From 057a0330cad028fb783d8d870ffb457c23698be7 Mon Sep 17 00:00:00 2001 From: ryhud Date: Fri, 12 Nov 2021 16:33:12 -0500 Subject: [PATCH] terraform fmt --- .../bastion.tf | 218 +++++++++--------- .../dsvm.tf | 56 ++--- .../network.tf | 8 +- .../workspace.tf | 2 +- 4 files changed, 142 insertions(+), 142 deletions(-) diff --git a/quickstart/201-machine-learning-moderately-secure/bastion.tf b/quickstart/201-machine-learning-moderately-secure/bastion.tf index d8cae3d8..dcea9044 100644 --- a/quickstart/201-machine-learning-moderately-secure/bastion.tf +++ b/quickstart/201-machine-learning-moderately-secure/bastion.tf @@ -1,125 +1,125 @@ -resource "azurerm_public_ip" "azure_bastion" { - name = "pip-azure-bastion" - location = azurerm_resource_group.default.location - resource_group_name = azurerm_resource_group.default.name - allocation_method = "Static" - sku = "Standard" +resource "azurerm_public_ip" "azure_bastion" { + name = "pip-azure-bastion" + location = azurerm_resource_group.default.location + resource_group_name = azurerm_resource_group.default.name + allocation_method = "Static" + sku = "Standard" } -resource "azurerm_network_security_group" "bastion_nsg" { - name = "nsg-bastion" - location = azurerm_resource_group.default.location - resource_group_name = azurerm_resource_group.default.name +resource "azurerm_network_security_group" "bastion_nsg" { + name = "nsg-bastion" + location = azurerm_resource_group.default.location + resource_group_name = azurerm_resource_group.default.name - security_rule { - name = "AllowHTTPSInbound" - priority = 100 - direction = "Inbound" - access = "Allow" - protocol = "Tcp" - source_port_range = "*" - destination_port_range = "443" - source_address_prefix = "Internet" - destination_address_prefix = "*" - } - security_rule { - name = "AllowGatewayManagerInbound" - priority = 200 - direction = "Inbound" - access = "Allow" - protocol = "Tcp" - source_port_range = "*" - destination_port_range = "443" - source_address_prefix = "GatewayManager" - destination_address_prefix = "*" - } - security_rule { - name = "AllowAzureLBInbound" - priority = 300 - direction = "Inbound" - access = "Allow" - protocol = "Tcp" - source_port_range = "*" - destination_port_range = "443" - source_address_prefix = "AzureLoadBalancer" - destination_address_prefix = "*" - } - security_rule { - name = "AllowBastionHostCommunication" - priority = 400 - direction = "Inbound" - access = "Allow" - protocol = "*" - source_port_range = "*" - destination_port_ranges = ["5701","8080"] - source_address_prefix = "VirtualNetwork" - destination_address_prefix = "VirtualNetwork" - } - security_rule { - name = "AllowRdpSshOutbound" - priority = 100 - direction = "Outbound" - access = "Allow" - protocol = "Tcp" - source_port_range = "*" - destination_port_ranges = ["22", "3389"] - source_address_prefix = "*" - destination_address_prefix = "VirtualNetwork" - } - security_rule { - name = "AllowBastionHostCommunicationOutbound" - priority = 110 - direction = "Outbound" - access = "Allow" - protocol = "Tcp" - source_port_range = "*" - destination_port_ranges = ["5701", "8080"] - source_address_prefix = "VirtualNetwork" - destination_address_prefix = "VirtualNetwork" + security_rule { + name = "AllowHTTPSInbound" + priority = 100 + direction = "Inbound" + access = "Allow" + protocol = "Tcp" + source_port_range = "*" + destination_port_range = "443" + source_address_prefix = "Internet" + destination_address_prefix = "*" } - security_rule { - name = "AllowAzureCloudOutbound" - priority = 120 - direction = "Outbound" - access = "Allow" - protocol = "Tcp" - source_port_range = "*" - destination_port_ranges = ["443"] - source_address_prefix = "*" - destination_address_prefix = "AzureCloud" - } - security_rule { - name = "AllowGetSessionInformation" - priority = 130 - direction = "Outbound" - access = "Allow" - protocol = "Tcp" - source_port_range = "*" - destination_port_ranges = ["80"] - source_address_prefix = "*" - destination_address_prefix = "Internet" -} - + security_rule { + name = "AllowGatewayManagerInbound" + priority = 200 + direction = "Inbound" + access = "Allow" + protocol = "Tcp" + source_port_range = "*" + destination_port_range = "443" + source_address_prefix = "GatewayManager" + destination_address_prefix = "*" + } + security_rule { + name = "AllowAzureLBInbound" + priority = 300 + direction = "Inbound" + access = "Allow" + protocol = "Tcp" + source_port_range = "*" + destination_port_range = "443" + source_address_prefix = "AzureLoadBalancer" + destination_address_prefix = "*" + } + security_rule { + name = "AllowBastionHostCommunication" + priority = 400 + direction = "Inbound" + access = "Allow" + protocol = "*" + source_port_range = "*" + destination_port_ranges = ["5701", "8080"] + source_address_prefix = "VirtualNetwork" + destination_address_prefix = "VirtualNetwork" + } + security_rule { + name = "AllowRdpSshOutbound" + priority = 100 + direction = "Outbound" + access = "Allow" + protocol = "Tcp" + source_port_range = "*" + destination_port_ranges = ["22", "3389"] + source_address_prefix = "*" + destination_address_prefix = "VirtualNetwork" + } + security_rule { + name = "AllowBastionHostCommunicationOutbound" + priority = 110 + direction = "Outbound" + access = "Allow" + protocol = "Tcp" + source_port_range = "*" + destination_port_ranges = ["5701", "8080"] + source_address_prefix = "VirtualNetwork" + destination_address_prefix = "VirtualNetwork" + } + security_rule { + name = "AllowAzureCloudOutbound" + priority = 120 + direction = "Outbound" + access = "Allow" + protocol = "Tcp" + source_port_range = "*" + destination_port_ranges = ["443"] + source_address_prefix = "*" + destination_address_prefix = "AzureCloud" + } + security_rule { + name = "AllowGetSessionInformation" + priority = 130 + direction = "Outbound" + access = "Allow" + protocol = "Tcp" + source_port_range = "*" + destination_port_ranges = ["80"] + source_address_prefix = "*" + destination_address_prefix = "Internet" + } + } resource "azurerm_subnet_network_security_group_association" "bastion_nsg_assoc" { subnet_id = azurerm_subnet.azure_bastion.id network_security_group_id = azurerm_network_security_group.bastion_nsg.id - depends_on = [ - azurerm_bastion_host.azure_bastion_instance - ] + depends_on = [ + azurerm_bastion_host.azure_bastion_instance + ] } resource "azurerm_bastion_host" "azure_bastion_instance" { - name = "bas-${var.name}-${var.environment}" - location = azurerm_resource_group.default.location - resource_group_name = azurerm_resource_group.default.name + name = "bas-${var.name}-${var.environment}" + location = azurerm_resource_group.default.location + resource_group_name = azurerm_resource_group.default.name - ip_configuration { - name = "configuration" - subnet_id = azurerm_subnet.azure_bastion.id - public_ip_address_id = azurerm_public_ip.azure_bastion.id - } + ip_configuration { + name = "configuration" + subnet_id = azurerm_subnet.azure_bastion.id + public_ip_address_id = azurerm_public_ip.azure_bastion.id + } } diff --git a/quickstart/201-machine-learning-moderately-secure/dsvm.tf b/quickstart/201-machine-learning-moderately-secure/dsvm.tf index 5beed51f..d01ddebe 100644 --- a/quickstart/201-machine-learning-moderately-secure/dsvm.tf +++ b/quickstart/201-machine-learning-moderately-secure/dsvm.tf @@ -1,48 +1,48 @@ -resource "azurerm_network_interface" "dsvm" { - name = "nic-${var.dsvm_name}" - location = azurerm_resource_group.default.location - resource_group_name = azurerm_resource_group.default.name - - ip_configuration { - name = "configuration" - subnet_id = azurerm_subnet.snet-dsvm.id - private_ip_address_allocation = "Dynamic" - } +resource "azurerm_network_interface" "dsvm" { + name = "nic-${var.dsvm_name}" + location = azurerm_resource_group.default.location + resource_group_name = azurerm_resource_group.default.name + + ip_configuration { + name = "configuration" + subnet_id = azurerm_subnet.snet-dsvm.id + private_ip_address_allocation = "Dynamic" + } } resource "azurerm_windows_virtual_machine" "dsvm" { - name = var.dsvm_name - location = azurerm_resource_group.default.location - resource_group_name = azurerm_resource_group.default.name + name = var.dsvm_name + location = azurerm_resource_group.default.location + resource_group_name = azurerm_resource_group.default.name network_interface_ids = [ - azurerm_network_interface.dsvm.id - ] - size = "Standard_DS3_v2" - + azurerm_network_interface.dsvm.id + ] + size = "Standard_DS3_v2" + source_image_reference { publisher = "microsoft-dsvm" offer = "dsvm-win-2019" sku = "server-2019" version = "latest" } - + os_disk { - name = "osdisk-${var.dsvm_name}" - caching = "ReadWrite" + name = "osdisk-${var.dsvm_name}" + caching = "ReadWrite" storage_account_type = "Premium_LRS" } - + identity { type = "SystemAssigned" } - computer_name = var.dsvm_name - admin_username = var.dsvm_admin_username - admin_password = var.dsvm_host_password - + computer_name = var.dsvm_name + admin_username = var.dsvm_admin_username + admin_password = var.dsvm_host_password + provision_vm_agent = true - + timeouts { - create = "60m" - delete = "2h" + create = "60m" + delete = "2h" } } diff --git a/quickstart/201-machine-learning-moderately-secure/network.tf b/quickstart/201-machine-learning-moderately-secure/network.tf index 11bf0c28..0911c8eb 100644 --- a/quickstart/201-machine-learning-moderately-secure/network.tf +++ b/quickstart/201-machine-learning-moderately-secure/network.tf @@ -39,10 +39,10 @@ resource "azurerm_subnet" "snet-dsvm" { } resource "azurerm_subnet" "azure_bastion" { - name = "AzureBastionSubnet" - resource_group_name = azurerm_resource_group.default.name - virtual_network_name = azurerm_virtual_network.default.name - address_prefixes = var.bastion_subnet_address_space + name = "AzureBastionSubnet" + resource_group_name = azurerm_resource_group.default.name + virtual_network_name = azurerm_virtual_network.default.name + address_prefixes = var.bastion_subnet_address_space } # Private DNS Zones diff --git a/quickstart/201-machine-learning-moderately-secure/workspace.tf b/quickstart/201-machine-learning-moderately-secure/workspace.tf index dc0036cc..7b6ba44a 100644 --- a/quickstart/201-machine-learning-moderately-secure/workspace.tf +++ b/quickstart/201-machine-learning-moderately-secure/workspace.tf @@ -63,7 +63,7 @@ resource "azurerm_machine_learning_workspace" "default" { # Args of use when using an Azure Private Link configuration public_network_access_enabled = false image_build_compute_name = var.image_build_compute_name - depends_on = [ + depends_on = [ azurerm_private_endpoint.kv_ple, azurerm_private_endpoint.st_ple_blob, azurerm_private_endpoint.storage_ple_file,