This repo contains everything to get started with Terraform on Azure.
After executing the below steps you will get:
- a service principal used to run Terraform on behalf
- a Storage Container used to store the Terraform state file
- a Key Vault containing all secrets to allow easy and secure access
This project requires the following:
- Bash or PowerShell (you can use Azure Cloud Shell)
- for Bash you need to have jq installed
- Azure CLI (authenticated)
- the executing user needs Subscription owner access (to give owner access to the Service Principal for creating managed identities and assigning roles) as well as the Application Developer role in AAD (to create the Service Principal)
Execute the following steps to get started:
- Authenticate against Azure by executing
az login
- Optional: Export your Tenant (
tenantId
) and Subscription ID (subscriptionId
) if you don't like to deploy with youraz
defaults. - Customize
.env
based on your needs and naming conventions (Make sure you met all Azure naming rules and restrictions). - Execute
up.sh
to deploy everything needed - Grant admin consent for the created app registrations (Terraform will then be allowed to create app registrations and groups in Azure AD). This needs Azure Active Directory global admin access. Find more details on how to grant consent here.
Execute the following steps to get started:
- Authenticate against Azure by executing
az login
- Optional: Create environment variables for Tenant (
tenantId
) and Subscription ID (subscriptionId
) or call the script with the parameters-tenantId
and-subscriptionId
if you don't like to deploy with youraz
defaults. - Customize
.env.powershell
based on your needs and naming conventions (Make sure you met all Azure naming rules and restrictions). - Execute
up.ps1
to deploy everything needed - Grant admin consent for the created app registrations (Terraform will then be allowed to create app registrations and groups in Azure AD). This needs Azure Active Directory global admin access. Find more details on how to grant consent here.
You will need to tell Terraform where to store its state file. To do so, you need to customize your main.tf
file based on the below example:
terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "3.77.0"
}
}
backend "azurerm" {
key = "azure.tfstate"
}
}
provider "azurerm" {
# Configuration options
}
Terraform Backend Docs for azurerm
We do not recommend to store any secrets and credentials in code. Therefore everything needed will be requested from Key Vault as needed. To init you project run the following script:
#!/bin/bash
# customize your subscription id and resource group name
export subscriptionId="00000000-0000-0000-0000-000000000000"
export rg="my-rg"
# sets subscription;
az account set --subscription $subscriptionId
# get vault
export vaultName=$(az keyvault list --subscription=$subscriptionId -g $rg --query '[0].{name:name}' -o tsv)
## extracts and exports secrets
export saKey=$(az keyvault secret show --subscription=$subscriptionId --vault-name="$vaultName" --name sa-key --query value -o tsv)
export saName=$(az keyvault secret show --subscription=$subscriptionId --vault-name="$vaultName" --name sa-name --query value -o tsv)
export scName=$(az keyvault secret show --subscription=$subscriptionId --vault-name="$vaultName" --name sc-name --query value -o tsv)
export spSecret=$(az keyvault secret show --subscription=$subscriptionId --vault-name="$vaultName" --name sp-secret --query value -o tsv)
export spId=$(az keyvault secret show --subscription=$subscriptionId --vault-name="$vaultName" --name sp-id --query value -o tsv)
# exports secrets
export ARM_SUBSCRIPTION_ID=$subscriptionId
export ARM_TENANT_ID=$tenantId
export ARM_CLIENT_ID=$spId
export ARM_CLIENT_SECRET=$spSecret
# runs Terraform init
terraform init -input=false \
-backend-config="access_key=$saKey" \
-backend-config="storage_account_name=$saName" \
-backend-config="container_name=$scName"
terraform {
required_providers {
azuread = {
source = "hashicorp/azuread"
version = "2.44.1"
}
}
}
provider "azuread" {
# Configuration options
}
Azure Active Directory Provider Docs
The up.sh
script asks you whether you would like to map our Partner ID to the created Service Principal. Feel free to opt-out or remove the marked lines if you don't like to support us.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.