From 120bf7c426fba1165fd45c91fd1bf8097abaedf4 Mon Sep 17 00:00:00 2001 From: fshuva Date: Wed, 5 Oct 2022 10:50:58 -0700 Subject: [PATCH 1/2] - Updating firmware to v7.2.2B1255 - Readme update --- README.md | 27 ++++++++++++--------------- vars.tf | 6 ++++-- 2 files changed, 16 insertions(+), 17 deletions(-) diff --git a/README.md b/README.md index c44b205..8c41ae7 100644 --- a/README.md +++ b/README.md @@ -5,22 +5,22 @@ After the active VM is back up, it will take over as active once again. ## Requirements -- [Terraform](https://learn.hashicorp.com/terraform/getting-started/install.html) 0.13+ -- Two FortiOS 7.0 BYOL Licenses. -- [A VPC with four subnets in a single zone](https://cloud.ibm.com/docs/vpc/vpc-getting-started-with-ibm-cloud-virtual-private-cloud-infrastructure) -- [A configured IBM SSH key](https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys) -- [A security group](https://cloud.ibm.com/docs/security-groups?topic=security-groups-about-ibm-security-groups) +- [Terraform](https://learn.hashicorp.com/terraform/getting-started/install.html) 0.13+ +- Two FortiOS 7.0 BYOL Licenses. +- [A VPC with four subnets in a single zone](https://cloud.ibm.com/docs/vpc/vpc-getting-started-with-ibm-cloud-virtual-private-cloud-infrastructure) +- [A configured IBM SSH key](https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys) +- [A security group](https://cloud.ibm.com/docs/security-groups?topic=security-groups-about-ibm-security-groups) ## Deployment overview -> **Note:** For a local deployment, a Gen 2 API key will be needed. For details see [IBM Gen 2 API key](https://cloud.ibm.com/docs/terraform?topic=terraform-provider-reference). +> **Note:** For a local deployment, a Gen 2 API key will be needed. For details see [IBM Gen 2 API key](https://cloud.ibm.com/docs/account?topic=account-userapikey&interface=ui#create_user_key). Terraform deploys the following components: -- Two FortiGate BYOL instances with four NICs each, one in each subnet. -- Three floating Public IP addresses: one attached to the Primary FortiGate on Port1, which will failover and the other two attached to the HA management port (Port4) of each FortiGate. -- One log disk per FortiGate. -- A basic bootstrap configuration with HA support. +- Two FortiGate BYOL instances with four NICs each, one in each subnet. +- Three floating Public IP addresses: one attached to the Primary FortiGate on Port1, which will failover and the other two attached to the HA management port (Port4) of each FortiGate. +- One log disk per FortiGate. +- A basic bootstrap configuration with HA support. # Deployment Diagram @@ -32,13 +32,10 @@ Terraform deploys the following components: 1. Fill in the required Subnets, security group and VPC information as shown in the example below: - ![IBM FortiGate Example Inputs](https://raw.githubusercontent.com/fortinet/ibm-fortigate-AP-HA-terraform-deploy/main/imgs/IBM_ha_example.png) - - -3. Apply the plan. -4. Outputs, such as the **Public IP** and **Default username and password** can be found under the `View Log` link. +2. Apply the plan. +3. Outputs, such as the **Public IP** and **Default username and password** can be found under the `View Log` link. ## Destroy the cluster diff --git a/vars.tf b/vars.tf index 53d52d7..c6fe5d3 100644 --- a/vars.tf +++ b/vars.tf @@ -153,14 +153,16 @@ resource "random_string" "random_suffix" { // FortiOS Custom Image ID // https://docs.fortinet.com/document/fortigate-public-cloud/7.0.0/ibm-cloud-administration-guide/324064/ha-for-fortigate-vm-on-ibm-cloud -//Deploys 7.2.0 Image +//Deploys 7.2.2 Image variable "image" { - default = "cos://us-geo/fortinet/fortigate_byol_721_b1254_GA.qcow2" + default = "cos://us-geo/fortinet/fortigate_byol_722_b1255_GA.qcow2" } + variable "IBMCLOUD_API_KEY" { default = "" description = "Your IBM USER API key. Refer to the README for links to documentation for IBM API keys. This value is required for the SDN Connector for HA SYNC." } + // Default Instance type // See: https://cloud.ibm.com/docs/vpc?topic=vpc-profiles variable "PROFILE" { From 9f10248c4ede300ddec90b1b3be82f65a7e6db22 Mon Sep 17 00:00:00 2001 From: fshuva Date: Thu, 6 Oct 2022 10:23:56 -0700 Subject: [PATCH 2/2] updating IBM API key --- README.md | 25 ++++++++++++++----------- 1 file changed, 14 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 8c41ae7..8cccb13 100644 --- a/README.md +++ b/README.md @@ -5,11 +5,11 @@ After the active VM is back up, it will take over as active once again. ## Requirements -- [Terraform](https://learn.hashicorp.com/terraform/getting-started/install.html) 0.13+ -- Two FortiOS 7.0 BYOL Licenses. -- [A VPC with four subnets in a single zone](https://cloud.ibm.com/docs/vpc/vpc-getting-started-with-ibm-cloud-virtual-private-cloud-infrastructure) -- [A configured IBM SSH key](https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys) -- [A security group](https://cloud.ibm.com/docs/security-groups?topic=security-groups-about-ibm-security-groups) +- [Terraform](https://learn.hashicorp.com/terraform/getting-started/install.html) 0.13+ +- Two FortiOS 7.0 BYOL Licenses. +- [A VPC with four subnets in a single zone](https://cloud.ibm.com/docs/vpc/vpc-getting-started-with-ibm-cloud-virtual-private-cloud-infrastructure) +- [A configured IBM SSH key](https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys) +- [A security group](https://cloud.ibm.com/docs/security-groups?topic=security-groups-about-ibm-security-groups) ## Deployment overview @@ -17,10 +17,10 @@ After the active VM is back up, it will take over as active once again. Terraform deploys the following components: -- Two FortiGate BYOL instances with four NICs each, one in each subnet. -- Three floating Public IP addresses: one attached to the Primary FortiGate on Port1, which will failover and the other two attached to the HA management port (Port4) of each FortiGate. -- One log disk per FortiGate. -- A basic bootstrap configuration with HA support. +- Two FortiGate BYOL instances with four NICs each, one in each subnet. +- Three floating Public IP addresses: one attached to the Primary FortiGate on Port1, which will failover and the other two attached to the HA management port (Port4) of each FortiGate. +- One log disk per FortiGate. +- A basic bootstrap configuration with HA support. # Deployment Diagram @@ -32,10 +32,13 @@ Terraform deploys the following components: 1. Fill in the required Subnets, security group and VPC information as shown in the example below: + ![IBM FortiGate Example Inputs](https://raw.githubusercontent.com/fortinet/ibm-fortigate-AP-HA-terraform-deploy/main/imgs/IBM_ha_example.png) -2. Apply the plan. -3. Outputs, such as the **Public IP** and **Default username and password** can be found under the `View Log` link. + + +3. Apply the plan. +4. Outputs, such as the **Public IP** and **Default username and password** can be found under the `View Log` link. ## Destroy the cluster