1. Packages
  2. Cloudflare Provider
  3. API Docs
  4. getDnsFirewall
Cloudflare v6.0.1 published on Wednesday, Apr 16, 2025 by Pulumi

cloudflare.getDnsFirewall

Explore with Pulumi AI

Cloudflare v6.0.1 published on Wednesday, Apr 16, 2025 by Pulumi

Example Usage

import * as pulumi from "@pulumi/pulumi";
import * as cloudflare from "@pulumi/cloudflare";

const exampleDnsFirewall = cloudflare.getDnsFirewall({
    accountId: "023e105f4ecef8ad9ca31a8372d0c353",
    dnsFirewallId: "023e105f4ecef8ad9ca31a8372d0c353",
});
Copy
import pulumi
import pulumi_cloudflare as cloudflare

example_dns_firewall = cloudflare.get_dns_firewall(account_id="023e105f4ecef8ad9ca31a8372d0c353",
    dns_firewall_id="023e105f4ecef8ad9ca31a8372d0c353")
Copy
package main

import (
	"github.com/pulumi/pulumi-cloudflare/sdk/v6/go/cloudflare"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := cloudflare.LookupDnsFirewall(ctx, &cloudflare.LookupDnsFirewallArgs{
			AccountId:     "023e105f4ecef8ad9ca31a8372d0c353",
			DnsFirewallId: pulumi.StringRef("023e105f4ecef8ad9ca31a8372d0c353"),
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cloudflare = Pulumi.Cloudflare;

return await Deployment.RunAsync(() => 
{
    var exampleDnsFirewall = Cloudflare.GetDnsFirewall.Invoke(new()
    {
        AccountId = "023e105f4ecef8ad9ca31a8372d0c353",
        DnsFirewallId = "023e105f4ecef8ad9ca31a8372d0c353",
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cloudflare.CloudflareFunctions;
import com.pulumi.cloudflare.inputs.GetDnsFirewallArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        final var exampleDnsFirewall = CloudflareFunctions.getDnsFirewall(GetDnsFirewallArgs.builder()
            .accountId("023e105f4ecef8ad9ca31a8372d0c353")
            .dnsFirewallId("023e105f4ecef8ad9ca31a8372d0c353")
            .build());

    }
}
Copy
variables:
  exampleDnsFirewall:
    fn::invoke:
      function: cloudflare:getDnsFirewall
      arguments:
        accountId: 023e105f4ecef8ad9ca31a8372d0c353
        dnsFirewallId: 023e105f4ecef8ad9ca31a8372d0c353
Copy

Using getDnsFirewall

Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

function getDnsFirewall(args: GetDnsFirewallArgs, opts?: InvokeOptions): Promise<GetDnsFirewallResult>
function getDnsFirewallOutput(args: GetDnsFirewallOutputArgs, opts?: InvokeOptions): Output<GetDnsFirewallResult>
Copy
def get_dns_firewall(account_id: Optional[str] = None,
                     dns_firewall_id: Optional[str] = None,
                     opts: Optional[InvokeOptions] = None) -> GetDnsFirewallResult
def get_dns_firewall_output(account_id: Optional[pulumi.Input[str]] = None,
                     dns_firewall_id: Optional[pulumi.Input[str]] = None,
                     opts: Optional[InvokeOptions] = None) -> Output[GetDnsFirewallResult]
Copy
func LookupDnsFirewall(ctx *Context, args *LookupDnsFirewallArgs, opts ...InvokeOption) (*LookupDnsFirewallResult, error)
func LookupDnsFirewallOutput(ctx *Context, args *LookupDnsFirewallOutputArgs, opts ...InvokeOption) LookupDnsFirewallResultOutput
Copy

> Note: This function is named LookupDnsFirewall in the Go SDK.

public static class GetDnsFirewall 
{
    public static Task<GetDnsFirewallResult> InvokeAsync(GetDnsFirewallArgs args, InvokeOptions? opts = null)
    public static Output<GetDnsFirewallResult> Invoke(GetDnsFirewallInvokeArgs args, InvokeOptions? opts = null)
}
Copy
public static CompletableFuture<GetDnsFirewallResult> getDnsFirewall(GetDnsFirewallArgs args, InvokeOptions options)
public static Output<GetDnsFirewallResult> getDnsFirewall(GetDnsFirewallArgs args, InvokeOptions options)
Copy
fn::invoke:
  function: cloudflare:index/getDnsFirewall:getDnsFirewall
  arguments:
    # arguments dictionary
Copy

The following arguments are supported:

AccountId This property is required. string
Identifier
DnsFirewallId string
Identifier
AccountId This property is required. string
Identifier
DnsFirewallId string
Identifier
accountId This property is required. String
Identifier
dnsFirewallId String
Identifier
accountId This property is required. string
Identifier
dnsFirewallId string
Identifier
account_id This property is required. str
Identifier
dns_firewall_id str
Identifier
accountId This property is required. String
Identifier
dnsFirewallId String
Identifier

getDnsFirewall Result

The following output properties are available:

AccountId string
Identifier
AttackMitigation GetDnsFirewallAttackMitigation
Attack mitigation settings
DeprecateAnyRequests bool
Whether to refuse to answer queries for the ANY type
DnsFirewallIps List<string>
EcsFallback bool
Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
Id string
Identifier
MaximumCacheTtl double
Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
MinimumCacheTtl double
Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
ModifiedOn string
Last modification of DNS Firewall cluster
Name string
DNS Firewall cluster name
NegativeCacheTtl double
Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
Ratelimit double
Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
Retries double
Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
UpstreamIps List<string>
DnsFirewallId string
Identifier
AccountId string
Identifier
AttackMitigation GetDnsFirewallAttackMitigation
Attack mitigation settings
DeprecateAnyRequests bool
Whether to refuse to answer queries for the ANY type
DnsFirewallIps []string
EcsFallback bool
Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
Id string
Identifier
MaximumCacheTtl float64
Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
MinimumCacheTtl float64
Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
ModifiedOn string
Last modification of DNS Firewall cluster
Name string
DNS Firewall cluster name
NegativeCacheTtl float64
Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
Ratelimit float64
Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
Retries float64
Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
UpstreamIps []string
DnsFirewallId string
Identifier
accountId String
Identifier
attackMitigation GetDnsFirewallAttackMitigation
Attack mitigation settings
deprecateAnyRequests Boolean
Whether to refuse to answer queries for the ANY type
dnsFirewallIps List<String>
ecsFallback Boolean
Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
id String
Identifier
maximumCacheTtl Double
Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
minimumCacheTtl Double
Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
modifiedOn String
Last modification of DNS Firewall cluster
name String
DNS Firewall cluster name
negativeCacheTtl Double
Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
ratelimit Double
Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
retries Double
Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
upstreamIps List<String>
dnsFirewallId String
Identifier
accountId string
Identifier
attackMitigation GetDnsFirewallAttackMitigation
Attack mitigation settings
deprecateAnyRequests boolean
Whether to refuse to answer queries for the ANY type
dnsFirewallIps string[]
ecsFallback boolean
Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
id string
Identifier
maximumCacheTtl number
Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
minimumCacheTtl number
Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
modifiedOn string
Last modification of DNS Firewall cluster
name string
DNS Firewall cluster name
negativeCacheTtl number
Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
ratelimit number
Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
retries number
Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
upstreamIps string[]
dnsFirewallId string
Identifier
account_id str
Identifier
attack_mitigation GetDnsFirewallAttackMitigation
Attack mitigation settings
deprecate_any_requests bool
Whether to refuse to answer queries for the ANY type
dns_firewall_ips Sequence[str]
ecs_fallback bool
Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
id str
Identifier
maximum_cache_ttl float
Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
minimum_cache_ttl float
Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
modified_on str
Last modification of DNS Firewall cluster
name str
DNS Firewall cluster name
negative_cache_ttl float
Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
ratelimit float
Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
retries float
Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
upstream_ips Sequence[str]
dns_firewall_id str
Identifier
accountId String
Identifier
attackMitigation Property Map
Attack mitigation settings
deprecateAnyRequests Boolean
Whether to refuse to answer queries for the ANY type
dnsFirewallIps List<String>
ecsFallback Boolean
Whether to forward client IP (resolver) subnet if no EDNS Client Subnet is sent
id String
Identifier
maximumCacheTtl Number
Maximum DNS cache TTL This setting sets an upper bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Higher TTLs will be decreased to the maximum defined here for caching purposes.
minimumCacheTtl Number
Minimum DNS cache TTL This setting sets a lower bound on DNS TTLs for purposes of caching between DNS Firewall and the upstream servers. Lower TTLs will be increased to the minimum defined here for caching purposes.
modifiedOn String
Last modification of DNS Firewall cluster
name String
DNS Firewall cluster name
negativeCacheTtl Number
Negative DNS cache TTL This setting controls how long DNS Firewall should cache negative responses (e.g., NXDOMAIN) from the upstream servers.
ratelimit Number
Ratelimit in queries per second per datacenter (applies to DNS queries sent to the upstream nameservers configured on the cluster)
retries Number
Number of retries for fetching DNS responses from upstream nameservers (not counting the initial attempt)
upstreamIps List<String>
dnsFirewallId String
Identifier

Supporting Types

GetDnsFirewallAttackMitigation

Enabled This property is required. bool
When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
OnlyWhenUpstreamUnhealthy This property is required. bool
Only mitigate attacks when upstream servers seem unhealthy
Enabled This property is required. bool
When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
OnlyWhenUpstreamUnhealthy This property is required. bool
Only mitigate attacks when upstream servers seem unhealthy
enabled This property is required. Boolean
When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
onlyWhenUpstreamUnhealthy This property is required. Boolean
Only mitigate attacks when upstream servers seem unhealthy
enabled This property is required. boolean
When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
onlyWhenUpstreamUnhealthy This property is required. boolean
Only mitigate attacks when upstream servers seem unhealthy
enabled This property is required. bool
When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
only_when_upstream_unhealthy This property is required. bool
Only mitigate attacks when upstream servers seem unhealthy
enabled This property is required. Boolean
When enabled, automatically mitigate random-prefix attacks to protect upstream DNS servers
onlyWhenUpstreamUnhealthy This property is required. Boolean
Only mitigate attacks when upstream servers seem unhealthy

Package Details

Repository
Cloudflare pulumi/pulumi-cloudflare
License
Apache-2.0
Notes
This Pulumi package is based on the cloudflare Terraform Provider.
Cloudflare v6.0.1 published on Wednesday, Apr 16, 2025 by Pulumi