terraform fmt
This commit is contained in:
parent
91b12bb8b9
commit
057a0330ca
@ -1,125 +1,125 @@
|
||||
resource "azurerm_public_ip" "azure_bastion" {
|
||||
name = "pip-azure-bastion"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
allocation_method = "Static"
|
||||
sku = "Standard"
|
||||
resource "azurerm_public_ip" "azure_bastion" {
|
||||
name = "pip-azure-bastion"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
allocation_method = "Static"
|
||||
sku = "Standard"
|
||||
}
|
||||
|
||||
resource "azurerm_network_security_group" "bastion_nsg" {
|
||||
name = "nsg-bastion"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
resource "azurerm_network_security_group" "bastion_nsg" {
|
||||
name = "nsg-bastion"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
|
||||
security_rule {
|
||||
name = "AllowHTTPSInbound"
|
||||
priority = 100
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "443"
|
||||
source_address_prefix = "Internet"
|
||||
destination_address_prefix = "*"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowGatewayManagerInbound"
|
||||
priority = 200
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "443"
|
||||
source_address_prefix = "GatewayManager"
|
||||
destination_address_prefix = "*"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowAzureLBInbound"
|
||||
priority = 300
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "443"
|
||||
source_address_prefix = "AzureLoadBalancer"
|
||||
destination_address_prefix = "*"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowBastionHostCommunication"
|
||||
priority = 400
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "*"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["5701","8080"]
|
||||
source_address_prefix = "VirtualNetwork"
|
||||
destination_address_prefix = "VirtualNetwork"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowRdpSshOutbound"
|
||||
priority = 100
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["22", "3389"]
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "VirtualNetwork"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowBastionHostCommunicationOutbound"
|
||||
priority = 110
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["5701", "8080"]
|
||||
source_address_prefix = "VirtualNetwork"
|
||||
destination_address_prefix = "VirtualNetwork"
|
||||
security_rule {
|
||||
name = "AllowHTTPSInbound"
|
||||
priority = 100
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "443"
|
||||
source_address_prefix = "Internet"
|
||||
destination_address_prefix = "*"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowAzureCloudOutbound"
|
||||
priority = 120
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["443"]
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "AzureCloud"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowGetSessionInformation"
|
||||
priority = 130
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["80"]
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "Internet"
|
||||
}
|
||||
|
||||
security_rule {
|
||||
name = "AllowGatewayManagerInbound"
|
||||
priority = 200
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "443"
|
||||
source_address_prefix = "GatewayManager"
|
||||
destination_address_prefix = "*"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowAzureLBInbound"
|
||||
priority = 300
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_range = "443"
|
||||
source_address_prefix = "AzureLoadBalancer"
|
||||
destination_address_prefix = "*"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowBastionHostCommunication"
|
||||
priority = 400
|
||||
direction = "Inbound"
|
||||
access = "Allow"
|
||||
protocol = "*"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["5701", "8080"]
|
||||
source_address_prefix = "VirtualNetwork"
|
||||
destination_address_prefix = "VirtualNetwork"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowRdpSshOutbound"
|
||||
priority = 100
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["22", "3389"]
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "VirtualNetwork"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowBastionHostCommunicationOutbound"
|
||||
priority = 110
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["5701", "8080"]
|
||||
source_address_prefix = "VirtualNetwork"
|
||||
destination_address_prefix = "VirtualNetwork"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowAzureCloudOutbound"
|
||||
priority = 120
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["443"]
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "AzureCloud"
|
||||
}
|
||||
security_rule {
|
||||
name = "AllowGetSessionInformation"
|
||||
priority = 130
|
||||
direction = "Outbound"
|
||||
access = "Allow"
|
||||
protocol = "Tcp"
|
||||
source_port_range = "*"
|
||||
destination_port_ranges = ["80"]
|
||||
source_address_prefix = "*"
|
||||
destination_address_prefix = "Internet"
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
resource "azurerm_subnet_network_security_group_association" "bastion_nsg_assoc" {
|
||||
subnet_id = azurerm_subnet.azure_bastion.id
|
||||
network_security_group_id = azurerm_network_security_group.bastion_nsg.id
|
||||
depends_on = [
|
||||
azurerm_bastion_host.azure_bastion_instance
|
||||
]
|
||||
depends_on = [
|
||||
azurerm_bastion_host.azure_bastion_instance
|
||||
]
|
||||
}
|
||||
|
||||
|
||||
resource "azurerm_bastion_host" "azure_bastion_instance" {
|
||||
name = "bas-${var.name}-${var.environment}"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
name = "bas-${var.name}-${var.environment}"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
|
||||
ip_configuration {
|
||||
name = "configuration"
|
||||
subnet_id = azurerm_subnet.azure_bastion.id
|
||||
public_ip_address_id = azurerm_public_ip.azure_bastion.id
|
||||
}
|
||||
ip_configuration {
|
||||
name = "configuration"
|
||||
subnet_id = azurerm_subnet.azure_bastion.id
|
||||
public_ip_address_id = azurerm_public_ip.azure_bastion.id
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -1,48 +1,48 @@
|
||||
resource "azurerm_network_interface" "dsvm" {
|
||||
name = "nic-${var.dsvm_name}"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
|
||||
ip_configuration {
|
||||
name = "configuration"
|
||||
subnet_id = azurerm_subnet.snet-dsvm.id
|
||||
private_ip_address_allocation = "Dynamic"
|
||||
}
|
||||
resource "azurerm_network_interface" "dsvm" {
|
||||
name = "nic-${var.dsvm_name}"
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
|
||||
ip_configuration {
|
||||
name = "configuration"
|
||||
subnet_id = azurerm_subnet.snet-dsvm.id
|
||||
private_ip_address_allocation = "Dynamic"
|
||||
}
|
||||
}
|
||||
|
||||
resource "azurerm_windows_virtual_machine" "dsvm" {
|
||||
name = var.dsvm_name
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
name = var.dsvm_name
|
||||
location = azurerm_resource_group.default.location
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
network_interface_ids = [
|
||||
azurerm_network_interface.dsvm.id
|
||||
]
|
||||
size = "Standard_DS3_v2"
|
||||
|
||||
azurerm_network_interface.dsvm.id
|
||||
]
|
||||
size = "Standard_DS3_v2"
|
||||
|
||||
source_image_reference {
|
||||
publisher = "microsoft-dsvm"
|
||||
offer = "dsvm-win-2019"
|
||||
sku = "server-2019"
|
||||
version = "latest"
|
||||
}
|
||||
|
||||
|
||||
os_disk {
|
||||
name = "osdisk-${var.dsvm_name}"
|
||||
caching = "ReadWrite"
|
||||
name = "osdisk-${var.dsvm_name}"
|
||||
caching = "ReadWrite"
|
||||
storage_account_type = "Premium_LRS"
|
||||
}
|
||||
|
||||
|
||||
identity {
|
||||
type = "SystemAssigned"
|
||||
}
|
||||
computer_name = var.dsvm_name
|
||||
admin_username = var.dsvm_admin_username
|
||||
admin_password = var.dsvm_host_password
|
||||
|
||||
computer_name = var.dsvm_name
|
||||
admin_username = var.dsvm_admin_username
|
||||
admin_password = var.dsvm_host_password
|
||||
|
||||
provision_vm_agent = true
|
||||
|
||||
|
||||
timeouts {
|
||||
create = "60m"
|
||||
delete = "2h"
|
||||
create = "60m"
|
||||
delete = "2h"
|
||||
}
|
||||
}
|
||||
|
@ -39,10 +39,10 @@ resource "azurerm_subnet" "snet-dsvm" {
|
||||
}
|
||||
|
||||
resource "azurerm_subnet" "azure_bastion" {
|
||||
name = "AzureBastionSubnet"
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
virtual_network_name = azurerm_virtual_network.default.name
|
||||
address_prefixes = var.bastion_subnet_address_space
|
||||
name = "AzureBastionSubnet"
|
||||
resource_group_name = azurerm_resource_group.default.name
|
||||
virtual_network_name = azurerm_virtual_network.default.name
|
||||
address_prefixes = var.bastion_subnet_address_space
|
||||
}
|
||||
|
||||
# Private DNS Zones
|
||||
|
@ -63,7 +63,7 @@ resource "azurerm_machine_learning_workspace" "default" {
|
||||
# Args of use when using an Azure Private Link configuration
|
||||
public_network_access_enabled = false
|
||||
image_build_compute_name = var.image_build_compute_name
|
||||
depends_on = [
|
||||
depends_on = [
|
||||
azurerm_private_endpoint.kv_ple,
|
||||
azurerm_private_endpoint.st_ple_blob,
|
||||
azurerm_private_endpoint.storage_ple_file,
|
||||
|
Loading…
x
Reference in New Issue
Block a user