Skip to content
This repository has been archived by the owner on Jul 26, 2024. It is now read-only.

Update for the 2002.0320 rover runtime #15

Merged
merged 4 commits into from
Feb 10, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .devcontainer/devcontainer.json
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@

// Add the IDs of extensions you want installed when the container is created in the array below.
"extensions": [
"mauve.terraform",
"4ops.terraform",
"mutantdino.resourcemonitor"
]
}
2 changes: 1 addition & 1 deletion .devcontainer/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
version: '3.7'
services:
rover:
image: aztfmod/rover:2001.1006
image: aztfmod/rover:2002.0320

labels:
- "caf=Azure CAF"
Expand Down
11 changes: 11 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,14 @@
## v2.0.2002 (February 2020)
FEATURES:
* **landingzone_caf_foundations :** adding support for azurerm 1.42 provider, azuread provider 0.7
* **landingzone_vdc_demo :** adding support for azurerm 1.42 provider, azuread provider 0.7
* **rover:** rollup upgrade to support workspaces [#15](https://github.com/aztfmod/landingzones/pull/15)
* **launchpad:** Support for launchpad destroy [#16](
https://github.com/aztfmod/level0/issues/16)
* **rover:** Upgrade to rover version 2002.0320 - Supporting: - Terraform 0.12.20 (https://github.com/hashicorp/terraform/releases/tag/v0.12.20)
* **rover:** Using "4ops.terraform" extension for improved support of Terraform 0.12 syntax. [#16](https://github.com/aztfmod/landingzones/issues/16)


## v1.1.1912 (January 2020)
FEATURES:
* **landingzone_caf_foundations :** Major refactoring to support governance, security and accounting.
Expand Down
29 changes: 22 additions & 7 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
# Introduction to Azure Cloud Adoption Framework landing zones for Terraform

Microsoft Cloud Adoption Framework for Azure provides you with guidance to adopt Azure. When deploying resources in a new environment, you can leverage landing zones and blueprints to accelerate your deployment. A landing zone is a set of infrastructure components that assembled together deploys a complete environment ready to host an application.
Microsoft Cloud Adoption Framework for Azure provides you with guidance to adopt Azure. When deploying resources in a new environment, you can leverage landing zones and blueprints to accelerate your deployment. A landing zone is a set of infrastructure components that assembled together will deploy a complete environment ready to host an application.

Feel free to reach out to us on tf-landingzones at microsoft dot com.
For full details on Cloud Adoption Framework, refer to http://aka.ms/caf. For any idea, bug, please fill in an issue. You can also reach out to us on tf-landingzones at microsoft dot com.

## Overview

Expand Down Expand Up @@ -72,16 +72,31 @@ For that we will rely on Azure authentication as completed by Azure Cli, via bro
rover login
```

When you are running rover for the fist time, it will prompt your for the location of the launchpad foundations.
We recommend that you verify the output of the login and make sure the subscription selected by default is the one you want to work on. If not, you can use the following switch:

```bash
# To deploy the environment
rover
az account set --subscription <subscription_GUID>
```

Then enter the location chosen for deployment, for instance type southeastasia or westeurope.
On the first run, you need to use the launchpad to create the foundations for Terraform environment, the launchpad_opensource is the current way to set those foundations.

You can then launch your first landing zone as follow:
Running the following command:

```bash
launchpad /tf/launchpads/launchpad_opensource_light apply
```

This command will interactively prompt you for *var.location*, asking for the name of a supported Azure region **where you want to deploy the Terraform state and dependencies**. You can specify that in the argument as in the following example:

```bash
launchpad /tf/launchpads/launchpad_opensource_light apply -var 'location=westus'
```

You can then launch your first landing zone!

Please note that each landing zone come with its own deployment settings, which may deploy resources in different region than where you set the foundations.

You are ready to start:

```bash
rover /tf/caf/landingzones/landingzone_caf_foundations plan
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@ data "azurerm_client_config" "current" {
}

provider "azurerm" {
version = "<= 1.40"
version = "<= 1.42"
}

provider "azuread" {
version = "<=0.6.0"
version = "<=0.7.0"
}

terraform {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,11 @@ data "azurerm_subscription" "current" {}


provider "azurerm" {
version = "<= 1.40"
version = "<= 1.42"
}

provider "azuread" {
version = "<=0.6.0"
version = "<=0.7.0"
}

terraform {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@ data "azurerm_client_config" "current" {
}

provider "azurerm" {
version = "<= 1.40"
version = "<= 1.42"
}

provider "azuread" {
version = "<=0.6.0"
version = "<=0.7.0"
}

terraform {
Expand Down
2 changes: 1 addition & 1 deletion landingzones/landingzone_caf_foundations/main.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
provider "azurerm" {
version = "<=1.40"
version = "<=1.42"
}

terraform {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ terraform {
}

provider "azurerm" {
version = "<= 1.37"
version = "<= 1.42"
}

data "azurerm_subscription" "current" {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -85,13 +85,13 @@ enable_bastion = true
bastion_config = {
name = "azurebastion"
diagnostics = {
log = [
#["Category name", "Diagnostics Enabled(true/false)", "Retention Enabled(true/false)", Retention_period]
["BastionAuditLogs", true, true, 30],
log = [
#["Category name", "Diagnostics Enabled(true/false)", "Retention Enabled(true/false)", Retention_period]
["BastionAuditLogs", true, true, 30],
]
metric = [
metric = [
# ["AllMetrics", true, true, 30],
]
]
}
ip_name = "arnaud-pip-bastion"
ip_addr = {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ terraform {
}

provider "azurerm" {
version = "<= 1.37"
version = "<= 1.42"
}

data "azurerm_subscription" "current" {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ terraform {
}

provider "azurerm" {
version = "<= 1.37"
version = "<= 1.42"
}

data "azurerm_subscription" "current" {
Expand Down
2 changes: 1 addition & 1 deletion landingzones/landingzone_vdc_demo/main.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
provider "azurerm" {
version = "<=1.39"
version = "<=1.42"
}

terraform {
Expand Down