Een on-premises virtueel netwerk maken in Azure met behulp van Terraform

Terraform maakt de definitie, preview en implementatie van de cloudinfrastructuur mogelijk. Met Behulp van Terraform maakt u configuratiebestanden met behulp van de HCL-syntaxis. Met de HCL-syntaxis kunt u de cloudprovider opgeven, zoals Azure, en de elementen waaruit uw cloudinfrastructuur bestaat. Nadat u uw configuratiebestanden hebt gemaakt, maakt u een uitvoeringsplan waarmee u een voorbeeld van uw infrastructuurwijzigingen kunt bekijken voordat ze worden geïmplementeerd. Zodra u de wijzigingen hebt gecontroleerd, past u het uitvoeringsplan toe om de infrastructuur te implementeren.

In dit artikel wordt beschreven hoe u een on-premises netwerk implementeert in Azure. U kunt het voorbeeldnetwerk vervangen door een virtueel particulier netwerk. Hiervoor moet u de IP-adressen van het subnet aanpassen aan uw omgeving.

In dit artikel leert u het volgende:

  • Een on-premises VNet implementeren in stertopologie
  • Resources voor hubnetwerkapparaten maken
  • Een on-premises virtuele machine maken
  • On-premises virtuele privénetwerkgateway maken

1. Uw omgeving configureren

  • Azure-abonnement: als u nog geen abonnement op Azure hebt, maakt u een gratis Azure-account aan voordat u begint.

2. De Terraform-code implementeren

  1. Maak de voorbeeldmap die is gemaakt in het eerste artikel van deze reeks de huidige map.

  2. Maak een bestand met de naam on-prem.tf en voeg de volgende code in:

    locals {
        onprem-location       = "eastus"
        onprem-resource-group = "onprem-vnet-rg"
        prefix-onprem         = "onprem"
    }
    
    resource "azurerm_resource_group" "onprem-vnet-rg" {
        name     = local.onprem-resource-group
        location = local.onprem-location
    }
    
    resource "azurerm_virtual_network" "onprem-vnet" {
        name                = "onprem-vnet"
        location            = azurerm_resource_group.onprem-vnet-rg.location
        resource_group_name = azurerm_resource_group.onprem-vnet-rg.name
        address_space       = ["192.168.0.0/16"]
    
        tags = {
        environment = local.prefix-onprem
        }
    }
    
    resource "azurerm_subnet" "onprem-gateway-subnet" {
        name                 = "GatewaySubnet"
        resource_group_name  = azurerm_resource_group.onprem-vnet-rg.name
        virtual_network_name = azurerm_virtual_network.onprem-vnet.name
        address_prefixes     = ["192.168.255.224/27"]
    }
    
    resource "azurerm_subnet" "onprem-mgmt" {
        name                 = "mgmt"
        resource_group_name  = azurerm_resource_group.onprem-vnet-rg.name
        virtual_network_name = azurerm_virtual_network.onprem-vnet.name
        address_prefixes     = ["192.168.1.128/25"]
    }
    
    resource "azurerm_public_ip" "onprem-pip" {
        name                         = "${local.prefix-onprem}-pip"
        location            = azurerm_resource_group.onprem-vnet-rg.location
        resource_group_name = azurerm_resource_group.onprem-vnet-rg.name
        allocation_method   = "Dynamic"
    
        tags = {
            environment = local.prefix-onprem
        }
    }
    
    resource "azurerm_network_interface" "onprem-nic" {
        name                 = "${local.prefix-onprem}-nic"
        location             = azurerm_resource_group.onprem-vnet-rg.location
        resource_group_name  = azurerm_resource_group.onprem-vnet-rg.name
        enable_ip_forwarding = true
    
        ip_configuration {
        name                          = local.prefix-onprem
        subnet_id                     = azurerm_subnet.onprem-mgmt.id
        private_ip_address_allocation = "Dynamic"
        public_ip_address_id          = azurerm_public_ip.onprem-pip.id
        }
    }
    
    # Create Network Security Group and rule
    resource "azurerm_network_security_group" "onprem-nsg" {
        name                = "${local.prefix-onprem}-nsg"
        location            = azurerm_resource_group.onprem-vnet-rg.location
        resource_group_name = azurerm_resource_group.onprem-vnet-rg.name
    
        security_rule {
            name                       = "SSH"
            priority                   = 1001
            direction                  = "Inbound"
            access                     = "Allow"
            protocol                   = "Tcp"
            source_port_range          = "*"
            destination_port_range     = "22"
            source_address_prefix      = "*"
            destination_address_prefix = "*"
        }
    
        tags = {
            environment = "onprem"
        }
    }
    
    resource "azurerm_subnet_network_security_group_association" "mgmt-nsg-association" {
        subnet_id                 = azurerm_subnet.onprem-mgmt.id
        network_security_group_id = azurerm_network_security_group.onprem-nsg.id
    }
    
    resource "azurerm_virtual_machine" "onprem-vm" {
        name                  = "${local.prefix-onprem}-vm"
        location              = azurerm_resource_group.onprem-vnet-rg.location
        resource_group_name   = azurerm_resource_group.onprem-vnet-rg.name
        network_interface_ids = [azurerm_network_interface.onprem-nic.id]
        vm_size               = var.vmsize
    
        storage_image_reference {
        publisher = "Canonical"
        offer     = "UbuntuServer"
        sku       = "16.04-LTS"
        version   = "latest"
        }
    
        storage_os_disk {
        name              = "myosdisk1"
        caching           = "ReadWrite"
        create_option     = "FromImage"
        managed_disk_type = "Standard_LRS"
        }
    
        os_profile {
        computer_name  = "${local.prefix-onprem}-vm"
        admin_username = var.username
        admin_password = var.password
        }
    
        os_profile_linux_config {
        disable_password_authentication = false
        }
    
        tags = {
        environment = local.prefix-onprem
        }
    }
    
    resource "azurerm_public_ip" "onprem-vpn-gateway1-pip" {
        name                = "${local.prefix-onprem}-vpn-gateway1-pip"
        location            = azurerm_resource_group.onprem-vnet-rg.location
        resource_group_name = azurerm_resource_group.onprem-vnet-rg.name
    
        allocation_method = "Dynamic"
    }
    
    resource "azurerm_virtual_network_gateway" "onprem-vpn-gateway" {
        name                = "onprem-vpn-gateway1"
        location            = azurerm_resource_group.onprem-vnet-rg.location
        resource_group_name = azurerm_resource_group.onprem-vnet-rg.name
    
        type     = "Vpn"
        vpn_type = "RouteBased"
    
        active_active = false
        enable_bgp    = false
        sku           = "VpnGw1"
    
        ip_configuration {
        name                          = "vnetGatewayConfig"
        public_ip_address_id          = azurerm_public_ip.onprem-vpn-gateway1-pip.id
        private_ip_address_allocation = "Dynamic"
        subnet_id                     = azurerm_subnet.onprem-gateway-subnet.id
        }
        depends_on = [azurerm_public_ip.onprem-vpn-gateway1-pip]
    
    }
    

Problemen met Terraform in Azure oplossen

Veelvoorkomende problemen oplossen bij het gebruik van Terraform in Azure

Volgende stappen