Skip to content

nil0blue/landingzone

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

68 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Landing Zone Policies via ARM Template

Deploy the landing zone policies
Deploy To Azure
The policies are specified in policy/azuredeploy.parameters.json

Infrastructure Migration Network and Security Foundation via Terraform Pipeline

Update the foundation.tfvars file under the migration folder to trigger the Terraform Apply to Azure pipeline. This will create or update the landing zone Vnets/Subnets/VPN Gateway and Local Gateway resources in the subscription which will facilitate the Migration setup. The action pipeline makes use of the action published in the nil0blue/terraform-azure-pipeline repository

Prerequisites

A service principal needs to be created for Terraform and it's client id and secret must be noted. A storage account must be created with a container. This is used for storing the terraform state.

The foundation.tf manifest must be modified to supply the storage account and container name

terraform {
  backend "azurerm" {
    storage_account_name = "storage_account_name"
    container_name       = "storage_container_name"
  }
}

The following secrets must be added to the GitHub Account

Parameter Type Default Description
arm_client_id string Azure Service Principal client_id
arm_client_secret string Azure Service Principal client_secret
arm_subscription_id string Azure subscription
arm_tenant_id string Azure Tenant id
arm_access_key string Azure Storage access key
variables string "" Comma-separated string of Terraform variables
path string . Path to Terraform directory, defaults to the working directory
varfile string variables.tfvars Name of tfvars file, defaults to variables.tfvars

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages