Een spoke-netwerk maken in Azure met behulp van Terraform

Terraform maakt de definitie, preview en implementatie van de cloudinfrastructuur mogelijk. Met Behulp van Terraform maakt u configuratiebestanden met behulp van de HCL-syntaxis. Met de HCL-syntaxis kunt u de cloudprovider opgeven, zoals Azure, en de elementen waaruit uw cloudinfrastructuur bestaat. Nadat u uw configuratiebestanden hebt gemaakt, maakt u een uitvoeringsplan waarmee u een voorbeeld van uw infrastructuurwijzigingen kunt bekijken voordat ze worden geïmplementeerd. Zodra u de wijzigingen hebt gecontroleerd, past u het uitvoeringsplan toe om de infrastructuur te implementeren.

In dit artikel implementeert u twee afzonderlijke spoke-netwerken om de scheiding van workloads te demonstreren. De netwerken delen algemene resources met behulp van een virtueel hubnetwerk. Knooppunten kunnen worden gebruikt om werkbelastingen te isoleren in hun eigen VNets, afzonderlijk beheerd vanaf andere knooppunten. Elke workload kan meerdere lagen bevatten, met meerdere subnetten die zijn verbonden via Azure-load balancers.

In dit artikel leert u het volgende:

  • Spoke-VNets implementeren in stertopologie
  • Virtuele machines maken in de spoke-netwerken
  • Peerings voor virtuele netwerken tot stand brengen met de hubnetwerken

1. Uw omgeving configureren

  • Azure-abonnement: als u nog geen abonnement op Azure hebt, maakt u een gratis Azure-account aan voordat u begint.

2. De Terraform-code implementeren

In deze sectie worden twee spoke-scripts gemaakt. Elk script definieert een virtueel spoke-netwerk en een virtuele machine voor de workload. Vervolgens wordt er een virtueel peernetwerk van hub naar spoke gemaakt.

  1. Maak de voorbeeldmap die is gemaakt in het eerste artikel van deze reeks de huidige map.

  2. Maak een bestand met de naam spoke1.tf en voeg de volgende code in:

    locals {
        spoke1-location       = "eastus"
        spoke1-resource-group = "spoke1-vnet-rg"
        prefix-spoke1         = "spoke1"
    }
    
    resource "azurerm_resource_group" "spoke1-vnet-rg" {
        name     = local.spoke1-resource-group
        location = local.spoke1-location
    }
    
    resource "azurerm_virtual_network" "spoke1-vnet" {
        name                = "spoke1-vnet"
        location            = azurerm_resource_group.spoke1-vnet-rg.location
        resource_group_name = azurerm_resource_group.spoke1-vnet-rg.name
        address_space       = ["10.1.0.0/16"]
    
        tags = {
        environment = local.prefix-spoke1
        }
    }
    
    resource "azurerm_subnet" "spoke1-mgmt" {
        name                 = "mgmt"
        resource_group_name  = azurerm_resource_group.spoke1-vnet-rg.name
        virtual_network_name = azurerm_virtual_network.spoke1-vnet.name
        address_prefixes     = ["10.1.0.64/27"]
    }
    
    resource "azurerm_subnet" "spoke1-workload" {
        name                 = "workload"
        resource_group_name  = azurerm_resource_group.spoke1-vnet-rg.name
        virtual_network_name = azurerm_virtual_network.spoke1-vnet.name
        address_prefixes     = ["10.1.1.0/24"]
    }
    
    resource "azurerm_virtual_network_peering" "spoke1-hub-peer" {
        name                      = "spoke1-hub-peer"
        resource_group_name       = azurerm_resource_group.spoke1-vnet-rg.name
        virtual_network_name      = azurerm_virtual_network.spoke1-vnet.name
        remote_virtual_network_id = azurerm_virtual_network.hub-vnet.id
    
        allow_virtual_network_access = true
        allow_forwarded_traffic = true
        allow_gateway_transit   = false
        use_remote_gateways     = true
        depends_on = [azurerm_virtual_network.spoke1-vnet, azurerm_virtual_network.hub-vnet , azurerm_virtual_network_gateway.hub-vnet-gateway]
    }
    
    resource "azurerm_network_interface" "spoke1-nic" {
        name                 = "${local.prefix-spoke1}-nic"
        location             = azurerm_resource_group.spoke1-vnet-rg.location
        resource_group_name  = azurerm_resource_group.spoke1-vnet-rg.name
        enable_ip_forwarding = true
    
        ip_configuration {
        name                          = local.prefix-spoke1
        subnet_id                     = azurerm_subnet.spoke1-mgmt.id
        private_ip_address_allocation = "Dynamic"
        }
    }
    
    resource "azurerm_virtual_machine" "spoke1-vm" {
        name                  = "${local.prefix-spoke1}-vm"
        location              = azurerm_resource_group.spoke1-vnet-rg.location
        resource_group_name   = azurerm_resource_group.spoke1-vnet-rg.name
        network_interface_ids = [azurerm_network_interface.spoke1-nic.id]
        vm_size               = var.vmsize
    
        storage_image_reference {
        publisher = "Canonical"
        offer     = "UbuntuServer"
        sku       = "16.04-LTS"
        version   = "latest"
        }
    
        storage_os_disk {
        name              = "myosdisk1"
        caching           = "ReadWrite"
        create_option     = "FromImage"
        managed_disk_type = "Standard_LRS"
        }
    
        os_profile {
        computer_name  = "${local.prefix-spoke1}-vm"
        admin_username = var.username
        admin_password = var.password
        }
    
        os_profile_linux_config {
        disable_password_authentication = false
        }
    
        tags = {
        environment = local.prefix-spoke1
        }
    }
    
    resource "azurerm_virtual_network_peering" "hub-spoke1-peer" {
        name                      = "hub-spoke1-peer"
        resource_group_name       = azurerm_resource_group.hub-vnet-rg.name
        virtual_network_name      = azurerm_virtual_network.hub-vnet.name
        remote_virtual_network_id = azurerm_virtual_network.spoke1-vnet.id
        allow_virtual_network_access = true
        allow_forwarded_traffic   = true
        allow_gateway_transit     = true
        use_remote_gateways       = false
        depends_on = [azurerm_virtual_network.spoke1-vnet, azurerm_virtual_network.hub-vnet, azurerm_virtual_network_gateway.hub-vnet-gateway]
    }
    
  3. Maak een bestand met de naam spoke2.tf en voeg de volgende code in:

    locals {
        spoke2-location       = "eastus"
        spoke2-resource-group = "spoke2-vnet-rg"
        prefix-spoke2         = "spoke2"
    }
    
    resource "azurerm_resource_group" "spoke2-vnet-rg" {
        name     = local.spoke2-resource-group
        location = local.spoke2-location
    }
    
    resource "azurerm_virtual_network" "spoke2-vnet" {
        name                = "${local.prefix-spoke2}-vnet"
        location            = azurerm_resource_group.spoke2-vnet-rg.location
        resource_group_name = azurerm_resource_group.spoke2-vnet-rg.name
        address_space       = ["10.2.0.0/16"]
    
        tags = {
        environment = local.prefix-spoke2
        }
    }
    
    resource "azurerm_subnet" "spoke2-mgmt" {
        name                 = "mgmt"
        resource_group_name  = azurerm_resource_group.spoke2-vnet-rg.name
        virtual_network_name = azurerm_virtual_network.spoke2-vnet.name
        address_prefixes     = ["10.2.0.64/27"]
    }
    
    resource "azurerm_subnet" "spoke2-workload" {
        name                 = "workload"
        resource_group_name  = azurerm_resource_group.spoke2-vnet-rg.name
        virtual_network_name = azurerm_virtual_network.spoke2-vnet.name
        address_prefixes     = ["10.2.1.0/24"]
    }
    
    resource "azurerm_virtual_network_peering" "spoke2-hub-peer" {
        name                      = "${local.prefix-spoke2}-hub-peer"
        resource_group_name       = azurerm_resource_group.spoke2-vnet-rg.name
        virtual_network_name      = azurerm_virtual_network.spoke2-vnet.name
        remote_virtual_network_id = azurerm_virtual_network.hub-vnet.id
    
        allow_virtual_network_access = true
        allow_forwarded_traffic = true
        allow_gateway_transit   = false
        use_remote_gateways     = true
        depends_on = [azurerm_virtual_network.spoke2-vnet, azurerm_virtual_network.hub-vnet, azurerm_virtual_network_gateway.hub-vnet-gateway]
    }
    
    resource "azurerm_network_interface" "spoke2-nic" {
        name                 = "${local.prefix-spoke2}-nic"
        location             = azurerm_resource_group.spoke2-vnet-rg.location
        resource_group_name  = azurerm_resource_group.spoke2-vnet-rg.name
        enable_ip_forwarding = true
    
        ip_configuration {
        name                          = local.prefix-spoke2
        subnet_id                     = azurerm_subnet.spoke2-mgmt.id
        private_ip_address_allocation = "Dynamic"
        }
    
        tags = {
        environment = local.prefix-spoke2
        }
    }
    
    resource "azurerm_virtual_machine" "spoke2-vm" {
        name                  = "${local.prefix-spoke2}-vm"
        location              = azurerm_resource_group.spoke2-vnet-rg.location
        resource_group_name   = azurerm_resource_group.spoke2-vnet-rg.name
        network_interface_ids = [azurerm_network_interface.spoke2-nic.id]
        vm_size               = var.vmsize
    
        storage_image_reference {
        publisher = "Canonical"
        offer     = "UbuntuServer"
        sku       = "16.04-LTS"
        version   = "latest"
        }
    
        storage_os_disk {
        name              = "myosdisk1"
        caching           = "ReadWrite"
        create_option     = "FromImage"
        managed_disk_type = "Standard_LRS"
        }
    
        os_profile {
        computer_name  = "${local.prefix-spoke2}-vm"
        admin_username = var.username
        admin_password = var.password
        }
    
        os_profile_linux_config {
        disable_password_authentication = false
        }
    
        tags = {
        environment = local.prefix-spoke2
        }
    }
    
    resource "azurerm_virtual_network_peering" "hub-spoke2-peer" {
        name                      = "hub-spoke2-peer"
        resource_group_name       = azurerm_resource_group.hub-vnet-rg.name
        virtual_network_name      = azurerm_virtual_network.hub-vnet.name
        remote_virtual_network_id = azurerm_virtual_network.spoke2-vnet.id
        allow_virtual_network_access = true
        allow_forwarded_traffic   = true
        allow_gateway_transit     = true
        use_remote_gateways       = false
        depends_on = [azurerm_virtual_network.spoke2-vnet, azurerm_virtual_network.hub-vnet, azurerm_virtual_network_gateway.hub-vnet-gateway]
    }
    

Problemen met Terraform in Azure oplossen

Veelvoorkomende problemen oplossen bij het gebruik van Terraform in Azure

Volgende stappen