Use a Terraform plan to deploy a Google Cloud Platform Ubuntu instance and connect it to Azure Arc

This article provides guidance for using the provided Terraform plan to deploy Google Cloud Platform (GCP) instance and connect it as an Azure Arc-enabled server resource.

Prerequisites

  1. Clone the Azure Arc Jumpstart repository.

    git clone https://github.com/microsoft/azure_arc.git
    
  2. Install or update Azure CLI to version 2.7 and above. Use the following command to check your current installed version.

    az --version
    
  3. Generate SSH key (or use existing SSH key)

  4. Create free Google Cloud Platform account

  5. Install Terraform >= 0.12

  6. Create an Azure service principal.

    To connect the GCP virtual machine to Azure Arc, an Azure service principal assigned with the Contributor role is required. To create it, sign in to your Azure account and run the following command. You can also run this command in Azure Cloud Shell.

    az login
    az account set -s <Your Subscription ID>
    az ad sp create-for-rbac -n "<Unique SP Name>" --role contributor --scopes "/subscriptions/<Your Subscription ID>"
    

    For example:

    az ad sp create-for-rbac -n "http://AzureArcGCP" --role contributor --scopes "/subscriptions/00000000-0000-0000-0000-000000000000"
    

    The output should look like this:

    {
      "appId": "XXXXXXXXXXXXXXXXXXXXXXXXXXXX",
      "displayName": "http://AzureArcGCP",
      "password": "XXXXXXXXXXXXXXXXXXXXXXXXXXXX",
      "tenant": "XXXXXXXXXXXXXXXXXXXXXXXXXXXX"
    }
    

    Note

    We highly recommend that you scope the service principal to a specific Azure subscription and resource group.

Create a new GCP project

  1. Browse to the Google API console and sign-in with your Google account. Once logged in, create a new project named Azure Arc demo. After creating it, be sure to copy down the project ID since it's usually different then the project name.

    First screenshot of the New Project page in the GCP console.

    Second screenshot of the New Project page in the GCP console.

  2. Once the new project is created and selected in the dropdown list at the top of the page, you must enable Compute Engine API access for the project. Click on + Enable APIs and Services and search for compute engine. Then select Enable to enable API access.

    First screenshot of Compute Engine API in the GCP console.

    Second screenshot of Compute Engine API in the GCP console.

  3. Next, set up a service account key, which Terraform will use to create and manage resources in your GCP project. Go to the create service account key page. Select New Service Account from the dropdown list, give it a name, select project then owner as the role, JSON as the key type, and select Create. This downloads a JSON file with all the credentials that will be needed for Terraform to manage the resources. Copy the downloaded JSON file to the azure_arc_servers_jumpstart/gcp/ubuntu/terraform directory.

    A screenshot of how to create a service account in the GCP console.

  4. Finally, make sure your SSH keys are available in ~/.ssh and named id_rsa.pub and id_rsa. If you followed the ssh-keygen guide above to create your key then this should already be set up correctly. If not, you may need to modify main.tf to use a key with a different path.

Deployment

Before executing the Terraform plan, you must export the environment variables which will be used by the plan. These variables are based on the Azure service principal you've just created, your Azure subscription and tenant, and the GCP project name.

  1. Retrieve your Azure subscription ID and tenant ID using the az account list command.

  2. The Terraform plan creates resources in both Microsoft Azure and Google Cloud Platform. It then executes a script on a GCP virtual machine to install the Azure Arc agent and all necessary artifacts. This script requires certain information about your GCP and Azure environments. Edit scripts/vars.sh and update each of the variables with the appropriate values.

    • TF_VAR_subscription_id= your Azure subscription ID
    • TF_VAR_client_id = your Azure service principal application ID
    • TF_VAR_client_secret = your Azure service principal password
    • TF_VAR_tenant_id = your Azure tenant ID
    • TF_VAR_gcp_project_id = GCP project ID
    • TF_VAR_gcp_credentials_filename = GCP credentials JSON filename
  3. From CLI, navigate to the azure_arc_servers_jumpstart/gcp/ubuntu/terraform directory of the cloned repo.

  4. Export the environment variables you edited by running scripts/vars.sh with the source command as shown below. Terraform requires these to be set for the plan to execute properly. Note that this script will also be automatically executed remotely on the GCP virtual machine as part of the Terraform deployment.

    source ./scripts/vars.sh
    
  5. Run the terraform init command which will download the Terraform AzureRM provider.

    A screenshot of the terraform init command.

  6. Next, run the terraform apply --auto-approve command and wait for the plan to finish. Upon completion, you will have a GCP Ubuntu VM deployed and connected as a new Azure Arc-enabled server inside a new resource group.

  7. Open the Azure portal and navigate to the arc-gcp-demo resource group. The virtual machine created in GCP will be visible as a resource.

    A screenshot of an Azure Arc-enabled server in the Azure portal.

Semi-automated deployment (optional)

As you may have noticed, the last step of the run is to register the VM as a new Azure Arc-enabled server resource.

A screenshot of running the azcmagent connect command.

If you want to demo/control the actual registration process, do the following:

  1. In the install_arc_agent.sh.tmpl script template, comment out the run connect command section and save the file.

    A screenshot showing main.tf being commented out to disable automatic onboarding of an Azure Arc agent.

  2. Get the public IP of the GCP VM by running terraform output.

    A screenshot of output from Terraform.

  3. SSH the VM using the ssh arcadmin@xx.xx.xx.xx where xx.xx.xx.xx is the host IP.

    A screenshot of an SSH key connecting to a GCP server.

  4. Export all the environment variables in vars.sh

    A screenshot of environment variables exporting with vars.sh.

  5. Run the following command:

    azcmagent connect --service-principal-id $TF_VAR_client_id --service-principal-secret $TF_VAR_client_secret --resource-group "Azure Arc gcp-demo" --tenant-id $TF_VAR_tenant_id --location "westus2" --subscription-id $TF_VAR_subscription_id
    

    A screenshot of the azcmagent connect command completing successfully.

  6. When complete, your VM will be registered with Azure Arc and visible in the resource group via the Azure portal.

Delete the deployment

To delete all the resources you created as part of this demo use the terraform destroy --auto-approve command as shown below.

A screenshot of the terraform destroy command.

Alternatively, you can delete the GCP VM directly from GCP console.

A screenshot showing how to delete a virtual machine from the GCP console.