zli ssh-proxy-configat the shell prompt. Your output should look similar to this, where
USERNAMEis your username:
ProxyCommand zli ssh-proxy -s %h %r %p /Users/USERNAME/Library/Preferences/bastionzero-zli-nodejs/bzero-temp-key
~/.ssh/configfile. Go ahead, use your favorite shell editor and add those lines. If your config file or .ssh directory does not exist, go ahead and create them.
bzero-to BastionZero. You can validate this by creating a shell to the target. If your target name was dogfood and the Linux user in your policy was WeUseOurStuff, you would simply type:
ssh [email protected].\
ssh -L 6100:localhost:5432 -TNf [email protected]
ssh -L 6101:myRDStest.randomSubName.us-east-1.rds.amazonaws.com:5432 -TNf [email protected]
ssh bzero-postgres-serverand your port forwards are all created! Note, the file is always read top down so at the end of any specific target call out, we've left the generic BastionZero tunnel capability in the file.
psql -U postgres -h localhost -p 6101