-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
6836ed7
commit a23a8f2
Showing
12 changed files
with
216 additions
and
74 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -95,17 +95,30 @@ | |
|
||
#owner_tag = "[email protected]" | ||
|
||
## 11. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## 11. SSH management access from the local VPC is enabled by default (true). Uncomment if you | ||
## want to disable this. | ||
## Note: Cloud Connector will only be accessible via AWS Session Manager SSM | ||
|
||
#mgmt_ssh_enabled = false | ||
|
||
## 12. By default, a security group is created and assigned to the CC service interface(s). | ||
## There is an optional rule that permits Cloud Connector to forward direct traffic out | ||
## on all ports and protocols. (Default: true). Uncomment if you want to restrict | ||
## traffic to only the ZIA/ZPA required HTTPS TCP/UDP ports. | ||
|
||
#all_ports_egress_enabled = false | ||
|
||
## 13. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## Uncomment if you want to use the same Security Group for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_security_group = true | ||
|
||
## 12. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## 14. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## Uncomment if you want to use the same IAM Role/Instance Profile for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_iam = true | ||
|
||
## 13. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## 15. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## This variable is provided if a customer desires to override or retain an old ami for existing deployments rather than upgrading and forcing a replacement. | ||
## It is also inputted as a list to facilitate if a customer desired to manually upgrade only select CCs deployed based on the cc_count index | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -110,17 +110,30 @@ | |
|
||
#owner_tag = "[email protected]" | ||
|
||
## 11. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## 11. SSH management access from the local VPC is enabled by default (true). Uncomment if you | ||
## want to disable this. | ||
## Note: Cloud Connector will only be accessible via AWS Session Manager SSM | ||
|
||
#mgmt_ssh_enabled = false | ||
|
||
## 12. By default, a security group is created and assigned to the CC service interface(s). | ||
## There is an optional rule that permits Cloud Connector to forward direct traffic out | ||
## on all ports and protocols. (Default: true). Uncomment if you want to restrict | ||
## traffic to only the ZIA/ZPA required HTTPS TCP/UDP ports. | ||
|
||
#all_ports_egress_enabled = false | ||
|
||
## 13. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## Uncomment if you want to use the same Security Group for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_security_group = true | ||
|
||
## 12. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## 14. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## Uncomment if you want to use the same IAM Role/Instance Profile for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_iam = true | ||
|
||
## 13. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## 15. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## This variable is provided if a customer desires to override or retain an old ami for existing deployments rather than upgrading and forcing a replacement. | ||
## It is also inputted as a list to facilitate if a customer desired to manually upgrade only select CCs deployed based on the cc_count index | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -77,17 +77,30 @@ | |
|
||
#owner_tag = "[email protected]" | ||
|
||
## 11. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## 11. SSH management access from the local VPC is enabled by default (true). Uncomment if you | ||
## want to disable this. | ||
## Note: Cloud Connector will only be accessible via AWS Session Manager SSM | ||
|
||
#mgmt_ssh_enabled = false | ||
|
||
## 12. By default, a security group is created and assigned to the CC service interface(s). | ||
## There is an optional rule that permits Cloud Connector to forward direct traffic out | ||
## on all ports and protocols. (Default: true). Uncomment if you want to restrict | ||
## traffic to only the ZIA/ZPA required HTTPS TCP/UDP ports. | ||
|
||
#all_ports_egress_enabled = false | ||
|
||
## 13. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## Uncomment if you want to use the same Security Group for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_security_group = true | ||
|
||
## 12. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## 14. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## Uncomment if you want to use the same IAM Role/Instance Profile for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_iam = true | ||
|
||
## 13. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## 15. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## This variable is provided if a customer desires to override or retain an old ami for existing deployments rather than upgrading and forcing a replacement. | ||
## It is also inputted as a list to facilitate if a customer desired to manually upgrade only select CCs deployed based on the cc_count index | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -110,17 +110,30 @@ | |
|
||
#owner_tag = "[email protected]" | ||
|
||
## 11. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## 11. SSH management access from the local VPC is enabled by default (true). Uncomment if you | ||
## want to disable this. | ||
## Note: Cloud Connector will only be accessible via AWS Session Manager SSM | ||
|
||
#mgmt_ssh_enabled = false | ||
|
||
## 12. By default, a security group is created and assigned to the CC service interface(s). | ||
## There is an optional rule that permits Cloud Connector to forward direct traffic out | ||
## on all ports and protocols. (Default: true). Uncomment if you want to restrict | ||
## traffic to only the ZIA/ZPA required HTTPS TCP/UDP ports. | ||
|
||
#all_ports_egress_enabled = false | ||
|
||
## 13. By default, this script will apply 1 Security Group per Cloud Connector instance. | ||
## Uncomment if you want to use the same Security Group for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_security_group = true | ||
|
||
## 12. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## 14. By default, this script will apply 1 IAM Role/Instance Profile per Cloud Connector instance. | ||
## Uncomment if you want to use the same IAM Role/Instance Profile for ALL Cloud Connectors (true or false. Default: false) | ||
|
||
#reuse_iam = true | ||
|
||
## 13. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## 15. By default, terraform will always query the AWS Marketplace for the latest Cloud Connector AMI available. | ||
## This variable is provided if a customer desires to override or retain an old ami for existing deployments rather than upgrading and forcing a replacement. | ||
## It is also inputted as a list to facilitate if a customer desired to manually upgrade only select CCs deployed based on the cc_count index | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.