fix comments

This commit is contained in:
murggu 2022-11-18 22:12:00 +01:00
parent a0ddf338d3
commit eb6b615ae3
14 changed files with 42 additions and 58 deletions

View File

@ -9,7 +9,6 @@ Network connectivity to the workspace is allowed over public endpoints, making t
## Resources ## Resources
| Terraform Resource Type | Description | | Terraform Resource Type | Description |
| - | - | | - | - |
| `azurerm_resource_group` | The resource group all resources get deployed into. | | `azurerm_resource_group` | The resource group all resources get deployed into. |
@ -46,6 +45,6 @@ Network connectivity to the workspace is allowed over public endpoints, making t
## Learn more ## Learn more
- If you are new to Azure Synapse Analytics, see [Azure Synapse Analytics service](https://azure.microsoft.com/services/synapse-analytics/) and [Azure Synapse Analytics documentation](https://learn.microsoft.com/azure/synapse-analytics/overview-what-is). - If you are new to Azure Synapse Analytics, see [Azure Synapse Analytics service](https://azure.microsoft.com/services/synapse-analytics/) and [Azure Synapse Analytics documentation](https://learn.microsoft.com/azure/synapse-analytics/guidance/success-by-design-introduction).
- To learn more about security configurations in Azure Synapse Analytics, see [Azure Synapse Analytics security white paper](https://learn.microsoft.com/azure/synapse-analytics/guidance/security-white-paper-introduction). - To learn more about security configurations in Azure Synapse Analytics, see [Azure Synapse Analytics security white paper](https://learn.microsoft.com/azure/synapse-analytics/guidance/security-white-paper-introduction) and watch [Success with Synapse - Security videos](https://www.youtube.com/playlist?list=PLzUAjXZBFU9OWYjSI5TdlpMV0ltAjLaNw).
- For all configurations of Azure Synapse Analytics in Terraform, see [Terraform Hashicorp AzureRM provider documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/synapse_workspace). - For all configurations of Azure Synapse Analytics in Terraform, see [Terraform Hashicorp AzureRM provider documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/synapse_workspace).

View File

@ -1,4 +1,4 @@
locals { locals {
basename = "${var.name}-${var.environment}" basename = "${var.name}-${var.environment}"
safe_basename = replace(local.basename, "-", "") safe_basename = replace(local.basename, "-", "")
} }

View File

@ -1,15 +1,3 @@
terraform {
required_providers {
azurerm = {
version = "= 3.30.0"
}
}
}
provider "azurerm" {
features {}
}
data "azurerm_client_config" "current" {} data "azurerm_client_config" "current" {}
data "http" "ip" { data "http" "ip" {

View File

@ -0,0 +1,11 @@
terraform {
required_providers {
azurerm = {
version = "= 3.32.0"
}
}
}
provider "azurerm" {
features {}
}

View File

@ -23,6 +23,6 @@ resource "azurerm_synapse_workspace" "default" {
resource "azurerm_synapse_firewall_rule" "allow_my_ip" { resource "azurerm_synapse_firewall_rule" "allow_my_ip" {
name = "AllowMyPublicIp" name = "AllowMyPublicIp"
synapse_workspace_id = azurerm_synapse_workspace.default.id synapse_workspace_id = azurerm_synapse_workspace.default.id
start_ip_address = data.http.ip.body start_ip_address = data.http.ip.response_body
end_ip_address = data.http.ip.body end_ip_address = data.http.ip.response_body
} }

View File

@ -32,13 +32,11 @@ variable "aad_login" {
variable "synadmin_username" { variable "synadmin_username" {
type = string type = string
description = "Specifies The login name of the SQL administrator" description = "Specifies The login name of the SQL administrator"
default = "sqladminuser"
} }
variable "synadmin_password" { variable "synadmin_password" {
type = string type = string
description = "The Password associated with the sql_administrator_login for the SQL administrator" description = "The Password associated with the sql_administrator_login for the SQL administrator"
default = "ThisIsNotVerySecure!"
} }
variable "enable_syn_sparkpool" { variable "enable_syn_sparkpool" {

View File

@ -40,8 +40,6 @@ This configuration describes the minimal set of resources you require to get sta
| enable_syn_sparkpool| A feature flag to enable/disable the Spark pool | false | | enable_syn_sparkpool| A feature flag to enable/disable the Spark pool | false |
| enable_syn_sqlpool| A feature flag to enable/disable the SQL pool | false | | enable_syn_sqlpool| A feature flag to enable/disable the SQL pool | false |
## Usage ## Usage
1. Copy `terraform.tfvars.example` to `terraform.tfvars` 1. Copy `terraform.tfvars.example` to `terraform.tfvars`
@ -55,6 +53,6 @@ This configuration describes the minimal set of resources you require to get sta
## Learn more ## Learn more
- If you are new to Azure Synapse Analytics, see [Azure Synapse Analytics service](https://azure.microsoft.com/services/synapse-analytics/) and [Azure Synapse Analytics documentation](https://learn.microsoft.com/azure/synapse-analytics/overview-what-is). - If you are new to Azure Synapse Analytics, see [Azure Synapse Analytics service](https://azure.microsoft.com/services/synapse-analytics/) and [Azure Synapse Analytics documentation](https://learn.microsoft.com/azure/synapse-analytics/guidance/success-by-design-introduction).
- To learn more about security configurations in Azure Synapse Analytics, see [Azure Synapse Analytics security white paper](https://learn.microsoft.com/azure/synapse-analytics/guidance/security-white-paper-introduction). - To learn more about security configurations in Azure Synapse Analytics, see [Azure Synapse Analytics security white paper](https://learn.microsoft.com/azure/synapse-analytics/guidance/security-white-paper-introduction) and watch [Success with Synapse - Security videos](https://www.youtube.com/playlist?list=PLzUAjXZBFU9OWYjSI5TdlpMV0ltAjLaNw).
- For all configurations of Azure Synapse Analytics in Terraform, see [Terraform Hashicorp AzureRM provider documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/synapse_workspace). - For all configurations of Azure Synapse Analytics in Terraform, see [Terraform Hashicorp AzureRM provider documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/synapse_workspace).

View File

@ -1,4 +1,4 @@
locals { locals {
basename = "${var.name}-${var.environment}" basename = "${var.name}-${var.environment}"
safe_basename = replace(local.basename, "-", "") safe_basename = replace(local.basename, "-", "")
} }

View File

@ -1,15 +1,3 @@
terraform {
required_providers {
azurerm = {
version = "= 3.30.0"
}
}
}
provider "azurerm" {
features {}
}
data "azurerm_client_config" "current" {} data "azurerm_client_config" "current" {}
data "http" "ip" { data "http" "ip" {

View File

@ -8,12 +8,12 @@ resource "azurerm_virtual_network" "default" {
# Subnets # Subnets
resource "azurerm_subnet" "default" { resource "azurerm_subnet" "default" {
name = "snet-${local.basename}" name = "snet-${local.basename}"
resource_group_name = azurerm_resource_group.default.name resource_group_name = azurerm_resource_group.default.name
virtual_network_name = azurerm_virtual_network.default.name virtual_network_name = azurerm_virtual_network.default.name
address_prefixes = ["10.0.1.0/24"] address_prefixes = ["10.0.1.0/24"]
service_endpoints = [] service_endpoints = []
enforce_private_link_endpoint_network_policies = true private_endpoint_network_policies_enabled = true
} }
resource "azurerm_subnet" "bastion" { resource "azurerm_subnet" "bastion" {

View File

@ -0,0 +1,11 @@
terraform {
required_providers {
azurerm = {
version = "= 3.32.0"
}
}
}
provider "azurerm" {
features {}
}

View File

@ -41,7 +41,7 @@ resource "azurerm_storage_account_network_rules" "firewall_rules" {
storage_account_id = azurerm_storage_account.default.id storage_account_id = azurerm_storage_account.default.id
default_action = "Deny" default_action = "Deny"
ip_rules = [data.http.ip.body] ip_rules = [data.http.ip.response_body]
virtual_network_subnet_ids = [] virtual_network_subnet_ids = []
bypass = ["None"] bypass = ["None"]
} }

View File

@ -8,7 +8,9 @@ resource "azurerm_synapse_workspace" "default" {
sql_administrator_login_password = var.synadmin_password sql_administrator_login_password = var.synadmin_password
managed_virtual_network_enabled = true managed_virtual_network_enabled = true
managed_resource_group_name = "${azurerm_resource_group.default.name}-syn-managed" managed_resource_group_name = "${azurerm_resource_group.default.name}-syn-managed"
public_network_access_enabled = false
aad_admin { aad_admin {
login = var.aad_login.name login = var.aad_login.name
@ -21,13 +23,6 @@ resource "azurerm_synapse_workspace" "default" {
} }
} }
resource "azurerm_synapse_firewall_rule" "allow_my_ip" {
name = "AllowMyPublicIp"
synapse_workspace_id = azurerm_synapse_workspace.default.id
start_ip_address = data.http.ip.body
end_ip_address = data.http.ip.body
}
# DNS Zones # DNS Zones
resource "azurerm_private_dns_zone" "zone_dev" { resource "azurerm_private_dns_zone" "zone_dev" {

View File

@ -32,25 +32,21 @@ variable "aad_login" {
variable "jumphost_username" { variable "jumphost_username" {
type = string type = string
description = "Admin username of the VM" description = "Admin username of the VM"
default = "azureuser"
} }
variable "jumphost_password" { variable "jumphost_password" {
type = string type = string
description = "Password for the admin username of the VM" description = "Password for the admin username of the VM"
default = "ThisIsNotVerySecure!"
} }
variable "synadmin_username" { variable "synadmin_username" {
type = string type = string
description = "Specifies The login name of the SQL administrator" description = "Specifies The login name of the SQL administrator"
default = "sqladminuser"
} }
variable "synadmin_password" { variable "synadmin_password" {
type = string type = string
description = "The Password associated with the sql_administrator_login for the SQL administrator" description = "The Password associated with the sql_administrator_login for the SQL administrator"
default = "ThisIsNotVerySecure!"
} }
variable "enable_syn_sparkpool" { variable "enable_syn_sparkpool" {