<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: creating a R81.20 gw in AWS with terraform in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/188021#M157</link>
    <description>&lt;P&gt;Hi Daniel,&lt;BR /&gt;In the terraform.tfvars file you can change gateway_version from R81-BYOL to desired version&lt;BR /&gt;In the README.md file we provide all possible options&lt;/P&gt;
&lt;DIV id="tinyMceEditor_1940fb6e24db41Roman_Kats_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gateway_version_readme.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21913iC8385B76537F9175/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gateway_version_readme.jpg" alt="gateway_version_readme.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Roman&lt;/P&gt;</description>
    <pubDate>Sun, 30 Jul 2023 06:12:31 GMT</pubDate>
    <dc:creator>Roman_Kats</dc:creator>
    <dc:date>2023-07-30T06:12:31Z</dc:date>
    <item>
      <title>creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186633#M148</link>
      <description>&lt;P style="margin: 0px;"&gt;RE: main.tf &lt;/P&gt;
&lt;P style="margin: 0px;"&gt;&lt;A href="https://github.com/CheckPointSW/CloudGuardIaaS/blob/master/terraform/aws/gateway-master/main.tf" target="_blank"&gt;https://github.com/CheckPointSW/CloudGuardIaaS/blob/master/terraform/aws/gateway-master/main.tf&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0px;"&gt;&lt;A href="https://github.com/CheckPointSW/CloudGuardIaaS/blob/master/terraform/aws/gateway-master/variables.tf" target="_blank"&gt;https://github.com/CheckPointSW/CloudGuardIaaS/blob/master/terraform/aws/gateway-master/variables.tf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are getting an error where it doesn't like the syntax of commenting out the contents of this block&lt;/P&gt;
&lt;PRE class="language-plaintext"&gt;&lt;CODE&gt;provider "aws" {
//&amp;nbsp;&amp;nbsp;&amp;nbsp; region = var.region
//&amp;nbsp;&amp;nbsp;&amp;nbsp; access_key = var.access_key
//&amp;nbsp;&amp;nbsp;&amp;nbsp; secret_key = var.secret_key
}&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;because it's a deprecated method, but it&amp;nbsp; is how they say to do it in the CP documentation&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;╷&lt;/SPAN&gt;&lt;BR style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #242424; font-family: 'Cascadia Mono', Consolas, ui-monospace, Menlo, Monaco, monospace; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN&gt;│ Error: Cannot override provider configuration&lt;/SPAN&gt;&lt;BR style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #242424; font-family: 'Cascadia Mono', Consolas, ui-monospace, Menlo, Monaco, monospace; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN&gt;│&lt;/SPAN&gt;&lt;BR style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #242424; font-family: 'Cascadia Mono', Consolas, ui-monospace, Menlo, Monaco, monospace; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN&gt;│&amp;nbsp;&amp;nbsp; on main.tf line 33, in module "launch_gateway_into_vpc":&lt;/SPAN&gt;&lt;BR style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #242424; font-family: 'Cascadia Mono', Consolas, ui-monospace, Menlo, Monaco, monospace; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN&gt;│&amp;nbsp;&amp;nbsp; 33:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aws = aws&lt;/SPAN&gt;&lt;BR style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #242424; font-family: 'Cascadia Mono', Consolas, ui-monospace, Menlo, Monaco, monospace; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN&gt;│&lt;/SPAN&gt;&lt;BR style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #242424; font-family: 'Cascadia Mono', Consolas, ui-monospace, Menlo, Monaco, monospace; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN&gt;│ The configuration of module.launch_gateway_into_vpc has its own local configuration for aws, and so it cannot&lt;/SPAN&gt;&lt;BR style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #242424; font-family: 'Cascadia Mono', Consolas, ui-monospace, Menlo, Monaco, monospace; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN&gt;│ accept an overridden configuration provided by the root module.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which refers to this&lt;/P&gt;
&lt;PRE class="language-plaintext"&gt;&lt;CODE&gt;module "launch_gateway_into_vpc" {
  source = "../gateway"
  providers = {
 &amp;nbsp;&amp;nbsp; aws = aws
  }&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;which I believe is referring to this&lt;/P&gt;
&lt;PRE class="language-plaintext"&gt;&lt;CODE&gt;provider "aws" {
 &amp;nbsp;&amp;nbsp; region = var.region
 &amp;nbsp;&amp;nbsp; access_key = var.access_key
 &amp;nbsp;&amp;nbsp; secret_key = var.secret_key
}&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 19:04:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186633#M148</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-07-17T19:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186644#M149</link>
      <description>&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Hi,&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;The comments:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 9.75pt; color: #333333;"&gt;&lt;SPAN&gt;provider "aws" {&lt;BR /&gt;//&amp;nbsp;&amp;nbsp;&amp;nbsp; region = var.region&lt;BR /&gt;//&amp;nbsp;&amp;nbsp;&amp;nbsp; access_key = var.access_key&lt;BR /&gt;//&amp;nbsp;&amp;nbsp;&amp;nbsp; secret_key = var.secret_key&lt;BR /&gt;}&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Need to be in two places:&lt;BR /&gt;1. main.tf in gateway folder&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;2. main.tf in gateway-master folder&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;BR /&gt;Do you have it in both places?&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 06:47:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186644#M149</guid>
      <dc:creator>meravbe</dc:creator>
      <dc:date>2023-07-18T06:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186712#M150</link>
      <description>&lt;P&gt;When we comment it out in both places it prompts us to ask for the region and keys&lt;/P&gt;
&lt;P&gt;although, we do have the region and keys in terraform.tfvars&amp;nbsp;&lt;/P&gt;
&lt;P&gt;commenting it out in both places is for putting the region and keys in environment variables&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we put those in environment variables and run terraform plan we get these errors now.&amp;nbsp; &amp;nbsp;Well the overall network is 10.4.0.0/16 we want several 24 bit subnets.&lt;/P&gt;
&lt;PRE class="language-plaintext"&gt;&lt;CODE&gt;╷
│ Warning: Redundant empty provider block
│
│&amp;nbsp;&amp;nbsp; on ../gateway/main.tf line 1:
│&amp;nbsp;&amp;nbsp;&amp;nbsp; 1: provider "aws" {
│
│ Earlier versions of Terraform used empty provider blocks ("proxy provider configurations") for child modules to declare their need to be passed a provider configuration by their callers. That approach was ambiguous and is now
│ deprecated.
│
│ If you control this module, you can migrate to the new declaration syntax by removing all of the empty provider "aws" blocks and then adding or updating an entry like the following to the required_providers block of
│ module.launch_gateway_into_vpc:
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aws = {
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source = "hashicorp/aws"
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }
╵
╷
│ Error: Error in function call
│
│&amp;nbsp;&amp;nbsp; on ../modules/vpc/main.tf line 17, in resource "aws_subnet" "public_subnets":
│&amp;nbsp;&amp;nbsp; 17:&amp;nbsp;&amp;nbsp; cidr_block = cidrsubnet(aws_vpc.vpc.cidr_block, var.subnets_bit_length, each.value)
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ├────────────────
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ while calling cidrsubnet(prefix, newbits, netnum)
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ aws_vpc.vpc.cidr_block is "10.4.0.0/16"
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ each.value is "1"
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ var.subnets_bit_length is 24
│
│ Call to function "cidrsubnet" failed: insufficient address space to extend prefix of 16 by 24.
╵
╷
│ Error: Error in function call
│
│&amp;nbsp;&amp;nbsp; on ../modules/vpc/main.tf line 30, in resource "aws_subnet" "private_subnets":
│&amp;nbsp;&amp;nbsp; 30:&amp;nbsp;&amp;nbsp; cidr_block = cidrsubnet(aws_vpc.vpc.cidr_block, var.subnets_bit_length, each.value)
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ├────────────────
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ while calling cidrsubnet(prefix, newbits, netnum)
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ aws_vpc.vpc.cidr_block is "10.4.0.0/16"
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ each.value is "2"
│&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; │ var.subnets_bit_length is 24
│
│ Call to function "cidrsubnet" failed: insufficient address space to extend prefix of 16 by 24&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 15:20:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186712#M150</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-07-18T15:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186716#M151</link>
      <description>&lt;P&gt;We are moving ahead now, changing var.subnets_bit_length to 8 may fix it, 16+8=24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;variable "subnets_bit_length" {&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; type = number&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; description = "Number of additional bits with which to extend the vpc cidr. For example, if given a vpc_cidr ending in /16 and a subnets_bit_length value of 4, the resulting subnet address will have length /20."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 15:36:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186716#M151</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-07-18T15:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186735#M152</link>
      <description>&lt;P&gt;I closed this case, but I'm still trying to figure out what this does&lt;/P&gt;
&lt;PRE class="language-plaintext"&gt;&lt;CODE&gt; each.value is "2"&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 18:21:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186735#M152</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-07-18T18:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186796#M153</link>
      <description>&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;We are using the 'cidrsubnet' function from Terraform (&lt;A href="https://developer.hashicorp.com/terraform/language/functions/cidrsubnet" target="_blank"&gt;https://developer.hashicorp.com/terraform/language/functions/cidrsubnet&lt;/A&gt;).&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;BR /&gt;The 'each.value' parameter represents the value in either public_subnet_map or private_subnet_map,&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;which will be used to populate the additional bits added to the 'vpc_cidr'.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;BR /&gt;In your case, for 'public_subnet_map' you set the region to 1, 'vpc_cidr' to 10.4.0.0/16 and 'subnets_bit_length' to 24.&lt;BR /&gt;The 'cidrsubnet' function attempted to calculate a subnet address, but the result was invalid - '10.4.1.0/40'.&lt;BR /&gt;After you corrected the 'subnets_bit_length', the function now returns 10.4.1.0/24.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 05:48:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186796#M153</guid>
      <dc:creator>meravbe</dc:creator>
      <dc:date>2023-07-19T05:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186864#M154</link>
      <description>&lt;P&gt;Interesting.&amp;nbsp; So, what would change in the above scenario&amp;nbsp; setting the region/'each.value to 2? &amp;nbsp;&amp;nbsp; Using 1 as each value the public network of 10.4.1.0/24 and private network of 10.4.2.0/24 was created.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually, 'each.value'isn't in Main.tf, that was just in the error message, so there is no each.value variable to set.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 15:12:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/186864#M154</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-07-19T15:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/187053#M155</link>
      <description>&lt;P&gt;One of the parameters in terraform.tfvars is:&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;public_subnets_map = {
  "us-east-1a" = 1
}&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;During the deployment preperation we use the 'for_each' function (from terraform) in &lt;/SPAN&gt;&lt;SPAN&gt;vpc/main.tf:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;resource "aws_subnet" "public_subnets" {
  for_each = var.public_subnets_map
  vpc_id = aws_vpc.vpc.id
  availability_zone = each.key
  cidr_block = cidrsubnet(aws_vpc.vpc.cidr_block, 
  var.subnets_bit_length, each.value)
  map_public_ip_on_launch = true
  tags = {
    Name = format("Public subnet %s", each.value)
  }
}&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;According to the code above:&lt;BR /&gt;for_each = { "us-east-1a" = 1}&lt;BR /&gt;each.key = "us-east-1a"&lt;BR /&gt;each.value = 1&lt;BR /&gt;&lt;BR /&gt;When a function fails, terraform prints the function's name and the value of the parameters.&lt;BR /&gt;This is why in your case 'each.value' represents the value of the region in 'public_subnets_map'.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 12:58:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/187053#M155</guid>
      <dc:creator>meravbe</dc:creator>
      <dc:date>2023-07-20T12:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/187897#M156</link>
      <description>&lt;P&gt;Thanks meravbe!&lt;/P&gt;
&lt;P&gt;Another issue we're running into is that the gw was created with R81, jhf82 and we wanted R81.20 jhf24.&amp;nbsp; &amp;nbsp;We are looking for the scripts.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2023 16:01:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/187897#M156</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-07-27T16:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/188021#M157</link>
      <description>&lt;P&gt;Hi Daniel,&lt;BR /&gt;In the terraform.tfvars file you can change gateway_version from R81-BYOL to desired version&lt;BR /&gt;In the README.md file we provide all possible options&lt;/P&gt;
&lt;DIV id="tinyMceEditor_1940fb6e24db41Roman_Kats_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gateway_version_readme.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21913iC8385B76537F9175/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gateway_version_readme.jpg" alt="gateway_version_readme.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Roman&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jul 2023 06:12:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/188021#M157</guid>
      <dc:creator>Roman_Kats</dc:creator>
      <dc:date>2023-07-30T06:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: creating a R81.20 gw in AWS with terraform</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/188289#M158</link>
      <description>&lt;P&gt;Looking good now!&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently, we have a CP gw being created in one VPC and the linux servers using another VPC and networks.&amp;nbsp; We're trying to consolidate it all into one being under one umbrella (VPC/network).&amp;nbsp; Specifically getting a couple of nginx &amp;amp; haproxy servers to form in the same private network and VPC we just created, behind this new CP gateway.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, Is CME just for auto-provisioning?&amp;nbsp;&amp;nbsp; I’m wondering if there is any use with terraform as far as when a gw is destroyed and added.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/CME_Structure_and_Configurations.htm?tocpath=CME%20Structure%20and%20Configurations%7C_____0#CME_Structure_and_Configurations" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/CME_Structure_and_Configurations.htm?tocpath=CME%20Structure%20and%20Configurations%7C_____0#CME_Structure_and_Configurations&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 19:54:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/creating-a-R81-20-gw-in-AWS-with-terraform/m-p/188289#M158</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-08-01T19:54:22Z</dc:date>
    </item>
  </channel>
</rss>

