1. Packages
  2. Cloudflare Provider
  3. API Docs
  4. getDnsFirewalls
Cloudflare v6.1.1 published on Monday, Apr 21, 2025 by Pulumi

cloudflare.getDnsFirewalls

Explore with Pulumi AI

cloudflare logo
Cloudflare v6.1.1 published on Monday, Apr 21, 2025 by Pulumi

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as cloudflare from "@pulumi/cloudflare";
    
    const exampleDnsFirewalls = cloudflare.getDnsFirewalls({
        accountId: "023e105f4ecef8ad9ca31a8372d0c353",
    });
    
    import pulumi
    import pulumi_cloudflare as cloudflare
    
    example_dns_firewalls = cloudflare.get_dns_firewalls(account_id="023e105f4ecef8ad9ca31a8372d0c353")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-cloudflare/sdk/v6/go/cloudflare"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := cloudflare.LookupDnsFirewalls(ctx, &cloudflare.LookupDnsFirewallsArgs{
    			AccountId: "023e105f4ecef8ad9ca31a8372d0c353",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Cloudflare = Pulumi.Cloudflare;
    
    return await Deployment.RunAsync(() => 
    {
        var exampleDnsFirewalls = Cloudflare.GetDnsFirewalls.Invoke(new()
        {
            AccountId = "023e105f4ecef8ad9ca31a8372d0c353",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.cloudflare.CloudflareFunctions;
    import com.pulumi.cloudflare.inputs.GetDnsFirewallsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var exampleDnsFirewalls = CloudflareFunctions.getDnsFirewalls(GetDnsFirewallsArgs.builder()
                .accountId("023e105f4ecef8ad9ca31a8372d0c353")
                .build());
    
        }
    }
    
    variables:
      exampleDnsFirewalls:
        fn::invoke:
          function: cloudflare:getDnsFirewalls
          arguments:
            accountId: 023e105f4ecef8ad9ca31a8372d0c353
    

    Using getDnsFirewalls

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getDnsFirewalls(args: GetDnsFirewallsArgs, opts?: InvokeOptions): Promise<GetDnsFirewallsResult>
    function getDnsFirewallsOutput(args: GetDnsFirewallsOutputArgs, opts?: InvokeOptions): Output<GetDnsFirewallsResult>
    def get_dns_firewalls(account_id: Optional[str] = None,
                          max_items: Optional[int] = None,
                          opts: Optional[InvokeOptions] = None) -> GetDnsFirewallsResult
    def get_dns_firewalls_output(account_id: Optional[pulumi.Input[str]] = None,
                          max_items: Optional[pulumi.Input[int]] = None,
                          opts: Optional[InvokeOptions] = None) -> Output[GetDnsFirewallsResult]
    func LookupDnsFirewalls(ctx *Context, args *LookupDnsFirewallsArgs, opts ...InvokeOption) (*LookupDnsFirewallsResult, error)
    func LookupDnsFirewallsOutput(ctx *Context, args *LookupDnsFirewallsOutputArgs, opts ...InvokeOption) LookupDnsFirewallsResultOutput

    > Note: This function is named LookupDnsFirewalls in the Go SDK.

    public static class GetDnsFirewalls 
    {
        public static Task<GetDnsFirewallsResult> InvokeAsync(GetDnsFirewallsArgs args, InvokeOptions? opts = null)
        public static Output<GetDnsFirewallsResult> Invoke(GetDnsFirewallsInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetDnsFirewallsResult> getDnsFirewalls(GetDnsFirewallsArgs args, InvokeOptions options)
    public static Output<GetDnsFirewallsResult> getDnsFirewalls(GetDnsFirewallsArgs args, InvokeOptions options)
    
    fn::invoke:
      function: cloudflare:index/getDnsFirewalls:getDnsFirewalls
      arguments:
        # arguments dictionary

    The following arguments are supported:

    AccountId string
    Identifier.
    MaxItems int
    Max items to fetch, default: 1000
    AccountId string
    Identifier.
    MaxItems int
    Max items to fetch, default: 1000
    accountId String
    Identifier.
    maxItems Integer
    Max items to fetch, default: 1000
    accountId string
    Identifier.
    maxItems number
    Max items to fetch, default: 1000
    account_id str
    Identifier.
    max_items int
    Max items to fetch, default: 1000
    accountId String
    Identifier.
    maxItems Number
    Max items to fetch, default: 1000

    getDnsFirewalls Result

    The following output properties are available:

    AccountId string
    Identifier.
    Id string
    The provider-assigned unique ID for this managed resource.
    Results List<GetDnsFirewallsResult>
    The items returned by the data source
    MaxItems int
    Max items to fetch, default: 1000
    AccountId string
    Identifier.
    Id string
    The provider-assigned unique ID for this managed resource.
    Results []GetDnsFirewallsResult
    The items returned by the data source
    MaxItems int
    Max items to fetch, default: 1000
    accountId String
    Identifier.
    id String
    The provider-assigned unique ID for this managed resource.
    results List<GetDnsFirewallsResult>
    The items returned by the data source
    maxItems Integer
    Max items to fetch, default: 1000
    accountId string
    Identifier.
    id string
    The provider-assigned unique ID for this managed resource.
    results GetDnsFirewallsResult[]
    The items returned by the data source
    maxItems number
    Max items to fetch, default: 1000
    account_id str
    Identifier.
    id str
    The provider-assigned unique ID for this managed resource.
    results Sequence[GetDnsFirewallsResult]
    The items returned by the data source
    max_items int
    Max items to fetch, default: 1000
    accountId String
    Identifier.
    id String
    The provider-assigned unique ID for this managed resource.
    results List<Property Map>
    The items returned by the data source
    maxItems Number
    Max items to fetch, default: 1000

    Supporting Types

    GetDnsFirewallsResult

    AttackMitigation GetDnsFirewallsResultAttackMitigation
    Attack mitigation settings
    DeprecateAnyRequests bool
    Whether to refuse to answer queries for the ANY type
    DnsFirewallIps List<string>
    EcsFallback bool
    Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
    Id string
    Identifier.
    MaximumCacheTtl double
    Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
    MinimumCacheTtl double
    Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
    ModifiedOn string
    Last modification of DNS Firewall cluster
    Name string
    DNS Firewall cluster name
    NegativeCacheTtl double
    Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
    Ratelimit double
    Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
    Retries double
    Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
    UpstreamIps List<string>
    AttackMitigation GetDnsFirewallsResultAttackMitigation
    Attack mitigation settings
    DeprecateAnyRequests bool
    Whether to refuse to answer queries for the ANY type
    DnsFirewallIps []string
    EcsFallback bool
    Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
    Id string
    Identifier.
    MaximumCacheTtl float64
    Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
    MinimumCacheTtl float64
    Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
    ModifiedOn string
    Last modification of DNS Firewall cluster
    Name string
    DNS Firewall cluster name
    NegativeCacheTtl float64
    Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
    Ratelimit float64
    Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
    Retries float64
    Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
    UpstreamIps []string
    attackMitigation GetDnsFirewallsResultAttackMitigation
    Attack mitigation settings
    deprecateAnyRequests Boolean
    Whether to refuse to answer queries for the ANY type
    dnsFirewallIps List<String>
    ecsFallback Boolean
    Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
    id String
    Identifier.
    maximumCacheTtl Double
    Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
    minimumCacheTtl Double
    Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
    modifiedOn String
    Last modification of DNS Firewall cluster
    name String
    DNS Firewall cluster name
    negativeCacheTtl Double
    Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
    ratelimit Double
    Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
    retries Double
    Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
    upstreamIps List<String>
    attackMitigation GetDnsFirewallsResultAttackMitigation
    Attack mitigation settings
    deprecateAnyRequests boolean
    Whether to refuse to answer queries for the ANY type
    dnsFirewallIps string[]
    ecsFallback boolean
    Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
    id string
    Identifier.
    maximumCacheTtl number
    Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
    minimumCacheTtl number
    Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
    modifiedOn string
    Last modification of DNS Firewall cluster
    name string
    DNS Firewall cluster name
    negativeCacheTtl number
    Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
    ratelimit number
    Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
    retries number
    Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
    upstreamIps string[]
    attack_mitigation GetDnsFirewallsResultAttackMitigation
    Attack mitigation settings
    deprecate_any_requests bool
    Whether to refuse to answer queries for the ANY type
    dns_firewall_ips Sequence[str]
    ecs_fallback bool
    Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
    id str
    Identifier.
    maximum_cache_ttl float
    Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
    minimum_cache_ttl float
    Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
    modified_on str
    Last modification of DNS Firewall cluster
    name str
    DNS Firewall cluster name
    negative_cache_ttl float
    Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
    ratelimit float
    Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
    retries float
    Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
    upstream_ips Sequence[str]
    attackMitigation Property Map
    Attack mitigation settings
    deprecateAnyRequests Boolean
    Whether to refuse to answer queries for the ANY type
    dnsFirewallIps List<String>
    ecsFallback Boolean
    Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
    id String
    Identifier.
    maximumCacheTtl Number
    Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
    minimumCacheTtl Number
    Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
    modifiedOn String
    Last modification of DNS Firewall cluster
    name String
    DNS Firewall cluster name
    negativeCacheTtl Number
    Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
    ratelimit Number
    Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
    retries Number
    Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
    upstreamIps List<String>

    GetDnsFirewallsResultAttackMitigation

    Enabled bool
    When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
    OnlyWhenUpstreamUnhealthy bool
    Only mitigate attacks when upstream servers seem unhealthy
    Enabled bool
    When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
    OnlyWhenUpstreamUnhealthy bool
    Only mitigate attacks when upstream servers seem unhealthy
    enabled Boolean
    When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
    onlyWhenUpstreamUnhealthy Boolean
    Only mitigate attacks when upstream servers seem unhealthy
    enabled boolean
    When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
    onlyWhenUpstreamUnhealthy boolean
    Only mitigate attacks when upstream servers seem unhealthy
    enabled bool
    When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
    only_when_upstream_unhealthy bool
    Only mitigate attacks when upstream servers seem unhealthy
    enabled Boolean
    When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
    onlyWhenUpstreamUnhealthy Boolean
    Only mitigate attacks when upstream servers seem unhealthy

    Package Details

    Repository
    Cloudflare pulumi/pulumi-cloudflare
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the cloudflare Terraform Provider.
    cloudflare logo
    Cloudflare v6.1.1 published on Monday, Apr 21, 2025 by Pulumi