vdc/Modules/UpdateAzureFirewall/deploy.json

81 строка
3.3 KiB
JSON
Исходник Обычный вид История

AKS Archetype (#96) * AKS Archetype - Initial Commit * Change in pipeline variable group for testing * Corrected dependency to the teardown of validation resource group * Corrected the dependsOn for TearDownValidationResourceGroup * Changed the Azure Subscription * Changed from SharedServices to AKS in pipeline.yml * Added missing Tests folder * Removing duplicate task * Updates to new modules * Separate module for application rule * Update to application rule module * Clean up * Cleaned up security center module * Multiple var groups * Added var groups for AKS * Added env vars for User group IDs * Updated the Packer agent file to include the az cli installation * Splitting into Archetype and LandingZone * Updated the paths in pipeline.yml after restructuring folders * More updates to file paths * AzureSecurityCenter correction * Separate module for updating Azure Firewall * Code fix for prevention of resource group while executing scripts * Corrections to the orchestration and parameters file * Added the Azure Firewall update section to the pipeline yml file * Fixed json parameters file for AKS module that was formatted incorrectly * Minor fixes to Virtual Network * Updated the subscription GUIDs and added a subscription info for AKS * Changed vNet to VirtualNetwork. Also, added dependsOn for AKS Archetype in Orchestration file. * Changed the KeyVault behavior to enable Service EndPoint after Landing Zone deployment. * Orchestration and Pipeline updates for AKS Archetype * AKS Archetype pipeline / orchestration update * Fixed unsupported versions for aks * Changes based on feedback from AKS Archetype review * Minor changes - feedback work continued * Pipeline changes specific to AKS LandingZone * AKS Archetype - Initial Commit * Change in pipeline variable group for testing * Corrected dependency to the teardown of validation resource group * Corrected the dependsOn for TearDownValidationResourceGroup * Changed the Azure Subscription * Changed from SharedServices to AKS in pipeline.yml * Added missing Tests folder * Removing duplicate task * Updates to new modules * Separate module for application rule * Update to application rule module * Clean up * Cleaned up security center module * Multiple var groups * Added var groups for AKS * Added env vars for User group IDs * Updated the Packer agent file to include the az cli installation * Splitting into Archetype and LandingZone * Updated the paths in pipeline.yml after restructuring folders * More updates to file paths * AzureSecurityCenter correction * Separate module for updating Azure Firewall * Code fix for prevention of resource group while executing scripts * Corrections to the orchestration and parameters file * Added the Azure Firewall update section to the pipeline yml file * Fixed json parameters file for AKS module that was formatted incorrectly * Minor fixes to Virtual Network * Updated the subscription GUIDs and added a subscription info for AKS * Changed vNet to VirtualNetwork. Also, added dependsOn for AKS Archetype in Orchestration file. * Changed the KeyVault behavior to enable Service EndPoint after Landing Zone deployment. * Orchestration and Pipeline updates for AKS Archetype * AKS Archetype pipeline / orchestration update * Fixed unsupported versions for aks * Changes based on feedback from AKS Archetype review * Minor changes - feedback work continued * Pipeline changes specific to AKS LandingZone * Changes based on testing firewall rules update logic * Pipeline yml file updated * Minor update * Minor update * Minor update * Minor correction to file path * Minor file path correction * Minor correction * Debug statements added * Fix for Azure Firewall scripts * Updated * Updated * Minor update * Pipeline jobs rearranged. * File path fixed * Fixes to chmod script * Minor fixes * Updated the dependencies * Corrected the bootstrap var in pipeline * Live updates from feedback review * Fixes based on today's review
2019-08-24 08:48:47 +03:00
{
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"azureFirewallName": {
"type": "string",
"metadata": {
"description": "Required. Azure Firewall Name."
}
},
"azureFirewallResourceGroupName": {
"type": "string",
"metadata": {
"description": "Required. Azure Firewall Resource Group Name."
}
},
"azureFirewallSubscriptionId": {
"type": "string",
"metadata": {
"description": "Required. Azure Firewall Subscription Id."
}
},
"azureFirewallNatRuleCollection": {
"type": "array",
"metadata": {
"description": "Required. Array containing Azure Firewall Nat rule collections"
}
},
"azureFirewallApplicationRuleCollection": {
"type": "array",
"metadata": {
"description": "Required. Array containing Azure Firewall application rule collections"
}
},
"azureFirewallNetworkRuleCollection": {
"type": "array",
"metadata": {
"description": "Required. Array containing Firewall network rule collections"
}
}
},
"variables": {
"azureFirewallPipName": "[concat(parameters('azureFirewallName'), '-pip')]",
"azureFirewallPipId": "[resourceId('Microsoft.Network/publicIPAddresses', variables('azureFirewallPipName'))]"
},
"resources": [
{
"apiVersion": "2019-06-01",
"name": "nestedDeployCreateAzureApplicationRules",
"type": "Microsoft.Resources/deployments",
"resourceGroup": "[parameters('azureFirewallResourceGroupName')]",
"subscriptionId": "[parameters('azureFirewallSubscriptionId')]",
"dependsOn": [],
"properties": {
"mode": "Incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {},
"variables": {},
"resources": [
{
"type": "Microsoft.Network/azureFirewalls",
"apiVersion": "2019-06-01",
"location": "[resourceGroup().location]",
"name": "[parameters('azureFirewallName')]",
"properties": {
"ipConfigurations": "[reference(resourceId(parameters('azureFirewallSubscriptionId'), parameters('azureFirewallResourceGroupName'), 'Microsoft.Network/azureFirewalls', parameters('azureFirewallName')), '2018-08-01').ipConfigurations]",
"natRuleCollections": "[parameters('azureFirewallNatRuleCollection')]",
"applicationRuleCollections": "[parameters('azureFirewallApplicationRuleCollection')]",
"networkRuleCollections": "[parameters('azureFirewallNetworkRuleCollection')]"
}
}
]
}
}
}
],
"outputs": {
}
}