Loading...

Terraform integration with Azure VMware Solution

Terraform integration with Azure VMware Solution

By: Juan Manuel Rey (Microsoft) and Eric Schwindt (HashiCorp)

 

Azure VMware Solution is a VMware validated first party Azure service from Microsoft that provides private clouds containing vSphere clusters built from dedicated bare-metal Azure infrastructure. It enables customers to leverage their existing investments in VMware skills and tools, allowing them to focus on developing and running their VMware-based workloads on Azure.

 

Hashicorp Terraform is an open-source tool for provisioning and managing cloud infrastructure. It allows administrators and DevOps engineers to codify infrastructure in configuration files describing the topology of cloud resources.

 

Many of Azure and VMware customers are currently using Terraform to deploy and manage their Azure and VMware resources; with that in mind and since Azure VMware Solution is a first party service the Terraform Azure Provider has been updated to include functionality that will enable administrators to deploy and manage Azure VMware Solution private clouds.

 

In its current state the provider allows to create and destroy an Azure VMware Solution private cloud and some limited day-2 and operations like enabling internet access for the workloads and scale up and down the cluster. In this article we will go into the details.

 

Prerequisites

You will need to have a valid Azure subscription with quota enabled for Azure VMware Solution, review the procedure here. Review Terraform on Azure documentation to get your environment ready for the deployment. Finally use Terraform Azure Provider of at least version 2.69.0.

 

Private cloud deployment

We will create a Terraform plan with three main files.

  • main.tf
  • variables.tf
  • avs-sddc.tf

With these three manifests there will be enough to deploy a new private cloud.

 

  • variables.tf

In the variables.tf manifest we will declare prefix and location variable.

 

variable "prefix" { description = "The prefix used for all resources in this example" default = "tf-contoso" } variable "location" { description = "The Azure location where all resources in this example should be created" default = "northeurope" }

 

 

  • main.tf

As in any other Azure Terraform plan this manifest will contain the resource group where we will deploy the different Azure resources and the information about the provider version.

 

terraform { required_providers { azurerm = { source = "hashicorp/azurerm" version = "~>2.69.0" } } } provider "azurerm" { features {} } resource "azurerm_resource_group" "tf-contoso" { name = "tf-contoso" location = "northeurope" }

 

 

  • avs-sddc.tf

Finally in the avs-sddc.tf file we will declare the private cloud, including the SKU and te configuration for the management cluster.

 

resource "azurerm_vmware_private_cloud" "avs-sddc" { name = "${var.prefix}-sddc" resource_group_name = azurerm_resource_group.tf-contoso.name location = "${var.location}" sku_name = "av36" management_cluster { size = 3 } network_subnet_cidr = "10.177.0.0/22" }

 

 

Once all three files have been created run terraform plan -out rg-test.tfplan to generate the plan and terraform apply "rg-test.tfplan to execute the plan and deploy the SDDC.

Day-2 operations and lifecycle management

As mentioned at the begining in this version of the Azure Provider the only supported Day-2 operations are scaling up or down the clusters and enabling internet access operations are supported. However both operations cannot be executed at the same time.

First we will enable internet access for the VMware workloads running in the private cloud.

 

Edit avs-sddc.tf manifest and add the internet_connection_enabled parameter after the management cluster size as shown in the example.

 

resource "azurerm_vmware_private_cloud" "avs-sddc" { name = "${var.prefix}-sddc" resource_group_name = azurerm_resource_group.tf-contoso.name location = "${var.location}" sku_name = "av36" management_cluster { size = 3 } internet_connection_enabled = true network_subnet_cidr = "10.177.0.0/22" }

 

 

Save the manifest, regenerate the Terraform plan and apply it with terraform apply "tf-contoso.tfplan". The operation will take around 10 minutes to be completed. You can verify and monitor the execution in the Azure portal, access your Azure VMware Solution private cloud resource and go to Manage->Connectivity->Settings.

 

jurey_0-1639556582722.png

 

To scale the cluster we will edit the same avs-sddc.tf manifest and change the cluster size from 3 to 4.

 

management_cluster { size = 4 }

 

 

Save the manifest regenerate and apply the plan. The scale up operation will take about 30 to 45 minutes to complete.

 

With the Azure VMware Solution private cloud up and ready the Terraform provider for Azure can be used to deploy a VNET, a jumpbox virtual machine and an Azure Bastion service to access and manage the private cloud using common VMware vSphere tools. Equally an administrator can leverage the VMware vSphere and NSX-T Terraform providers to deploy workloads and configure resources in their private clouds.

 

Following are a few resources to learn more about Azure VMware Solution.

Learn Azure VMware Solution Networking

Try Azure VMware Solution Hands-on-lab

 

Authors:

Juan Manuel Rey - Senior Program Manager, Azure VMware Solution product group at Microsoft

Eric Schwindt - Director, Partner Alliances at HashiCorp

Published on:

Learn more
Azure Migration and Modernization Blog articles
Azure Migration and Modernization Blog articles

Azure Migration and Modernization Blog articles

Share post:

Related posts

🚀 Introducing the New VS Code Extension for Azure Cosmos DB

We’re excited to share that the Azure Databases extension for Visual Studio Code is now officially rebranded as the Azure Cosmos DB extension!...

23 hours ago

AI-based T-SQL Refactoring: an automatic intelligent code optimization with Azure OpenAI

This article presents an AI-powered approach to automating SQL Server code analysis and refactoring. The system intelligently identifies ineff...

23 hours ago

Azure Boards integration with GitHub Copilot (Private Preview)

Several months ago, GitHub introduced the public preview of its Copilot coding agent, a powerful new capability that allows you to assign GitH...

1 day ago

What is Azure Key Vault and How It Secures Microsoft Dynamics 365 CRM Systems?

Azure Key Vault is a service by Microsoft Azure that helps securely store and manage sensitive information such as API keys, connection string...

2 days ago

Azure AI Foundry Model In Copilot Studio Custom Prompts

Any custom model created in Azure AI Foundry can be used in Copilot Studio. This ... The post Azure AI Foundry Model In Copilot Studio Custom ...

2 days ago

Running Teams PowerShell Cmdlets in Azure Automation

This article describes the prerequisites and how to run cmdlets from the Teams PowerShell module in Azure Automation runbooks. We also conside...

5 days ago

Azure Storage APIs gain Entra ID and RBAC support

To align with security best practices, Microsoft Entra ID and RBAC support is now generally available for several Azure Storage data plane API...

6 days ago

Introducing the Azure Cosmos DB Account Overview Hub

A Simpler Way to Navigate, Learn, and Optimize your Azure Cosmos DB Account within the Azure Portal. Whether you are just getting started with...

7 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy