Skip to content

Commit

Permalink
Updated README
Browse files Browse the repository at this point in the history
  • Loading branch information
chkp-yairra committed Jun 20, 2024
1 parent b2df1e2 commit 6c139b8
Show file tree
Hide file tree
Showing 8 changed files with 126 additions and 98 deletions.
2 changes: 1 addition & 1 deletion azure/templates/marketplace-ha/createUiDefinition.json
Original file line number Diff line number Diff line change
Expand Up @@ -1632,7 +1632,7 @@
"label": "Availability options",
"defaultValue": "Availability Set",
"toolTip": "Use replicated Cluster VMs in Availability Set or Availability Zones. Note that the load balancers and their IP addresses will be zone redundant in any case.",
"visible": "[contains(' australiaeast brazilsouth canadacentral centralus eastasia eastus eastus2 francecentral germanywestcentral japaneast koreacentral northeurope norwayeast southafricanorth southcentralus southeastasia swedencentral uksouth usgovvirginia westeurope westus2 westus3 switzerlandnorth qatarcentral centralindia uaenorth italynorth \\ ', concat(' ', location(), ' '))]",
"visible": "[contains(' australiaeast brazilsouth canadacentral centralus eastasia eastus eastus2 francecentral germanywestcentral japaneast koreacentral northeurope norwayeast southafricanorth southcentralus southeastasia swedencentral uksouth usgovvirginia westeurope westus2 westus3 switzerlandnorth qatarcentral centralindia uaenorth italynorth ', concat(' ', location(), ' '))]",
"constraints": {
"allowedValues": [
{
Expand Down
4 changes: 2 additions & 2 deletions azure/templates/single-ipv6/mainTemplate.json
Original file line number Diff line number Diff line change
Expand Up @@ -667,8 +667,8 @@
"properties": {
"dhcpOptions": {
"dnsServers": [
"cafe:43:: ",
"cafe:45:: "
"cafe:43::",
"cafe:45::"
]
},
"addressSpace": {
Expand Down
5 changes: 2 additions & 3 deletions azure/templates/vmss-ipv6/mainTemplate.json
Original file line number Diff line number Diff line change
Expand Up @@ -872,8 +872,8 @@
"properties": {
"dhcpOptions": {
"dnsServers": [
"cafe:43:: ",
"cafe:45:: "
"cafe:43::",
"cafe:45::"
]
},
"addressSpace": {
Expand Down Expand Up @@ -1003,7 +1003,6 @@
},
"tags": "[ if(contains(parameters('tagsByResource'), 'Microsoft.Compute/images'), parameters('tagsByResource')['Microsoft.Compute/images'], json('{}')) ]"
},

{
"type": "Microsoft.Network/networkSecurityGroups",
"condition": "[and(parameters('deployNewNSG'),equals(parameters('vnetNewOrExisting'), 'new'))]",
Expand Down
29 changes: 29 additions & 0 deletions terraform/azure/modules/add-routing-intent.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
import json
import requests
import sys


def perform_put_request(url, data, headers=None):
"""
This function perform the PUT request to Azure in order to edit the vWAN Hub Routing-Intent
"""
result = {"status": "success", "message": ""}
try:
response = requests.put(url, json=data, headers=headers)
result["message"] = response.text
except Exception as e:
result["status"] = "error"
result["message"] = f"An error occurred: {str(e)}"
return result


if __name__ == "__main__":
"""
This script receives url, body, and authorization token as arguments and set vWAN Hub Routing-Intent
"""
api_url = sys.argv[1]
api_data = eval(sys.argv[2])
auth_token = sys.argv[3]
api_headers = {"Authorization": f'Bearer {auth_token}'}
result = perform_put_request(api_url, api_data, api_headers)
print(json.dumps(result))
4 changes: 2 additions & 2 deletions terraform/azure/nva-into-existing-hub/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Check Point CloudGuard Network Security Virtual WAN Terraform deployment for Azure

This Terraform module deploys Check Point CloudGuard Network Security vWAN NVA solution into an existing vWAN Hub in Azure.
This Terraform module deploys Check Point CloudGuard Network Security Virtual WAN NVA solution into an existing vWAN Hub in Azure.
As part of the deployment the following resources are created:
- Resource groups
- Azure Managed Application:
Expand Down Expand Up @@ -77,7 +77,7 @@ please see the [CloudGuard Network for Azure Virtual WAN Deployment Guide](https
| | | | | |
| **vwan-hub-name** | The name of the virtual WAN hub that will be created | string | The name must begin with a letter or number, end with a letter, number or underscore, and may contain only letters, numbers, underscores, periods, or hyphens | n/a |
| | | | | |
| **vwan-hub-resource-group** | The vWAN hub resource group name | string | | n/a |
| **vwan-hub-resource-group** | The virtual WAN hub resource group name | string | | n/a |
| | | | | |
| **managed-app-name** | The name of the managed application that will be created | string | The name must begin with a letter or number, end with a letter, number or underscore, and may contain only letters, numbers, underscores, periods, or hyphens | "tf-vwan-managed-app-nva" |
| | | | | |
Expand Down
2 changes: 1 addition & 1 deletion terraform/azure/nva-into-new-vwan/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Check Point CloudGuard Network Security Virtual WAN Terraform deployment for Azure

This Terraform module deploys Check Point CloudGuard Network Security vWAN NVA solution into a new vWAN Hub in Azure.
This Terraform module deploys Check Point CloudGuard Network Security Virtual WAN NVA solution into a new vWAN Hub in Azure.
As part of the deployment the following resources are created:
- Resource groups
- Virtual WAN
Expand Down
Loading

0 comments on commit 6c139b8

Please sign in to comment.