Hacks, notes and experiments with HashiCorp Terraform
hello-world: Creates an Azure Resource Group.vm-demo: Creates a Windows VM in Azure and configures IIS.appservice-to-vm: An App Services using an existing database in a VM.tshirt-sizes: terraform 0.11 style for parametrizing from a table.dsc-automation-vm: use Azure Automation to install a VSTS Agent.carving-subnets: usingcidrsubnetandcidrhostto statically assign IP addresses.convey-params: pushing parameters from Terraform to Powershell viaazurerm_virtual_machine_extension.uploader: script to upload files to Azure Storage.zipping: how to usearchive_fileto create a local Zip.invoke-arm: use ofazurerm_template_deployment.appservice-to-vm: complex Azure example that shows an App Service using a SQL Server instance hosted in a VM (scenario of green field application using a legacy database).agnostic-modulesCloud agnostic code: how to abstract and decouple from Terraform providers.
Set-AzureRMSecrets.ps1 sets the environment variables required by Terraform to act on Azure
# pro-demo / terraformfun
$env:ARM_ACCESS_KEY = "***"
# Subscription ID
$env:ARM_SUBSCRIPTION_ID = "******"
# Directory ID
$env:ARM_TENANT_ID = "******"
# Application ID (terraform-fun)
$env:ARM_CLIENT_ID = "******"
# Key $env:ComputerName exp. $(Get-Date)
$env:ARM_CLIENT_SECRET = "********"Can use two Service Principals (aka Applications) terraform-contrib and terraform-reader
| Service Principal | Resource | Role / Access policy |
|---|---|---|
terraform-contrib |
Subscription | Contributor |
terraform-contrib |
pro-demo KeyVault |
Get & List Secrets |
terraform-reader |
Subscription | Reader |
terraform-reader |
pro-demo KeyVault |
Get & List Secrets |
The latter can be shared "freely", the former can do damage (planning is key).
Some example, notably agnostic-modules, requires additional accounts and permissions.