Compare commits
26 Commits
UserStory3
...
301-machin
Author | SHA1 | Date | |
---|---|---|---|
5e5d975f67 | |||
30e5ac224b | |||
73c1ca51f1 | |||
0a6ee4d6d3 | |||
ee8733602b | |||
3e8e2078ab | |||
a43c127c8e | |||
4bb8b212ac | |||
64e270d463 | |||
fd903819cd | |||
91b73244e5 | |||
77dcd8d154 | |||
c3ecd139eb | |||
7c6d6f9438 | |||
181b34291c | |||
1b713632d1 | |||
96cd33dea4 | |||
376f0a3732 | |||
e07726ef45 | |||
8c3f290e61 | |||
3a6dd12ab9 | |||
5192273700 | |||
d2e47ddadd | |||
96d88c3c41 | |||
e405273660 | |||
98f857a865 |
@ -40,4 +40,13 @@ resource "azurerm_attestation_provider" "corp_attestation" {
|
|||||||
name = "${var.attestation_provider_name}${random_string.attestation_suffix.result}"
|
name = "${var.attestation_provider_name}${random_string.attestation_suffix.result}"
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
resource_group_name = azurerm_resource_group.rg.name
|
||||||
policy_signing_certificate_data = try(tls_self_signed_cert.attestation[0].cert_pem, file(var.cert_path))
|
policy_signing_certificate_data = try(tls_self_signed_cert.attestation[0].cert_pem, file(var.cert_path))
|
||||||
|
#https://github.com/hashicorp/terraform-provider-azurerm/issues/21998#issuecomment-1573312297
|
||||||
|
lifecycle {
|
||||||
|
ignore_changes = [
|
||||||
|
"open_enclave_policy_base64",
|
||||||
|
"sev_snp_policy_base64",
|
||||||
|
"sgx_enclave_policy_base64",
|
||||||
|
"tpm_policy_base64",
|
||||||
|
]
|
||||||
|
}
|
||||||
}
|
}
|
@ -4,7 +4,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
azurerm = {
|
azurerm = {
|
||||||
source = "hashicorp/azurerm"
|
source = "hashicorp/azurerm"
|
||||||
version = "~>2.0"
|
version = "~>3.0"
|
||||||
}
|
}
|
||||||
random = {
|
random = {
|
||||||
source = "hashicorp/random"
|
source = "hashicorp/random"
|
||||||
|
@ -8,7 +8,7 @@ terraform {
|
|||||||
}
|
}
|
||||||
azurerm = {
|
azurerm = {
|
||||||
source = "hashicorp/azurerm"
|
source = "hashicorp/azurerm"
|
||||||
version = "~>2.0"
|
version = "~>3.0"
|
||||||
}
|
}
|
||||||
random = {
|
random = {
|
||||||
source = "hashicorp/random"
|
source = "hashicorp/random"
|
||||||
|
@ -3,7 +3,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
azurerm = {
|
azurerm = {
|
||||||
source = "hashicorp/azurerm"
|
source = "hashicorp/azurerm"
|
||||||
version = "~>2.0"
|
version = "~>3.0"
|
||||||
}
|
}
|
||||||
random = {
|
random = {
|
||||||
source = "hashicorp/random"
|
source = "hashicorp/random"
|
||||||
|
@ -1,42 +0,0 @@
|
|||||||
# Azure CDN Frontdoor
|
|
||||||
This template deploys an Azure CDN Frontdoor with a Frontdoor managed TLS/SSL certificate Custom Domain.
|
|
||||||
|
|
||||||
## Terraform resource types
|
|
||||||
|
|
||||||
- [random_pet](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/pet)
|
|
||||||
- [azurerm_resource_group](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/resource_group)
|
|
||||||
- [azurerm_cdn_frontdoor_profile](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_profile)
|
|
||||||
- [random_string](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/string)
|
|
||||||
- [azurerm_dns_zone](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/dns_zone)
|
|
||||||
- [azurerm_cdn_frontdoor_firewall_policy](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_firewall_policy)
|
|
||||||
- [azurerm_cdn_frontdoor_security_policy](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_security_policy)
|
|
||||||
- [azurerm_cdn_frontdoor_endpoint](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_endpoint)
|
|
||||||
- [azurerm_cdn_frontdoor_origin_group](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_origin_group)
|
|
||||||
- [azurerm_cdn_frontdoor_origin](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_origin)
|
|
||||||
- [azurerm_cdn_frontdoor_rule_set](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_rule_set)
|
|
||||||
- [azurerm_cdn_frontdoor_rule](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_rule)
|
|
||||||
- [azurerm_cdn_frontdoor_route](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_route)
|
|
||||||
- [azurerm_cdn_frontdoor_custom_domain](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_custom_domain)
|
|
||||||
- [azurerm_cdn_frontdoor_custom_domain_association](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_custom_domain_association)
|
|
||||||
- [azurerm_dns_txt_record](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/dns_txt_record)
|
|
||||||
- [azurerm_dns_cname_record](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/dns_cname_record)
|
|
||||||
|
|
||||||
## Variables
|
|
||||||
|
|
||||||
| Name | Description | Default value |
|
|
||||||
|-|-|-|
|
|
||||||
| `resource_group_name_prefix` | Prefix of the resource group name that's combined with a random ID so name is unique in your Azure subscription. | rg |
|
|
||||||
| `resource_group_location` | Location of the resource group. | eastus |
|
|
||||||
| `cdn_frontdoor_profile_name` | Name of the CDN Frontdoor profile resource. | "" |
|
|
||||||
| `dns_zone_name` | Name of the DNS zone resource. | "" |
|
|
||||||
| `cdn_frontdoor_firewall_policy_name` | Name of the CDN Frontdoor firewall policy resource. | "" |
|
|
||||||
| `cdn_frontdoor_security_policy_name` | Name of the CDN Frontdoor security policy resource. | "" |
|
|
||||||
| `cdn_frontdoor_endpoint_name` | Name of the CDN Frontdoor endpoint resource. | "" |
|
|
||||||
| `cdn_frontdoor_origin_group_name` | Name of the CDN Frontdoor origin group resource. | "" |
|
|
||||||
| `cdn_frontdoor_origin_name` | Name of the CDN Frontdoor origin resource. | "" |
|
|
||||||
| `cdn_frontdoor_rule_set_name` | Name of the CDN Frontdoor rule set resource. | "" |
|
|
||||||
| `cdn_frontdoor_rule_name` | Name of the CDN Frontdoor rule resource. | "" |
|
|
||||||
| `cdn_frontdoor_route_name` | Name of the CDN Frontdoor route resource. | "" |
|
|
||||||
| `cdn_frontdoor_custom_domain_name` | Name of the CDN Frontdoor custom domain resource. | "" |
|
|
||||||
|
|
||||||
## Example
|
|
@ -1,394 +0,0 @@
|
|||||||
resource "random_pet" "rg_name" {
|
|
||||||
prefix = var.resource_group_name_prefix
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_resource_group" "rg" {
|
|
||||||
location = var.resource_group_location
|
|
||||||
name = random_pet.rg_name.id
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_profile_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_profile" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_profile_name, "profile-${random_string.azurerm_cdn_frontdoor_profile_name.result}")
|
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
|
||||||
sku_name = "Premium_AzureFrontDoor"
|
|
||||||
|
|
||||||
response_timeout_seconds = 120
|
|
||||||
|
|
||||||
tags = {
|
|
||||||
environment = "example"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_dns_zone_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_dns_zone" "example" {
|
|
||||||
name = coalesce(var.dns_zone_name, "zone-${random_string.azurerm_dns_zone_name.result}")
|
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_firewall_policy_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_firewall_policy" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_firewall_policy_name, "firewall-${random_string.azurerm_cdn_frontdoor_firewall_policy_name.result}")
|
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
|
||||||
sku_name = azurerm_cdn_frontdoor_profile.example.sku_name
|
|
||||||
enabled = true
|
|
||||||
mode = "Prevention"
|
|
||||||
redirect_url = "https://www.example.com"
|
|
||||||
custom_block_response_status_code = 403
|
|
||||||
custom_block_response_body = "PGh0bWw+CjxoZWFkZXI+PHRpdGxlPkhlbGxvPC90aXRsZT48L2hlYWRlcj4KPGJvZHk+CkhlbGxvIHdvcmxkCjwvYm9keT4KPC9odG1sPg=="
|
|
||||||
|
|
||||||
custom_rule {
|
|
||||||
name = "Rule1"
|
|
||||||
enabled = true
|
|
||||||
priority = 1
|
|
||||||
rate_limit_duration_in_minutes = 1
|
|
||||||
rate_limit_threshold = 10
|
|
||||||
type = "MatchRule"
|
|
||||||
action = "Block"
|
|
||||||
|
|
||||||
match_condition {
|
|
||||||
match_variable = "RemoteAddr"
|
|
||||||
operator = "IPMatch"
|
|
||||||
negation_condition = false
|
|
||||||
match_values = ["10.0.2.0/24", "10.0.1.0/24"]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
managed_rule {
|
|
||||||
type = "DefaultRuleSet"
|
|
||||||
version = "preview-0.1"
|
|
||||||
action = "Block"
|
|
||||||
|
|
||||||
override {
|
|
||||||
rule_group_name = "PHP"
|
|
||||||
|
|
||||||
rule {
|
|
||||||
rule_id = "933111"
|
|
||||||
enabled = false
|
|
||||||
action = "Block"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
managed_rule {
|
|
||||||
type = "BotProtection"
|
|
||||||
version = "preview-0.1"
|
|
||||||
action = "Block"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_security_policy_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_security_policy" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_security_policy_name, "security-${random_string.azurerm_cdn_frontdoor_security_policy_name.result}")
|
|
||||||
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id
|
|
||||||
|
|
||||||
security_policies {
|
|
||||||
firewall {
|
|
||||||
cdn_frontdoor_firewall_policy_id = azurerm_cdn_frontdoor_firewall_policy.example.id
|
|
||||||
|
|
||||||
association {
|
|
||||||
domain {
|
|
||||||
cdn_frontdoor_domain_id = azurerm_cdn_frontdoor_custom_domain.contoso.id
|
|
||||||
}
|
|
||||||
|
|
||||||
domain {
|
|
||||||
cdn_frontdoor_domain_id = azurerm_cdn_frontdoor_custom_domain.fabrikam.id
|
|
||||||
}
|
|
||||||
|
|
||||||
patterns_to_match = ["/*"]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_endpoint_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_endpoint" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_endpoint_name, "endpoint-${random_string.azurerm_cdn_frontdoor_endpoint_name.result}")
|
|
||||||
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id
|
|
||||||
enabled = true
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_origin_group_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_origin_group" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_origin_group_name, "origin-group-${random_string.azurerm_cdn_frontdoor_origin_group_name.result}")
|
|
||||||
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id
|
|
||||||
session_affinity_enabled = true
|
|
||||||
|
|
||||||
restore_traffic_time_to_healed_or_new_endpoint_in_minutes = 10
|
|
||||||
|
|
||||||
health_probe {
|
|
||||||
interval_in_seconds = 100
|
|
||||||
path = "/"
|
|
||||||
protocol = "Http"
|
|
||||||
request_type = "HEAD"
|
|
||||||
}
|
|
||||||
|
|
||||||
load_balancing {
|
|
||||||
additional_latency_in_milliseconds = 0
|
|
||||||
sample_size = 16
|
|
||||||
successful_samples_required = 3
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_origin_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_origin" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_origin_name, "origin-${random_string.azurerm_cdn_frontdoor_origin_name.result}")
|
|
||||||
cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.example.id
|
|
||||||
enabled = true
|
|
||||||
|
|
||||||
certificate_name_check_enabled = false
|
|
||||||
host_name = join(".", ["contoso", azurerm_dns_zone.example.name])
|
|
||||||
priority = 1
|
|
||||||
weight = 1
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_rule_set_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_rule_set" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_rule_set_name, "rule-set-${random_string.azurerm_cdn_frontdoor_rule_set_name.result}")
|
|
||||||
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_rule_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_rule" "example" {
|
|
||||||
depends_on = [azurerm_cdn_frontdoor_origin_group.example, azurerm_cdn_frontdoor_origin.example]
|
|
||||||
|
|
||||||
name = coalesce(var.cdn_frontdoor_rule_name, "rule-${random_string.azurerm_cdn_frontdoor_rule_name.result}")
|
|
||||||
cdn_frontdoor_rule_set_id = azurerm_cdn_frontdoor_rule_set.example.id
|
|
||||||
order = 1
|
|
||||||
behavior_on_match = "Continue"
|
|
||||||
|
|
||||||
actions {
|
|
||||||
route_configuration_override_action {
|
|
||||||
cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.example.id
|
|
||||||
forwarding_protocol = "HttpsOnly"
|
|
||||||
query_string_caching_behavior = "IncludeSpecifiedQueryStrings"
|
|
||||||
query_string_parameters = ["foo", "clientIp={client_ip}"]
|
|
||||||
compression_enabled = true
|
|
||||||
cache_behavior = "OverrideIfOriginMissing"
|
|
||||||
cache_duration = "365.23:59:59"
|
|
||||||
}
|
|
||||||
|
|
||||||
url_redirect_action {
|
|
||||||
redirect_type = "PermanentRedirect"
|
|
||||||
redirect_protocol = "MatchRequest"
|
|
||||||
query_string = "clientIp={client_ip}"
|
|
||||||
destination_path = "/exampleredirection"
|
|
||||||
destination_hostname = "example.com"
|
|
||||||
destination_fragment = "UrlRedirect"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
conditions {
|
|
||||||
host_name_condition {
|
|
||||||
operator = "Equal"
|
|
||||||
negate_condition = false
|
|
||||||
match_values = ["www.example.com", "images.example.com", "video.example.com"]
|
|
||||||
transforms = ["Lowercase", "Trim"]
|
|
||||||
}
|
|
||||||
|
|
||||||
is_device_condition {
|
|
||||||
operator = "Equal"
|
|
||||||
negate_condition = false
|
|
||||||
match_values = ["Mobile"]
|
|
||||||
}
|
|
||||||
|
|
||||||
post_args_condition {
|
|
||||||
post_args_name = "customerName"
|
|
||||||
operator = "BeginsWith"
|
|
||||||
match_values = ["J", "K"]
|
|
||||||
transforms = ["Uppercase"]
|
|
||||||
}
|
|
||||||
|
|
||||||
request_method_condition {
|
|
||||||
operator = "Equal"
|
|
||||||
negate_condition = false
|
|
||||||
match_values = ["DELETE"]
|
|
||||||
}
|
|
||||||
|
|
||||||
url_filename_condition {
|
|
||||||
operator = "Equal"
|
|
||||||
negate_condition = false
|
|
||||||
match_values = ["media.mp4"]
|
|
||||||
transforms = ["Lowercase", "RemoveNulls", "Trim"]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_route_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_route" "example" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_route_name, "route-${random_string.azurerm_cdn_frontdoor_route_name.result}")
|
|
||||||
cdn_frontdoor_endpoint_id = azurerm_cdn_frontdoor_endpoint.example.id
|
|
||||||
cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.example.id
|
|
||||||
cdn_frontdoor_origin_ids = [azurerm_cdn_frontdoor_origin.example.id]
|
|
||||||
enabled = true
|
|
||||||
|
|
||||||
forwarding_protocol = "MatchRequest"
|
|
||||||
https_redirect_enabled = true
|
|
||||||
patterns_to_match = ["/*"]
|
|
||||||
supported_protocols = ["Http", "Https"]
|
|
||||||
cdn_frontdoor_rule_set_ids = [azurerm_cdn_frontdoor_rule_set.example.id]
|
|
||||||
|
|
||||||
cdn_frontdoor_custom_domain_ids = [azurerm_cdn_frontdoor_custom_domain.contoso.id, azurerm_cdn_frontdoor_custom_domain.fabrikam.id]
|
|
||||||
link_to_default_domain = false
|
|
||||||
|
|
||||||
cache {
|
|
||||||
compression_enabled = true
|
|
||||||
content_types_to_compress = ["text/html", "text/javascript", "text/xml"]
|
|
||||||
query_strings = ["account", "settings"]
|
|
||||||
query_string_caching_behavior = "IgnoreSpecifiedQueryStrings"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "random_string" "azurerm_cdn_frontdoor_custom_domain_name" {
|
|
||||||
length = 13
|
|
||||||
lower = true
|
|
||||||
numeric = false
|
|
||||||
special = false
|
|
||||||
upper = false
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_custom_domain" "contoso" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_custom_domain_name, "custom-domain-${random_string.azurerm_cdn_frontdoor_custom_domain_name.result}")
|
|
||||||
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id
|
|
||||||
dns_zone_id = azurerm_dns_zone.example.id
|
|
||||||
host_name = join(".", ["contoso", azurerm_dns_zone.example.name])
|
|
||||||
|
|
||||||
tls {
|
|
||||||
certificate_type = "ManagedCertificate"
|
|
||||||
minimum_tls_version = "TLS12"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_custom_domain" "fabrikam" {
|
|
||||||
name = coalesce(var.cdn_frontdoor_custom_domain_name, "custom-domain-${random_string.azurerm_cdn_frontdoor_custom_domain_name.result}")
|
|
||||||
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id
|
|
||||||
dns_zone_id = azurerm_dns_zone.example.id
|
|
||||||
host_name = join(".", ["fabrikam", azurerm_dns_zone.example.name])
|
|
||||||
|
|
||||||
tls {
|
|
||||||
certificate_type = "ManagedCertificate"
|
|
||||||
minimum_tls_version = "TLS12"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_custom_domain_association" "contoso" {
|
|
||||||
cdn_frontdoor_custom_domain_id = azurerm_cdn_frontdoor_custom_domain.contoso.id
|
|
||||||
cdn_frontdoor_route_ids = [azurerm_cdn_frontdoor_route.example.id]
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_cdn_frontdoor_custom_domain_association" "fabrikam" {
|
|
||||||
cdn_frontdoor_custom_domain_id = azurerm_cdn_frontdoor_custom_domain.fabrikam.id
|
|
||||||
cdn_frontdoor_route_ids = [azurerm_cdn_frontdoor_route.example.id]
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_dns_txt_record" "contoso" {
|
|
||||||
name = join(".", ["_dnsauth", "contoso"])
|
|
||||||
zone_name = azurerm_dns_zone.example.name
|
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
|
||||||
ttl = 3600
|
|
||||||
|
|
||||||
record {
|
|
||||||
value = azurerm_cdn_frontdoor_custom_domain.contoso.validation_token
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_dns_txt_record" "fabrikam" {
|
|
||||||
name = join(".", ["_dnsauth", "fabrikam"])
|
|
||||||
zone_name = azurerm_dns_zone.example.name
|
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
|
||||||
ttl = 3600
|
|
||||||
|
|
||||||
record {
|
|
||||||
value = azurerm_cdn_frontdoor_custom_domain.fabrikam.validation_token
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_dns_cname_record" "contoso" {
|
|
||||||
depends_on = [azurerm_cdn_frontdoor_route.example, azurerm_cdn_frontdoor_security_policy.example]
|
|
||||||
|
|
||||||
name = "contoso"
|
|
||||||
zone_name = azurerm_dns_zone.example.name
|
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
|
||||||
ttl = 3600
|
|
||||||
record = azurerm_cdn_frontdoor_endpoint.example.host_name
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "azurerm_dns_cname_record" "fabrikam" {
|
|
||||||
depends_on = [azurerm_cdn_frontdoor_route.example, azurerm_cdn_frontdoor_security_policy.example]
|
|
||||||
|
|
||||||
name = "fabrikam"
|
|
||||||
zone_name = azurerm_dns_zone.example.name
|
|
||||||
resource_group_name = azurerm_resource_group.rg.name
|
|
||||||
ttl = 3600
|
|
||||||
record = azurerm_cdn_frontdoor_endpoint.example.host_name
|
|
||||||
}
|
|
@ -1,47 +0,0 @@
|
|||||||
output "resource_group_name" {
|
|
||||||
value = azurerm_resource_group.rg.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_profile_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_profile.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "dns_zone_name" {
|
|
||||||
value = azurerm_dns_zone.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_firewall_policy_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_firewall_policy.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_security_policy_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_security_policy.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_endpoint_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_endpoint.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_origin_group_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_origin_group.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_origin_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_origin.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_rule_set_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_rule_set.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_rule_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_rule.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_route_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_route.example.name
|
|
||||||
}
|
|
||||||
|
|
||||||
output "cdn_frontdoor_custom_domain_name" {
|
|
||||||
value = azurerm_cdn_frontdoor_custom_domain.contoso.name
|
|
||||||
}
|
|
@ -1,18 +0,0 @@
|
|||||||
terraform {
|
|
||||||
required_version = ">=1.0"
|
|
||||||
|
|
||||||
required_providers {
|
|
||||||
azurerm = {
|
|
||||||
source = "hashicorp/azurerm"
|
|
||||||
version = "~>3.0"
|
|
||||||
}
|
|
||||||
random = {
|
|
||||||
source = "hashicorp/random"
|
|
||||||
version = "~>3.0"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
provider "azurerm" {
|
|
||||||
features {}
|
|
||||||
}
|
|
@ -1,77 +0,0 @@
|
|||||||
variable "resource_group_name_prefix" {
|
|
||||||
type = string
|
|
||||||
default = "rg"
|
|
||||||
description = "Prefix of the resource group name that's combined with a random ID so name is unique in your Azure subscription."
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "resource_group_location" {
|
|
||||||
type = string
|
|
||||||
default = "eastus"
|
|
||||||
description = "Location of the resource group."
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_profile_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor profile resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "dns_zone_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the DNS zone resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_firewall_policy_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor firewall policy resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_security_policy_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor security policy resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_endpoint_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor endpoint resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_origin_group_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor origin group resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_origin_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor origin resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_rule_set_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor rule set resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_rule_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor rule resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_route_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor route resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "cdn_frontdoor_custom_domain_name" {
|
|
||||||
type = string
|
|
||||||
description = "The name of the CDN Frontdoor custom domain resource. The value will be randomly generated if blank."
|
|
||||||
default = ""
|
|
||||||
}
|
|
@ -8,7 +8,7 @@ terraform {
|
|||||||
}
|
}
|
||||||
azurerm = {
|
azurerm = {
|
||||||
source = "hashicorp/azurerm"
|
source = "hashicorp/azurerm"
|
||||||
version = "~>2.0"
|
version = "~>3.0"
|
||||||
}
|
}
|
||||||
random = {
|
random = {
|
||||||
source = "hashicorp/random"
|
source = "hashicorp/random"
|
||||||
|
@ -4,7 +4,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
azurerm = {
|
azurerm = {
|
||||||
source = "hashicorp/azurerm"
|
source = "hashicorp/azurerm"
|
||||||
version = "~>2.0"
|
version = "~>3.0"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -17,6 +17,15 @@ provider "azurerm" {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "random_password" "password" {
|
||||||
|
count = var.admin_password == null ? 1 : 0
|
||||||
|
length = 20
|
||||||
|
}
|
||||||
|
|
||||||
|
locals {
|
||||||
|
admin_password = try(random_password.password[0].result, var.admin_password)
|
||||||
|
}
|
||||||
|
|
||||||
resource "azurerm_resource_group" "vmss" {
|
resource "azurerm_resource_group" "vmss" {
|
||||||
name = var.resource_group_name
|
name = var.resource_group_name
|
||||||
location = var.location
|
location = var.location
|
||||||
@ -27,7 +36,7 @@ resource "random_string" "fqdn" {
|
|||||||
length = 6
|
length = 6
|
||||||
special = false
|
special = false
|
||||||
upper = false
|
upper = false
|
||||||
number = false
|
numeric = false
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_virtual_network" "vmss" {
|
resource "azurerm_virtual_network" "vmss" {
|
||||||
@ -73,14 +82,12 @@ resource "azurerm_lb_backend_address_pool" "bpepool" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_lb_probe" "vmss" {
|
resource "azurerm_lb_probe" "vmss" {
|
||||||
resource_group_name = azurerm_resource_group.vmss.name
|
|
||||||
loadbalancer_id = azurerm_lb.vmss.id
|
loadbalancer_id = azurerm_lb.vmss.id
|
||||||
name = "ssh-running-probe"
|
name = "ssh-running-probe"
|
||||||
port = var.application_port
|
port = var.application_port
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_lb_rule" "lbnatrule" {
|
resource "azurerm_lb_rule" "lbnatrule" {
|
||||||
resource_group_name = azurerm_resource_group.vmss.name
|
|
||||||
loadbalancer_id = azurerm_lb.vmss.id
|
loadbalancer_id = azurerm_lb.vmss.id
|
||||||
name = "http"
|
name = "http"
|
||||||
protocol = "Tcp"
|
protocol = "Tcp"
|
||||||
@ -127,7 +134,7 @@ resource "azurerm_virtual_machine_scale_set" "vmss" {
|
|||||||
os_profile {
|
os_profile {
|
||||||
computer_name_prefix = "vmlab"
|
computer_name_prefix = "vmlab"
|
||||||
admin_username = var.admin_user
|
admin_username = var.admin_user
|
||||||
admin_password = var.admin_password
|
admin_password = local.admin_password
|
||||||
custom_data = file("web.conf")
|
custom_data = file("web.conf")
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -198,7 +205,7 @@ resource "azurerm_virtual_machine" "jumpbox" {
|
|||||||
os_profile {
|
os_profile {
|
||||||
computer_name = "jumpbox"
|
computer_name = "jumpbox"
|
||||||
admin_username = var.admin_user
|
admin_username = var.admin_user
|
||||||
admin_password = var.admin_password
|
admin_password = local.admin_password
|
||||||
}
|
}
|
||||||
|
|
||||||
os_profile_linux_config {
|
os_profile_linux_config {
|
||||||
|
@ -28,6 +28,6 @@ variable "admin_user" {
|
|||||||
|
|
||||||
variable "admin_password" {
|
variable "admin_password" {
|
||||||
description = "Default password for admin account"
|
description = "Default password for admin account"
|
||||||
default = "ChangeMe123!"
|
default = null
|
||||||
sensitive = true
|
sensitive = true
|
||||||
}
|
}
|
||||||
|
@ -4,8 +4,14 @@ locals {
|
|||||||
hub-nva-resource-group = "hub-nva-rg"
|
hub-nva-resource-group = "hub-nva-rg"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "random_string" "suffix" {
|
||||||
|
length = 5
|
||||||
|
special = false
|
||||||
|
upper = false
|
||||||
|
}
|
||||||
|
|
||||||
resource "azurerm_resource_group" "hub-nva-rg" {
|
resource "azurerm_resource_group" "hub-nva-rg" {
|
||||||
name = "${local.prefix-hub-nva}-rg"
|
name = "${local.prefix-hub-nva}-rg-${random_string.suffix.result}"
|
||||||
location = local.hub-nva-location
|
location = local.hub-nva-location
|
||||||
|
|
||||||
tags = {
|
tags = {
|
||||||
@ -55,7 +61,7 @@ resource "azurerm_virtual_machine" "hub-nva-vm" {
|
|||||||
os_profile {
|
os_profile {
|
||||||
computer_name = "${local.prefix-hub-nva}-vm"
|
computer_name = "${local.prefix-hub-nva}-vm"
|
||||||
admin_username = var.username
|
admin_username = var.username
|
||||||
admin_password = var.password
|
admin_password = local.password
|
||||||
}
|
}
|
||||||
|
|
||||||
os_profile_linux_config {
|
os_profile_linux_config {
|
||||||
@ -78,7 +84,7 @@ resource "azurerm_virtual_machine_extension" "enable-routes" {
|
|||||||
settings = <<SETTINGS
|
settings = <<SETTINGS
|
||||||
{
|
{
|
||||||
"fileUris": [
|
"fileUris": [
|
||||||
"https://raw.githubusercontent.com/mspnp/reference-architectures/master/scripts/linux/enable-ip-forwarding.sh"
|
"https://raw.githubusercontent.com/lonegunmanb/reference-architectures/refs/heads/master/scripts/linux/enable-ip-forwarding.sh"
|
||||||
],
|
],
|
||||||
"commandToExecute": "bash enable-ip-forwarding.sh"
|
"commandToExecute": "bash enable-ip-forwarding.sh"
|
||||||
}
|
}
|
||||||
@ -142,7 +148,7 @@ resource "azurerm_route_table" "spoke1-rt" {
|
|||||||
route {
|
route {
|
||||||
name = "default"
|
name = "default"
|
||||||
address_prefix = "0.0.0.0/0"
|
address_prefix = "0.0.0.0/0"
|
||||||
next_hop_type = "vnetlocal"
|
next_hop_type = "VnetLocal"
|
||||||
}
|
}
|
||||||
|
|
||||||
tags = {
|
tags = {
|
||||||
@ -178,7 +184,7 @@ resource "azurerm_route_table" "spoke2-rt" {
|
|||||||
route {
|
route {
|
||||||
name = "default"
|
name = "default"
|
||||||
address_prefix = "0.0.0.0/0"
|
address_prefix = "0.0.0.0/0"
|
||||||
next_hop_type = "vnetlocal"
|
next_hop_type = "VnetLocal"
|
||||||
}
|
}
|
||||||
|
|
||||||
tags = {
|
tags = {
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
locals {
|
locals {
|
||||||
prefix-hub = "hub"
|
prefix-hub = "hub"
|
||||||
hub-location = "eastus"
|
hub-location = "eastus"
|
||||||
hub-resource-group = "hub-vnet-rg"
|
hub-resource-group = "hub-vnet-rg-${random_string.suffix.result}"
|
||||||
shared-key = "4-v3ry-53cr37-1p53c-5h4r3d-k3y"
|
shared-key = "4-v3ry-53cr37-1p53c-5h4r3d-k3y"
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -84,7 +84,7 @@ resource "azurerm_virtual_machine" "hub-vm" {
|
|||||||
os_profile {
|
os_profile {
|
||||||
computer_name = "${local.prefix-hub}-vm"
|
computer_name = "${local.prefix-hub}-vm"
|
||||||
admin_username = var.username
|
admin_username = var.username
|
||||||
admin_password = var.password
|
admin_password = local.password
|
||||||
}
|
}
|
||||||
|
|
||||||
os_profile_linux_config {
|
os_profile_linux_config {
|
||||||
|
@ -5,11 +5,24 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
azurerm = {
|
azurerm = {
|
||||||
source = "hashicorp/azurerm"
|
source = "hashicorp/azurerm"
|
||||||
version = "~>2.0"
|
version = "~> 3.0"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
provider "azurerm" {
|
provider "azurerm" {
|
||||||
features {}
|
features {
|
||||||
|
resource_group {
|
||||||
|
prevent_deletion_if_contains_resources = false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "random_password" "password" {
|
||||||
|
count = var.password == null ? 1 : 0
|
||||||
|
length = 20
|
||||||
|
}
|
||||||
|
|
||||||
|
locals {
|
||||||
|
password = try(random_password.password[0].result, var.password)
|
||||||
}
|
}
|
@ -1,6 +1,6 @@
|
|||||||
locals {
|
locals {
|
||||||
onprem-location = "eastus"
|
onprem-location = "eastus"
|
||||||
onprem-resource-group = "onprem-vnet-rg"
|
onprem-resource-group = "onprem-vnet-rg-${random_string.suffix.result}"
|
||||||
prefix-onprem = "onprem"
|
prefix-onprem = "onprem"
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -111,7 +111,7 @@ resource "azurerm_virtual_machine" "onprem-vm" {
|
|||||||
os_profile {
|
os_profile {
|
||||||
computer_name = "${local.prefix-onprem}-vm"
|
computer_name = "${local.prefix-onprem}-vm"
|
||||||
admin_username = var.username
|
admin_username = var.username
|
||||||
admin_password = var.password
|
admin_password = local.password
|
||||||
}
|
}
|
||||||
|
|
||||||
os_profile_linux_config {
|
os_profile_linux_config {
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
locals {
|
locals {
|
||||||
spoke1-location = "eastus"
|
spoke1-location = "eastus"
|
||||||
spoke1-resource-group = "spoke1-vnet-rg"
|
spoke1-resource-group = "spoke1-vnet-rg-${random_string.suffix.result}"
|
||||||
prefix-spoke1 = "spoke1"
|
prefix-spoke1 = "spoke1"
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -44,7 +44,7 @@ resource "azurerm_virtual_network_peering" "spoke1-hub-peer" {
|
|||||||
allow_forwarded_traffic = true
|
allow_forwarded_traffic = true
|
||||||
allow_gateway_transit = false
|
allow_gateway_transit = false
|
||||||
use_remote_gateways = true
|
use_remote_gateways = true
|
||||||
depends_on = [azurerm_virtual_network.spoke1-vnet, azurerm_virtual_network.hub-vnet , azurerm_virtual_network_gateway.hub-vnet-gateway]
|
depends_on = [azurerm_virtual_network.spoke1-vnet, azurerm_virtual_network.hub-vnet, azurerm_virtual_network_gateway.hub-vnet-gateway]
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_network_interface" "spoke1-nic" {
|
resource "azurerm_network_interface" "spoke1-nic" {
|
||||||
@ -84,7 +84,7 @@ resource "azurerm_virtual_machine" "spoke1-vm" {
|
|||||||
os_profile {
|
os_profile {
|
||||||
computer_name = "${local.prefix-spoke1}-vm"
|
computer_name = "${local.prefix-spoke1}-vm"
|
||||||
admin_username = var.username
|
admin_username = var.username
|
||||||
admin_password = var.password
|
admin_password = local.password
|
||||||
}
|
}
|
||||||
|
|
||||||
os_profile_linux_config {
|
os_profile_linux_config {
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
locals {
|
locals {
|
||||||
spoke2-location = "eastus"
|
spoke2-location = "eastus"
|
||||||
spoke2-resource-group = "spoke2-vnet-rg"
|
spoke2-resource-group = "spoke2-vnet-rg-${random_string.suffix.result}"
|
||||||
prefix-spoke2 = "spoke2"
|
prefix-spoke2 = "spoke2"
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -88,7 +88,7 @@ resource "azurerm_virtual_machine" "spoke2-vm" {
|
|||||||
os_profile {
|
os_profile {
|
||||||
computer_name = "${local.prefix-spoke2}-vm"
|
computer_name = "${local.prefix-spoke2}-vm"
|
||||||
admin_username = var.username
|
admin_username = var.username
|
||||||
admin_password = var.password
|
admin_password = local.password
|
||||||
}
|
}
|
||||||
|
|
||||||
os_profile_linux_config {
|
os_profile_linux_config {
|
||||||
|
@ -10,6 +10,8 @@ variable "username" {
|
|||||||
|
|
||||||
variable "password" {
|
variable "password" {
|
||||||
description = "Password for Virtual Machines"
|
description = "Password for Virtual Machines"
|
||||||
|
sensitive = true
|
||||||
|
default = null
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vmsize" {
|
variable "vmsize" {
|
||||||
|
@ -3,7 +3,7 @@ resource "random_string" "fw_diag_prefix" {
|
|||||||
length = 8
|
length = 8
|
||||||
upper = false
|
upper = false
|
||||||
special = false
|
special = false
|
||||||
number = false
|
numeric = false
|
||||||
}
|
}
|
||||||
resource "azurerm_ip_group" "ip_group_hub" {
|
resource "azurerm_ip_group" "ip_group_hub" {
|
||||||
name = "hub-ipgroup"
|
name = "hub-ipgroup"
|
||||||
@ -47,6 +47,8 @@ resource "azurerm_firewall" "azure_firewall_instance" {
|
|||||||
name = "afw-${var.name}-${var.environment}"
|
name = "afw-${var.name}-${var.environment}"
|
||||||
location = azurerm_resource_group.default.location
|
location = azurerm_resource_group.default.location
|
||||||
resource_group_name = azurerm_resource_group.hub_rg.name
|
resource_group_name = azurerm_resource_group.hub_rg.name
|
||||||
|
sku_name = "AZFW_VNet"
|
||||||
|
sku_tier = "Standard"
|
||||||
firewall_policy_id = azurerm_firewall_policy.base_policy.id
|
firewall_policy_id = azurerm_firewall_policy.base_policy.id
|
||||||
|
|
||||||
ip_configuration {
|
ip_configuration {
|
||||||
@ -105,6 +107,11 @@ resource "azurerm_monitor_diagnostic_setting" "azure_firewall_instance" {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
lifecycle {
|
||||||
|
ignore_changes = [
|
||||||
|
log
|
||||||
|
]
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_firewall_policy_rule_collection_group" "azure_firewall_rules_collection" {
|
resource "azurerm_firewall_policy_rule_collection_group" "azure_firewall_rules_collection" {
|
||||||
|
@ -3,7 +3,7 @@ resource "random_string" "ci_prefix" {
|
|||||||
length = 8
|
length = 8
|
||||||
upper = false
|
upper = false
|
||||||
special = false
|
special = false
|
||||||
number = false
|
numeric = false
|
||||||
}
|
}
|
||||||
|
|
||||||
# Compute instance
|
# Compute instance
|
||||||
|
@ -10,6 +10,15 @@ resource "azurerm_network_interface" "dsvm" {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "random_password" "dsvm_host_password" {
|
||||||
|
count = var.dsvm_host_password == null ? 1 : 0
|
||||||
|
length = 20
|
||||||
|
}
|
||||||
|
|
||||||
|
locals {
|
||||||
|
dsvm_host_password = try(random_password.dsvm_host_password[0].result, var.dsvm_host_password)
|
||||||
|
}
|
||||||
|
|
||||||
resource "azurerm_windows_virtual_machine" "dsvm" {
|
resource "azurerm_windows_virtual_machine" "dsvm" {
|
||||||
name = var.dsvm_name
|
name = var.dsvm_name
|
||||||
location = azurerm_resource_group.default.location
|
location = azurerm_resource_group.default.location
|
||||||
@ -37,12 +46,18 @@ resource "azurerm_windows_virtual_machine" "dsvm" {
|
|||||||
}
|
}
|
||||||
computer_name = var.dsvm_name
|
computer_name = var.dsvm_name
|
||||||
admin_username = var.dsvm_admin_username
|
admin_username = var.dsvm_admin_username
|
||||||
admin_password = var.dsvm_host_password
|
admin_password = local.dsvm_host_password
|
||||||
|
|
||||||
provision_vm_agent = true
|
provision_vm_agent = true
|
||||||
|
vm_agent_platform_updates_enabled = false
|
||||||
|
|
||||||
timeouts {
|
timeouts {
|
||||||
create = "60m"
|
create = "60m"
|
||||||
delete = "2h"
|
delete = "2h"
|
||||||
}
|
}
|
||||||
|
lifecycle {
|
||||||
|
ignore_changes = [
|
||||||
|
vm_agent_platform_updates_enabled,
|
||||||
|
]
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -4,29 +4,43 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
azurerm = {
|
azurerm = {
|
||||||
source = "hashicorp/azurerm"
|
source = "hashicorp/azurerm"
|
||||||
version = "=2.78.0"
|
version = "~> 3.0"
|
||||||
}
|
}
|
||||||
|
|
||||||
azureml = {
|
azureml = {
|
||||||
source = "registry.terraform.io/Telemaco019/azureml"
|
source = "registry.terraform.io/orobix/azureml"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
provider "azurerm" {
|
provider "azurerm" {
|
||||||
features {}
|
features {
|
||||||
|
key_vault {
|
||||||
|
recover_soft_deleted_key_vaults = false
|
||||||
|
purge_soft_delete_on_destroy = false
|
||||||
|
purge_soft_deleted_keys_on_destroy = false
|
||||||
|
}
|
||||||
|
resource_group {
|
||||||
|
prevent_deletion_if_contains_resources = false
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
data "azurerm_client_config" "current" {}
|
data "azurerm_client_config" "current" {}
|
||||||
|
|
||||||
|
resource "random_string" "suffix" {
|
||||||
|
length = 4
|
||||||
|
upper = false
|
||||||
|
special = false
|
||||||
|
}
|
||||||
|
|
||||||
resource "azurerm_resource_group" "default" {
|
resource "azurerm_resource_group" "default" {
|
||||||
name = "rg-${var.name}-${var.environment}"
|
name = "rg-${var.name}-${var.environment}-${random_string.suffix.result}"
|
||||||
location = var.location
|
location = var.location
|
||||||
}
|
}
|
||||||
|
|
||||||
#Hub Resource Group
|
#Hub Resource Group
|
||||||
resource "azurerm_resource_group" "hub_rg" {
|
resource "azurerm_resource_group" "hub_rg" {
|
||||||
name = "rg-hub-${var.name}-${var.environment}"
|
name = "rg-hub-${var.name}-${var.environment}-${random_string.suffix.result}"
|
||||||
location = var.location
|
location = var.location
|
||||||
|
|
||||||
}
|
}
|
@ -1,6 +1,7 @@
|
|||||||
variable "name" {
|
variable "name" {
|
||||||
type = string
|
type = string
|
||||||
description = "Name of the deployment"
|
description = "Name of the deployment"
|
||||||
|
default = "301mlhss"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "environment" {
|
variable "environment" {
|
||||||
@ -90,4 +91,5 @@ variable "dsvm_host_password" {
|
|||||||
type = string
|
type = string
|
||||||
description = "Password for the admin username of the Data Science VM"
|
description = "Password for the admin username of the Data Science VM"
|
||||||
sensitive = true
|
sensitive = true
|
||||||
|
default = null
|
||||||
}
|
}
|
@ -1,6 +1,6 @@
|
|||||||
# Dependent resources for Azure Machine Learning
|
# Dependent resources for Azure Machine Learning
|
||||||
resource "azurerm_application_insights" "default" {
|
resource "azurerm_application_insights" "default" {
|
||||||
name = "appi-${var.name}-${var.environment}"
|
name = "appi-${var.name}-${var.environment}-${random_string.suffix.result}"
|
||||||
location = azurerm_resource_group.default.location
|
location = azurerm_resource_group.default.location
|
||||||
resource_group_name = azurerm_resource_group.default.name
|
resource_group_name = azurerm_resource_group.default.name
|
||||||
workspace_id = azurerm_log_analytics_workspace.default.id
|
workspace_id = azurerm_log_analytics_workspace.default.id
|
||||||
@ -8,7 +8,7 @@ resource "azurerm_application_insights" "default" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_key_vault" "default" {
|
resource "azurerm_key_vault" "default" {
|
||||||
name = "kv-${var.name}-${var.environment}"
|
name = "kv-${var.name}-${var.environment}-${random_string.suffix.result}"
|
||||||
location = azurerm_resource_group.default.location
|
location = azurerm_resource_group.default.location
|
||||||
resource_group_name = azurerm_resource_group.default.name
|
resource_group_name = azurerm_resource_group.default.name
|
||||||
tenant_id = data.azurerm_client_config.current.tenant_id
|
tenant_id = data.azurerm_client_config.current.tenant_id
|
||||||
@ -22,7 +22,7 @@ resource "azurerm_key_vault" "default" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_storage_account" "default" {
|
resource "azurerm_storage_account" "default" {
|
||||||
name = "st${var.name}${var.environment}"
|
name = "st${var.name}${var.environment}${random_string.suffix.result}"
|
||||||
location = azurerm_resource_group.default.location
|
location = azurerm_resource_group.default.location
|
||||||
resource_group_name = azurerm_resource_group.default.name
|
resource_group_name = azurerm_resource_group.default.name
|
||||||
account_tier = "Standard"
|
account_tier = "Standard"
|
||||||
@ -36,7 +36,7 @@ resource "azurerm_storage_account" "default" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_container_registry" "default" {
|
resource "azurerm_container_registry" "default" {
|
||||||
name = "cr${var.name}${var.environment}"
|
name = "cr${var.name}${var.environment}${random_string.suffix.result}"
|
||||||
location = azurerm_resource_group.default.location
|
location = azurerm_resource_group.default.location
|
||||||
resource_group_name = azurerm_resource_group.default.name
|
resource_group_name = azurerm_resource_group.default.name
|
||||||
sku = "Premium"
|
sku = "Premium"
|
||||||
@ -50,7 +50,7 @@ resource "azurerm_container_registry" "default" {
|
|||||||
|
|
||||||
# Machine Learning workspace
|
# Machine Learning workspace
|
||||||
resource "azurerm_machine_learning_workspace" "default" {
|
resource "azurerm_machine_learning_workspace" "default" {
|
||||||
name = "mlw-${var.name}-${var.environment}"
|
name = "mlw-${var.name}-${var.environment}-${random_string.suffix.result}"
|
||||||
location = azurerm_resource_group.default.location
|
location = azurerm_resource_group.default.location
|
||||||
resource_group_name = azurerm_resource_group.default.name
|
resource_group_name = azurerm_resource_group.default.name
|
||||||
application_insights_id = azurerm_application_insights.default.id
|
application_insights_id = azurerm_application_insights.default.id
|
||||||
@ -76,6 +76,13 @@ resource "azurerm_machine_learning_workspace" "default" {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "time_sleep" "one_min" {
|
||||||
|
create_duration = "1m"
|
||||||
|
depends_on = [
|
||||||
|
azurerm_windows_virtual_machine.dsvm
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
# Private endpoints
|
# Private endpoints
|
||||||
resource "azurerm_private_endpoint" "kv_ple" {
|
resource "azurerm_private_endpoint" "kv_ple" {
|
||||||
name = "ple-${var.name}-${var.environment}-kv"
|
name = "ple-${var.name}-${var.environment}-kv"
|
||||||
@ -94,6 +101,9 @@ resource "azurerm_private_endpoint" "kv_ple" {
|
|||||||
subresource_names = ["vault"]
|
subresource_names = ["vault"]
|
||||||
is_manual_connection = false
|
is_manual_connection = false
|
||||||
}
|
}
|
||||||
|
depends_on = [
|
||||||
|
time_sleep.one_min
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_private_endpoint" "st_ple_blob" {
|
resource "azurerm_private_endpoint" "st_ple_blob" {
|
||||||
@ -113,6 +123,9 @@ resource "azurerm_private_endpoint" "st_ple_blob" {
|
|||||||
subresource_names = ["blob"]
|
subresource_names = ["blob"]
|
||||||
is_manual_connection = false
|
is_manual_connection = false
|
||||||
}
|
}
|
||||||
|
depends_on = [
|
||||||
|
time_sleep.one_min
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_private_endpoint" "storage_ple_file" {
|
resource "azurerm_private_endpoint" "storage_ple_file" {
|
||||||
@ -132,6 +145,9 @@ resource "azurerm_private_endpoint" "storage_ple_file" {
|
|||||||
subresource_names = ["file"]
|
subresource_names = ["file"]
|
||||||
is_manual_connection = false
|
is_manual_connection = false
|
||||||
}
|
}
|
||||||
|
depends_on = [
|
||||||
|
time_sleep.one_min
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_private_endpoint" "cr_ple" {
|
resource "azurerm_private_endpoint" "cr_ple" {
|
||||||
@ -151,6 +167,9 @@ resource "azurerm_private_endpoint" "cr_ple" {
|
|||||||
subresource_names = ["registry"]
|
subresource_names = ["registry"]
|
||||||
is_manual_connection = false
|
is_manual_connection = false
|
||||||
}
|
}
|
||||||
|
depends_on = [
|
||||||
|
time_sleep.one_min
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "azurerm_private_endpoint" "mlw_ple" {
|
resource "azurerm_private_endpoint" "mlw_ple" {
|
||||||
@ -170,6 +189,9 @@ resource "azurerm_private_endpoint" "mlw_ple" {
|
|||||||
subresource_names = ["amlworkspace"]
|
subresource_names = ["amlworkspace"]
|
||||||
is_manual_connection = false
|
is_manual_connection = false
|
||||||
}
|
}
|
||||||
|
depends_on = [
|
||||||
|
time_sleep.one_min
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
# Compute cluster for image building required since the workspace is behind a vnet.
|
# Compute cluster for image building required since the workspace is behind a vnet.
|
||||||
|
Reference in New Issue
Block a user