|
@@ -44,34 +44,4 @@ locals {
|
|
|
"ns-417.awsdns-52.com",
|
|
|
],
|
|
|
}
|
|
|
-
|
|
|
- # For testing
|
|
|
- create_test_instance = false
|
|
|
- test_instance_key_name = "fdamstra" # The key with which to provision the test instance
|
|
|
-
|
|
|
-# Palo Alto moved to govcloud
|
|
|
-# panorama_count = 2 # We need a second serial number for 2
|
|
|
-# #panorama_instance_type = "m5.2xlarge"
|
|
|
-# panorama_instance_type = "t3.xlarge"
|
|
|
-# panorama_key_name = "fdamstra" # DO NOT CHANGE
|
|
|
-# palo_alto_count = 2 # should be divisible by 2
|
|
|
-# palo_alto_instance_type = "m5.xlarge"
|
|
|
-# palo_alto_key_name = "fdamstra" # DO NOT CHANGE
|
|
|
-#
|
|
|
-# # To generate auth keys, log in to the panorama cli and run:
|
|
|
-# # request bootstrap vm-auth-key generate lifetime 720
|
|
|
-# # where 720 is the validity period in hours (720 is 30 days)
|
|
|
-# # (Should only need to be valid when you stand up the firewall)
|
|
|
-# palo_alto_auth_keys = [
|
|
|
-# "919502713609312", # Expires at: 2020/07/30 21:32:44
|
|
|
-# "655051814206833", # Expires at: 2020/07/30 21:32:45
|
|
|
-# ]
|
|
|
-# palo_alto_license_keys = [ # one per count
|
|
|
-# "32836999",
|
|
|
-# "65202677"
|
|
|
-# ]
|
|
|
-# palo_alto_feature_auth_keys = [ # one per count, not yet implemented
|
|
|
-# "28341453",
|
|
|
-# "62158825"
|
|
|
-# ]
|
|
|
}
|