Jump to content

Leverage Bicep: Standard model to Automate Azure IaaS deployment (2 of 3)

Featured Replies

Posted

Chapter 2

 

<< Chapter 1 Chater 3 >>

 

 

 

 

 

 

  • Tips
    Install extensions from VS Code
    631x273vv2.png.b7fe7939c5e9bbe6fc5d6230e953f99e.png
    -- Only GitHub Copilot is available for a fee.
     
     
    Azure Resource manager Tools Extensions
     
    640x264vv2.png.46bf54d3537811d9f66b1b33b378b6f1.png
     
    Bicep Extensions
     
    642x276vv2.png.8da34b2f1d452dafd25b6ebe51e0633f.png
     
     
    Bicep Visualizer
    642x264vv2.png.e0a786c419d49bf91bc1eb220c83cc5e.png
     
    GitHub Copilot
    653x271vv2.png.a595fbb4b85630b7d6731dddb66087df.png
     
     
     
     
  • Sample code and explanation
     
    localtemplate/bicep/BICEP at master · akkoike/localtemplate (github.com)
     
    - Application sequence mapping
    622x286vv2.png.2f8914452e3aad83aaaaf8c37393ceda.png649x310vv2.png.2e8712488f64d2885781af504fd6b089.png648x308vv2.png.d7df1bc038fda9466298b4bc4f32399f.png
     
     
    Based on vNET Hub&Spoke environment. Frequently updated settings were individually defined in JSON configuration files. Azure KeyVault was created first because I wanted to obtain a secure password using the getSecret function. RBAC and Diagnostic Setting are done at the end of the process for extended functions. NSG rules and Azure Firewall ruleset basically stated only the targets that should be allowed. All external communication from Azure VM is configured with a default route through Azure Firewall. Only Log Analytics with AMPLS may not work properly.
     
    Almost 30 USD / day
    651x287vv2.png.0a90f70dbdaa26e22c3710611570f826.png
     
     

 

>> Next Chapter (Traps and Avoidance)

 

<< Chapter 1

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...