Managing FortiOS with Terraform

You want to manage your FortiOS device like Fortigate using a more reliable and a “zero-touch” environment. The Fortinet’s main goal with this provider, I guess, is for those who want to fully automate their environments on AWS, Azure, GCP or another cloud provider. But you can also use this provider to maintain your Fortigate box as well in a very efficient way. Yeah, I know, Ansible. Maybe It’s a better way to do this kind of management using Ansible, but I just want to show you that it is possible to do it in a different way.

Using Gitlab-CI to manage your Terraform/Cloudflare configuration

Everyone who uses Cloudflare already known the quality and reliability even for free plan users. So I don’t need any kind of backup alright? Wrong. We are humans and shit happens… all time… always. Actually, at this moment, someone are making a mistake. Ask to Murphy. That’s why it’s a good idea use Terraform and use a versioning system to maintain a history of modifications. (adsbygoogle=window.adsbygoogle||[]).push({}) Well, basically you will need to create a new repository in yours Gitlab account (if you didn’t yet), add your terraform files into this repository.

Gerenciando as configurações no Cloudflare com Terraform

A intenção aqui é ir direto ao ponto e mostrar por meio de exemplos como gerenciar seu DNS e algumas configurações da sua conta no Cloudflare utilizando o Terraform. As vantagens deste modelo são inúmeras, entre elas a facilidade de ter sua estrutura definida por código, a possibilidade de versionamento, um backup para algum eventual problema… As respectivas documentações podem ser encontradas nos links abaixo: Cloudflare Provider - Terraform Cloudflare Terraform Docs - Cloudflare (adsbygoogle=window.