflare to address an issue. CASB deploys compute account upgrades through Terraform updates.
1519

1620
To upgrade a compute account:
1721

18-
1. Download the latest Terraform configuration using the "latest templates" API route.
19-
1. Navigate to your integration in the CASB Dashboard
20-
2. Select the integration you created for cloud scanning
21-
3. You should see a "Connect a compute account" module. Click "Open Connection Instructions" Here, you'll be able to see the latest terraform that you can download
22-
2. Validate that your local machine has the AWS or GCP CLI installed
23-
3. Validate that an AWS or GCP profile is configured and set to the intended region, and using IAM credentials for a user in the intended AWS or GCP account
24-
4. Validate that the Terraform state file created during previous Terraform activities for this account is available
25-
5. Update cached version of the CDS Terraform modules: terraform init --upgrade
26-
6. Apply the downloaded terraform configuration: terraform apply
22+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
23+
2. Choose the integration you created for cloud scanning.
24+
3. Select **Open connection instructions**.
25+
4. Follow the instructions provided to validate your local Terraform and CLI configuration.
26+
5. Under **Step 2: Deploy Terraform Configuration**, copy the template to your local configuration.
27+
6. In a terminal, update the cached version of the CDS Terraform modules.
28+
```bash
29+
terraform init --upgrade
30+
```
31+
7. Apply the downloaded terraform configuration:
32+
```bash
33+
terraform apply
34+
```
2735

2836
## Rotate API tokens
2937

0 commit comments

Comments
 (0)