You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{/* TODO: create preamble specifically for compute accounts */}
11
+
8
12
Cloudflare CASB detects when integrations are unhealthy or outdated.
9
13
10
14
Common integration issues include changes to SaaS app or cloud environment configurations, user access, or permission scope. Integrations may need to be updated to support new features or permissions.
11
15
12
16
## Upgrade a compute account
13
17
14
-
Upgrading a compute account applies the latest software features, bug fixes, and infrastructure changes to a cloud compute account. Upgrades should be run periodically to keep the compute account software up to date or when recommended by Cloudflare to address an issue.
18
+
Upgrading a compute account applies the latest software features, bug fixes, and infrastructure changes to a cloud compute account. You should run upgrades periodically to keep the compute account software up to date or when recommended by Cloudflare to address an issue. CASB deploys compute account upgrades through Terraform updates.
15
19
16
20
To upgrade a compute account:
17
21
18
-
1. Download the latest Terraform configuration using the "latest templates" API route.
19
-
1. Navigate to your integration in the CASB Dashboard
20
-
2. Select the integration you created for cloud scanning
21
-
3. You should see a "Connect a compute account" module. Click "Open Connection Instructions" Here, you'll be able to see the latest terraform that you can download
22
-
2. Validate that your local machine has the AWS or GCP CLI installed
23
-
3. Validate that an AWS or GCP profile is configured and set to the intended region, and using IAM credentials for a user in the intended AWS or GCP account
24
-
4. Validate that the Terraform state file created during previous Terraform activities for this account is available
25
-
5. Update cached version of the CDS Terraform modules: terraform init --upgrade
26
-
6. Apply the downloaded terraform configuration: terraform apply
22
+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
23
+
2. Choose the integration you created for cloud scanning.
24
+
3. Select **Open connection instructions**.
25
+
4. Follow the instructions provided to validate your local Terraform and CLI configuration.
26
+
5. Under **Step 2: Deploy Terraform Configuration**, copy the template to your local configuration.
27
+
6. In a terminal, update the cached version of the CDS Terraform modules.
0 commit comments