-
Notifications
You must be signed in to change notification settings - Fork 140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Modify NSG in hub Resource Group #443
Comments
Specifically it looks like we can omit this opinion from missionlz/src/bicep/modules/hubNetwork.bicep Lines 68 to 97 in d172780
And remove this assignment in missionlz/src/bicep/modules/networkInterface.bicep Lines 27 to 29 in d172780
|
* Modify NSG in hub Resource Group #443 * GitHub Action: Build Bicep to JSON Co-authored-by: github-actions <[email protected]>
…#538) * Modify NSG in hub Resource Group Azure#443 * GitHub Action: Build Bicep to JSON Co-authored-by: github-actions <[email protected]>
Description
Currently, the hub NSG includes inbound rules for 22 and 3389 for remote access. Unsure whether these are created as part of the hub deployment when the NSG is created or added to the NSG when the
remoteAccess
example gets deployed into the hub. These rules are not needed when using Bastion and should be removed. Additionally, when theremoteAccess
solution is deployed into the hub, the hub NSG is attached to the NIC of both the Windows and Linux VMs that get deployed. This is a duplicative assignment as the NSG is already attached to the subnet that the VMs get deployed into.Steps to Reproduce
Steps to reproduce the behavior:
remoteAccess
solution using current code baseExpected behavior
Hub NSG is created with default inbound and outbound rule set. Hub NSG is assigned to
hub-subnet
subnet. Remote access VMs are deployed intohub-subnet
and do not have the NSG applied directly to their NICs.Actual behavior
Hub NSG gets created with inbound rules for 22 and 3389. When
remoteAccess
solution is deployed into hub Resource Group, the hub NSG gets assigned directly to the NICs of the Windows and Linux VMs.Screenshots
None
Additional context
Operating System: NA
Terraform Version: NA
Cloud (public, Azure Government, etc.): All
The text was updated successfully, but these errors were encountered: