<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reference - FortiGate Terraform Web UI</title><link>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_2_autoscale_template/3_5_reference.html</link><description>Outputs Reference Important outputs from the template:
terraform output Output Description Use Case inspection_vpc_id ID of inspection VPC VPC peering, routing configuration inspection_vpc_cidr CIDR of inspection VPC Route table configuration gwlb_arn Gateway Load Balancer ARN GWLB endpoint creation gwlb_endpoint_az1_id GWLB endpoint ID in AZ1 Spoke VPC route tables gwlb_endpoint_az2_id GWLB endpoint ID in AZ2 Spoke VPC route tables fortigate_autoscale_group_name BYOL ASG name CloudWatch, monitoring fortigate_ondemand_autoscale_group_name PAYG ASG name CloudWatch, monitoring lambda_function_name Lifecycle Lambda function name CloudWatch logs, debugging dynamodb_table_name License tracking table name License management s3_bucket_name License storage bucket name License management tgw_attachment_id TGW attachment ID TGW routing configuration Best Practices Pre-Deployment Plan capacity thoroughly: Use Autoscale Group Capacity guidance Test in dev/test first: Validate configuration before production Document customizations: Maintain runbook of configuration decisions Review security groups: Ensure least-privilege access Coordinate with network team: Verify CIDR allocations don’t conflict During Deployment Monitor Lambda logs: Watch for errors during instance launch Verify license assignments: Check first instance gets licensed before scaling Test connectivity incrementally: Validate routing at each step Document public IPs: Save instance IPs for troubleshooting access Post-Deployment Configure firewall policies immediately: Don’t leave FortiGates in pass-through mode Enable security profiles: IPS, Application Control, Web Filtering Set up monitoring: CloudWatch alarms, FortiGate logging Test failover scenarios: Verify autoscaling behavior Document recovery procedures: Maintain runbook for common issues Ongoing Operations Monitor autoscale events: Review CloudWatch metrics weekly Update FortiOS regularly: Test updates in dev first Review firewall logs: Look for blocked traffic patterns Optimize scaling thresholds: Adjust based on observed traffic Plan capacity additions: Add licenses/entitlements before needed Cleanup Destroying the Deployment To destroy the autoscale_template infrastructure:</description><generator>Hugo</generator><language>en-US</language><atom:link href="https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_2_autoscale_template/3_5_reference/index.xml" rel="self" type="application/rss+xml"/></channel></rss>