update files
This commit is contained in:
parent
5c810c97a3
commit
ec8fa91e05
@ -3,6 +3,7 @@ resource "random_pet" "rg_name" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "random_password" "password" {
|
resource "random_password" "password" {
|
||||||
|
count = 2
|
||||||
length = 20
|
length = 20
|
||||||
min_lower = 1
|
min_lower = 1
|
||||||
min_upper = 1
|
min_upper = 1
|
||||||
@ -15,9 +16,9 @@ resource "azurerm_resource_group" "rg" {
|
|||||||
name = random_pet.rg_name.id
|
name = random_pet.rg_name.id
|
||||||
location = var.resource_group_location
|
location = var.resource_group_location
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_public_ip_prefix" "pip_prefix" {
|
resource "azurerm_public_ip_prefix" "pip_prefix" {
|
||||||
count = 2
|
name = "pip-prefix"
|
||||||
name = "pip-prefix-${count.index + 1}"
|
|
||||||
location = azurerm_resource_group.rg.location
|
location = azurerm_resource_group.rg.location
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
resource_group_name = azurerm_resource_group.rg.name
|
||||||
sku = "Standard"
|
sku = "Standard"
|
||||||
@ -25,13 +26,12 @@ resource "azurerm_public_ip_prefix" "pip_prefix" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_public_ip" "pip_azfw" {
|
resource "azurerm_public_ip" "pip_azfw" {
|
||||||
count = 2
|
name = "pip-azfw"
|
||||||
name = "pip-azfw-${count.index + 1}"
|
|
||||||
location = azurerm_resource_group.rg.location
|
location = azurerm_resource_group.rg.location
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
resource_group_name = azurerm_resource_group.rg.name
|
||||||
sku = "Standard"
|
sku = "Standard"
|
||||||
allocation_method = "Static"
|
allocation_method = "Static"
|
||||||
public_ip_prefix_id = azurerm_public_ip_prefix.pip_prefix[count.index].id
|
public_ip_prefix_id = azurerm_public_ip_prefix.pip_prefix.id
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_virtual_network" "azfw_vnet" {
|
resource "azurerm_virtual_network" "azfw_vnet" {
|
||||||
@ -56,7 +56,7 @@ resource "azurerm_subnet" "backend_subnet" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_network_interface" "backend_nic" {
|
resource "azurerm_network_interface" "backend_nic" {
|
||||||
count = 2
|
count = 2
|
||||||
name = "nic-backend-${count.index + 1}"
|
name = "nic-backend-${count.index + 1}"
|
||||||
location = azurerm_resource_group.rg.location
|
location = azurerm_resource_group.rg.location
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
resource_group_name = azurerm_resource_group.rg.name
|
||||||
@ -86,7 +86,7 @@ resource "azurerm_network_security_group" "backend_nsg" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_network_interface_security_group_association" "vm_backend_nsg_association" {
|
resource "azurerm_network_interface_security_group_association" "vm_backend_nsg_association" {
|
||||||
count = 2
|
count = 2
|
||||||
network_interface_id = azurerm_network_interface.backend_nic[count.index].id
|
network_interface_id = azurerm_network_interface.backend_nic[count.index].id
|
||||||
network_security_group_id = azurerm_network_security_group.backend_nsg.id
|
network_security_group_id = azurerm_network_security_group.backend_nsg.id
|
||||||
}
|
}
|
||||||
@ -98,7 +98,7 @@ resource "azurerm_windows_virtual_machine" "vm_backend" {
|
|||||||
location = azurerm_resource_group.rg.location
|
location = azurerm_resource_group.rg.location
|
||||||
size = var.virtual_machine_size
|
size = var.virtual_machine_size
|
||||||
admin_username = var.admin_username
|
admin_username = var.admin_username
|
||||||
admin_password = random_password.password.result
|
admin_password = random_password.password[count.index].result
|
||||||
network_interface_ids = [azurerm_network_interface.backend_nic[count.index].id]
|
network_interface_ids = [azurerm_network_interface.backend_nic[count.index].id]
|
||||||
os_disk {
|
os_disk {
|
||||||
caching = "ReadWrite"
|
caching = "ReadWrite"
|
||||||
@ -178,7 +178,7 @@ resource "azurerm_firewall_policy_rule_collection_group" "policy_rule_collection
|
|||||||
translated_address = "10.10.1.4"
|
translated_address = "10.10.1.4"
|
||||||
translated_port = "3389"
|
translated_port = "3389"
|
||||||
source_addresses = ["*"]
|
source_addresses = ["*"]
|
||||||
destination_address = azurerm_public_ip.pip_azfw[count.index].ip_address
|
destination_address = azurerm_public_ip.pip_azfw.ip_address
|
||||||
destination_ports = ["3389"]
|
destination_ports = ["3389"]
|
||||||
}
|
}
|
||||||
rule {
|
rule {
|
||||||
@ -187,7 +187,7 @@ resource "azurerm_firewall_policy_rule_collection_group" "policy_rule_collection
|
|||||||
translated_address = "10.10.1.5"
|
translated_address = "10.10.1.5"
|
||||||
translated_port = "3389"
|
translated_port = "3389"
|
||||||
source_addresses = ["*"]
|
source_addresses = ["*"]
|
||||||
destination_address = azurerm_public_ip.pip_azfw[count.index].ip_address
|
destination_address = azurerm_public_ip.pip_azfw.ip_address
|
||||||
destination_ports = ["3389"]
|
destination_ports = ["3389"]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -200,10 +200,9 @@ resource "azurerm_firewall" "fw" {
|
|||||||
sku_name = "AZFW_VNet"
|
sku_name = "AZFW_VNet"
|
||||||
sku_tier = var.firewall_sku_tier
|
sku_tier = var.firewall_sku_tier
|
||||||
ip_configuration {
|
ip_configuration {
|
||||||
count = 2
|
name = "azfw-ipconfig"
|
||||||
name = "azfw-ipconfig-${count.index + 1}"
|
|
||||||
subnet_id = azurerm_subnet.azfw_subnet.id
|
subnet_id = azurerm_subnet.azfw_subnet.id
|
||||||
public_ip_address_id = azurerm_public_ip.pip_azfw[count.index].id
|
public_ip_address_id = azurerm_public_ip.pip_azfw.id
|
||||||
}
|
}
|
||||||
firewall_policy_id = azurerm_firewall_policy.azfw_policy.id
|
firewall_policy_id = azurerm_firewall_policy.azfw_policy.id
|
||||||
}
|
}
|
||||||
|
@ -3,6 +3,6 @@ output "resource_group_name" {
|
|||||||
}
|
}
|
||||||
output "backend_admin_password" {
|
output "backend_admin_password" {
|
||||||
sensitive = true
|
sensitive = true
|
||||||
value = azurerm_windows_virtual_machine.vm_backend.admin_password
|
value = azurerm_windows_virtual_machine.vm_backend.*.admin_password
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# Deploy Azure Firewall with multiple public IP addresses
|
# Deploy Azure Firewall with multiple public IP addresses
|
||||||
|
|
||||||
This template deploys an [Azure Firewall](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/firewall) with [Public IP Prefixes]
|
This template deploys an [Azure Firewall](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/firewall) with multiple [Public IP Address](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/public_ip) from a public IP address prefix. The deployed firewall has NAT rule collection rules that allow RDP connections to two Windows Server 2019 virtual machines.\
|
||||||
|
|
||||||
## Terraform resource types
|
## Terraform resource types
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user