-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: azure verified modules for alz platform landing zone starter do…
…cs (#7) * stub out AVM starter docs * Save changes * Save changes * Save changes * Save changes * Save changes * Save changes * Save changes * Save changes * save changes * Save changes * save changes * save changes * save changes * Save changes * Save changes * Save changes * save changes * Fixing links * Latest updates and fixes * Minor fixes * Update docs/content/accelerator/startermodules/terraform-platform-landing-zone/multi-region-virtual-wan-with-azure-firewall.md Co-authored-by: Copilot <[email protected]> * Update docs/content/accelerator/startermodules/terraform-platform-landing-zone/multi-region-virtual-wan-with-azure-firewall.md Co-authored-by: Copilot <[email protected]> * Update docs/content/accelerator/startermodules/terraform-platform-landing-zone/multi-region-virtual-wan-with-nva.md Co-authored-by: Copilot <[email protected]> * Update docs/content/accelerator/startermodules/terraform-platform-landing-zone/multi-region-virtual-wan-with-nva.md Co-authored-by: Copilot <[email protected]> * Update docs/content/accelerator/startermodules/terraform-platform-landing-zone/multi-region-hub-and-spoke-vnet-with-azure-firewall.md Co-authored-by: Copilot <[email protected]> * Update docs/content/accelerator/startermodules/terraform-platform-landing-zone/multi-region-hub-and-spoke-vnet-with-azure-firewall.md Co-authored-by: Copilot <[email protected]> --------- Co-authored-by: Copilot <[email protected]>
- Loading branch information
1 parent
1852977
commit 4f345fa
Showing
48 changed files
with
1,692 additions
and
659 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
477 changes: 477 additions & 0 deletions
477
docs/content/accelerator/startermodules/terraform-platform-landing-zone/_index.md
Large diffs are not rendered by default.
Oops, something went wrong.
29 changes: 29 additions & 0 deletions
29
...t/accelerator/startermodules/terraform-platform-landing-zone/management_only.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
--- | ||
title: Scenario - Management Groups, Policy and Management Resources Only | ||
weight: 20 | ||
--- | ||
|
||
A platform landing zone deployment without any connectivity resources. | ||
|
||
* Example Platform landing zone configuration file: [management_only/management.tfvars](https://raw.githubusercontent.com/Azure/alz-terraform-accelerator/refs/heads/main/templates/platform_landing_zone/examples/management_only/management.tfvars) | ||
|
||
## Resources | ||
|
||
The following resources are deployed by default in this scenario: | ||
|
||
### Management | ||
|
||
#### Management Groups | ||
|
||
- Management Groups | ||
- Policy Definitions | ||
- Policy Set Definitions | ||
- Policy Assignments (not those related to connectivity) | ||
- Policy Assignment Role Assignments | ||
|
||
#### Management Resources | ||
|
||
- Log Analytics Workspace | ||
- Log Analytics Data Collection Rules for AMA | ||
- User Assigned Managed Identity for AMA | ||
- Automation Account |
86 changes: 86 additions & 0 deletions
86
...rm-platform-landing-zone/multi-region-hub-and-spoke-vnet-with-azure-firewall.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,86 @@ | ||
--- | ||
title: Scenario - Multi-Region Hub and Spoke Virtual Network with Azure Firewall | ||
weight: 5 | ||
--- | ||
|
||
A full platform landing zone deployment with hub and spoke Virtual Network connectivity using Azure Firewall in multiple regions. | ||
|
||
* Example Platform landing zone configuration file: [full-multi-region/hub-and-spoke-vnet.tfvars](https://raw.githubusercontent.com/Azure/alz-terraform-accelerator/refs/heads/main/templates/platform_landing_zone/examples/full-multi-region/hub-and-spoke-vnet.tfvars) | ||
|
||
## Resources | ||
|
||
The following resources are deployed by default in this scenario: | ||
|
||
### Management | ||
|
||
#### Management Groups | ||
|
||
- Management Groups | ||
- Policy Definitions | ||
- Policy Set Definitions | ||
- Policy Assignments | ||
- Policy Assignment Role Assignments | ||
|
||
#### Management Resources | ||
|
||
- Log Analytics Workspace | ||
- Log Analytics Data Collection Rules for AMA | ||
- User Assigned Managed Identity for AMA | ||
- Automation Account | ||
|
||
### Connectivity | ||
|
||
#### Azure DDOS Protection Plan | ||
|
||
- DDOS Protection Plan | ||
|
||
#### Azure Virtual Networks | ||
|
||
- Hub virtual networks in each region | ||
- Hub virtual network peering | ||
- Subnets for Firewall, Gateway, Bastion, and Private DNS Resolver in each region | ||
- Azure Route table for Firewall per region | ||
- Azure Route table for other subnets and spokes per region | ||
|
||
#### Azure Firewall | ||
|
||
- Azure Firewall per region | ||
- Azure Firewall public IP per region | ||
- Azure Firewall policy per region | ||
|
||
#### Azure Bastion | ||
|
||
- Azure Bastion per region | ||
- Azure Bastion public IP per region | ||
|
||
#### Azure Private DNS | ||
|
||
- Azure Private DNS Resolver per region | ||
- Azure non-regional Private Link Private DNS zones in primary region | ||
- Azure regional Private Link Private DNS zones per region | ||
- Azure Virtual Machine auto-registration Private DNS zone per region | ||
- Azure Private Link DNS zone virtual network links per region | ||
|
||
#### Azure Virtual Network Gateways | ||
|
||
- Azure ExpressRoute Virtual Network Gateway per region | ||
- Azure VPN Virtual Network Gateway per region | ||
|
||
## Configuration | ||
|
||
The following relevant configuration is applied: | ||
|
||
### Azure DNS | ||
|
||
Private DNS is configured ready for using Private Link and Virtual Machine Auto-registration. Spoke Virtual Networks should use the Azure Firewall IP Address in the same region as their DNS configuration. | ||
|
||
- Azure Firewall is configured as DNS proxy | ||
- Azure Firewall forwards DNS traffic to the Private DNS resolver | ||
- Azure Private DNS Resolver has an inbound endpoint from the hub network | ||
- Azure Private Link DNS zones are linked to all the hub Virtual Networks | ||
|
||
### Azure Routing | ||
|
||
Route tables are pre-configured for spoke virtual networks in each region. Assign the user subnet route table to any subnets created in spokes. | ||
|
||
- Azure Firewall in relevant region as next hop in Route Table |
80 changes: 80 additions & 0 deletions
80
...les/terraform-platform-landing-zone/multi-region-hub-and-spoke-vnet-with-nva.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,80 @@ | ||
--- | ||
title: Scenario - Multi-Region Hub and Spoke Virtual Network with Network Virtual Appliance (NVA) | ||
weight: 7 | ||
--- | ||
|
||
A full platform landing zone deployment with hub and spoke Virtual Network connectivity in multiple regions, ready for a third party Network Virtual Appliance (NVA). | ||
|
||
* Example platform landing zone configuration file: [full-multi-region-nva/virtual-wan.tfvars](https://raw.githubusercontent.com/Azure/alz-terraform-accelerator/refs/heads/main/templates/platform_landing_zone/examples/full-multi-region-nva/virtual-wan.tfvars) | ||
|
||
## Resources | ||
|
||
The following resources are deployed by default in this scenario: | ||
|
||
### Management | ||
|
||
#### Management Groups | ||
|
||
- Management Groups | ||
- Policy Definitions | ||
- Policy Set Definitions | ||
- Policy Assignments | ||
- Policy Assignment Role Assignments | ||
|
||
#### Management Resources | ||
|
||
- Log Analytics Workspace | ||
- Log Analytics Data Collection Rules for AMA | ||
- User Assigned Managed Identity for AMA | ||
- Automation Account | ||
|
||
### Connectivity | ||
|
||
#### Azure DDOS Protection Plan | ||
|
||
- DDOS Protection Plan | ||
|
||
#### Azure Virtual Networks | ||
|
||
- Hub virtual networks in each region | ||
- Hub virtual network peering | ||
- Subnets for Network Virtual Appliance, Gateway, Bastion, and Private DNS Resolver in each region | ||
- Azure Route table for Network Virtual Appliance per region | ||
- Azure Route table for other subnets and spokes per region | ||
|
||
#### Azure Bastion | ||
|
||
- Azure Bastion per region | ||
- Azure Bastion public ip per region | ||
|
||
#### Azure Private DNS | ||
|
||
- Azure Private DNS Resolver per region | ||
- Azure non-regional Private Link Private DNS zones in primary region | ||
- Azure regional Private Link Private DNS zones per region | ||
- Azure Virtual Machine auto-registration Private DNS zone per region | ||
- Azure Private Link DNS zone virtual network links per region | ||
|
||
#### Azure Virtual Network Gateways | ||
|
||
- Azure ExpressRoute Virtual Network Gateway per region | ||
- Azure VPN Virtual Network Gateway per region | ||
|
||
## Configuration | ||
|
||
The following relevant configuration is applied: | ||
|
||
### Azure DNS | ||
|
||
Private DNS is configured ready for using Private Link and Virtual Machine Auto-registration. Spoke Virtual Networks should use the Network Virtual Appliance IP Address in the same region as their DNS configuration. | ||
|
||
- Network Virtual Appliance should be configured as DNS proxy | ||
- Network Virtual Appliance should be forward DNS traffic to the Private DNS resolver | ||
- Azure Private DNS Resolver has an inbound endpoint from the hub network | ||
- Azure Private Link DNS zones are linked to the all hub Virtual Networks | ||
|
||
### Azure Routing | ||
|
||
Route tables are pre-configured for spoke virtual networks in each region. Assign the user subnet route table to any subnets created in spokes. | ||
|
||
- Network Virtual Appliance in relevant region as next hop in Route Table |
83 changes: 83 additions & 0 deletions
83
...terraform-platform-landing-zone/multi-region-virtual-wan-with-azure-firewall.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,83 @@ | ||
--- | ||
title: Scenario - Multi-Region Virtual WAN with Azure Firewall | ||
weight: 6 | ||
--- | ||
|
||
A full platform landing zone deployment with Virtual WAN network connectivity using Azure Firewall in multiple regions. | ||
|
||
* Example platform landing zone configuration file: [full-multi-region/virtual-wan.tfvars](https://raw.githubusercontent.com/Azure/alz-terraform-accelerator/refs/heads/main/templates/platform_landing_zone/examples/full-multi-region/virtual-wan.tfvars) | ||
|
||
## Resources | ||
|
||
The following resources are deployed by default in this scenario: | ||
|
||
### Management | ||
|
||
#### Management Groups | ||
|
||
- Management Groups | ||
- Policy Definitions | ||
- Policy Set Definitions | ||
- Policy Assignments | ||
- Policy Assignment Role Assignments | ||
|
||
#### Management Resources | ||
|
||
- Log Analytics Workspace | ||
- Log Analytics Data Collection Rules for AMA | ||
- User Assigned Managed Identity for AMA | ||
- Automation Account | ||
|
||
### Connectivity | ||
|
||
#### Azure DDOS Protection Plan | ||
|
||
- DDOS Protection Plan | ||
|
||
#### Azure Virtual WAN | ||
|
||
- Virtual WAN homed in the primary region | ||
- Virtual Hubs in each region | ||
|
||
#### Azure Virtual Networks | ||
|
||
- Sidecar Virtual Networks | ||
- Sidecar to Virtual Hub peering | ||
- Subnets for Bastion, and Private DNS Resolver in each region | ||
|
||
#### Azure Firewall | ||
|
||
- Azure Firewall per region | ||
- Azure Firewall public IP per region | ||
- Azure Firewall policy per region | ||
|
||
#### Azure Bastion | ||
|
||
- Azure Bastion per region | ||
- Azure Bastion public IP per region | ||
|
||
#### Azure Private DNS | ||
|
||
- Azure Private DNS Resolver per region | ||
- Azure non-regional Private Link Private DNS zones in primary region | ||
- Azure regional Private Link Private DNS zones per region | ||
- Azure Virtual Machine auto-registration Private DNS zone per region | ||
- Azure Private Link DNS zone virtual network links per region | ||
|
||
#### Azure Virtual Network Gateways | ||
|
||
- Azure ExpressRoute Virtual Network Gateway per region | ||
- Azure VPN Virtual Network Gateway per region | ||
|
||
## Configuration | ||
|
||
The following relevant configuration is applied: | ||
|
||
### Azure DNS | ||
|
||
Private DNS is configured ready for using Private Link and Virtual Machine Auto-registration. Spoke Virtual Networks should use the Azure Firewall IP Address in the same region as their DNS configuration. | ||
|
||
- Azure Firewall is configured as DNS proxy | ||
- Azure Firewall forwards DNS traffic to the Private DNS resolver | ||
- Azure Private DNS Resolver has an inbound endpoint from the sidecar network | ||
- Azure Private Link DNS zones are linked to all hub sidecar Virtual Networks |
Oops, something went wrong.