Add examples for confidential VM, VMSS and OS Disk

This commit is contained in:
Yichun Ma
2022-06-22 16:17:06 +08:00
parent 742b875490
commit bd01573941
13 changed files with 384 additions and 0 deletions

View File

@ -0,0 +1,55 @@
resource "azurerm_resource_group" "example" {
name = "${var.name_prefix}-rg"
location = var.location
}
resource "azurerm_virtual_network" "example" {
name = "${var.name_prefix}-vnet"
address_space = ["10.0.0.0/16"]
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
}
resource "azurerm_subnet" "example" {
name = "${var.name_prefix}-subnet"
resource_group_name = azurerm_resource_group.example.name
virtual_network_name = azurerm_virtual_network.example.name
address_prefixes = ["10.0.2.0/24"]
}
resource "azurerm_windows_virtual_machine_scale_set" "example" {
name = "${var.name_prefix}-vmss"
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
sku = "Standard_DC2as_v5"
instances = 2
admin_username = "adminuser"
admin_password = var.admin_password
computer_name_prefix = "vmss"
source_image_reference {
publisher = "MicrosoftWindowsServer"
offer = "windows-cvm"
sku = "2022-datacenter-cvm"
version = "latest"
}
os_disk {
storage_account_type = "Premium_LRS"
caching = "None"
security_encryption_type = "VMGuestStateOnly"
}
network_interface {
name = "example"
primary = true
ip_configuration {
name = "internal"
primary = true
subnet_id = azurerm_subnet.example.id
}
}
vtpm_enabled = true
secure_boot_enabled = true
}

View File

@ -0,0 +1,14 @@
terraform {
required_version = ">=1.0"
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "~>3.8"
}
}
}
provider "azurerm" {
features {}
}

View File

@ -0,0 +1,22 @@
# Azure confidential virtual machine scale set
This template deploys an Azure confidential virtual machine scale set with guest state encrypted only.
## Resources
- [azurerm_resource_group](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/resource_group)
- [azurerm_subnet](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/subnet)
- [azurerm_virtual_network](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/virtual_network)
- [azurerm_windows_virtual_machine_scale_set](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/windows_virtual_machine_scale_set)
## Variables
| Name | Description |
|-|-|
| `admin_password` | (Required) Admin password of the virtual machine scale set.|
| `location` | (Required) Azure Region in which to deploy these resources.|
| `name_prefix` | (Optional) Prefix of the resource name. Value defaults to: tftest|
## Example
To see how to run this example, see [Create an Azure confidential virtual machine scale set using Terraform](https://docs.microsoft.com/azure/developer/terraform/create-confidential-vmss).

View File

@ -0,0 +1,16 @@
variable "admin_password" {
type = string
sensitive = true
description = "Admin password of the virtual machine scale set"
}
variable "location" {
type = string
description = "Location where resources will be created"
}
variable "name_prefix" {
type = string
default = "tftest"
description = "Prefix of the resource name"
}