/terraform-azurerm-applicationgateway

Terraform Module for deploying a Azure Application Gateway

Primary LanguageHCLMIT LicenseMIT

terraform-azurerm-applicationgateway

Terraform

Deploys a Azure Application Gateway

This Terraform module deploys an Application Gateway on Azure

NOTES

  • Default SKU Tier is set to Standard_V2
  • Default SKU Capacity is set to 1
  • Only Standard_V2 and WAF_V2 SKU are available

Usage in Terraform 1.0

data "azurerm_resource_group" "appgwvnetrsg" {
  name = "vnetrsg-aks"
}

data "azurerm_virtual_network" "appgwvnet" {
  name                = "vnet-aks"
  resource_group_name = data.azurerm_resource_group.aksvnetrsg.name
}

resource "azurerm_subnet" "appgwsubnet" {
  name                 = "subnet-agic"
  resource_group_name  = data.azurerm_resource_group.aksvnetrsg.name
  virtual_network_name = data.azurerm_virtual_network.aksvnet.name
  address_prefixes     = ["10.100.1.0/24"]
}

resource "azurerm_subnet" "appgwsubnet" {
  name                 = "subnet-agic"
  resource_group_name  = "rsg-network"
  virtual_network_name = data.azurerm_virtual_network.aksvnet.name
  address_prefixes     = ["10.10.1.0/24"]
}

module "appgateway" {
  source                = "github.com/imjoseangel/terraform-azurerm-applicationgateway"
  name                  = var.appgw_name
  resource_group_name   = var.appgw_rsg
  location              = var.location
  create_resource_group = true
  vnet_subnet_id        = azurerm_subnet.appgwsubnet.id
}

To connect the Application Gateway with a Kubernetes Cluster (AKS) the following setup adds the required roles and routes to work with kubenet:

data "azurerm_user_assigned_identity" "appgw" {
  name                = format("ingressapplicationgateway-%s", module.aks.cluster_name)
  resource_group_name = module.aks.node_resource_group

  depends_on = [
    module.appgateway
  ]
}

resource "azurerm_role_assignment" "app_gw" {
  scope                = module.appgateway.id
  role_definition_name = "Contributor"
  principal_id         = data.azurerm_user_assigned_identity.appgw.principal_id
}

resource "azurerm_role_assignment" "appgw_resource_group" {
  scope                = module.appgateway.resource_group_id
  role_definition_name = "Reader"
  principal_id         = data.azurerm_user_assigned_identity.appgw.principal_id
}

data "azurerm_resources" "routetables" {
  resource_group_name = module.aks.node_resource_group
  type                = "Microsoft.Network/routeTables"
}

resource "azurerm_subnet_route_table_association" "appgwroute" {
  subnet_id      = azurerm_subnet.appgwsubnet.id
  route_table_id = data.azurerm_resources.routetables.resources[0].id
  depends_on = [
    data.azurerm_resources.routetables
  ]
}

The Application Gateway can be connected to Kubernetes (AKS) enabling the create_ingress and gateway_id options:

module "aks" {
  source                = "github.com/imjoseangel/terraform-azurerm-kubernetes"
...
  create_ingress        = true
  gateway_id            = module.appgateway.id
}

WAF can be enabled adding sku and waf_enabled fields. In order to enable WAF, sku needs to be set to WAF_2 and waf_enabled to true. If one of them does not fit the requirements, WAF will remain disabled by default.

module "appgateway" {
  source                = "github.com/imjoseangel/terraform-azurerm-applicationgateway"
...
  sku                   = "WAF_v2"
  waf_enabled           = true
}

Authors

Originally created by imjoseangel

License

MIT