rsabile / azure-network-terraform

Collection of terraform codes for various Azure network topologies.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Azure Network Architecture - Terraform Examples

Terraform codes in this collection cover different hub and spoke network patterns using standard Virtual Network (Vnet) network topologies.

1.1. Secured Hub and Spoke - Single Region

Terraform Code

Deploy a single-region Hub and Spoke Secured Virtual Network (Vnet) topology using Azure Firewall for traffic inspection. Learn about traffic routing patterns, hybrid DNS resolution, firewall security policies, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Secured Hub and Spoke (Single Region)

1.2. Secured Hub and Spoke - Dual Region

Terraform Code

Deploy a dual-region Secured Hub and Spoke Vnet topology using Azure Firewalls for traffic inspection. Learn about multi-region traffic routing patterns, hybrid DNS resolution, firewall security policies, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Secured Hub and Spoke (Dual Region)

1.3. Hub and Spoke - Single Region (NVA)

Terraform Code

Deploy a single-region Hub and Spoke Vnet topology using Virtual Network Appliances (NVA) for traffic inspection. Learn about traffic routing patterns, hybrid DNS resolution, NVA deployment, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Hub and Spoke using NVA (Single Region)

1.4. Hub and Spoke - Dual Region (NVA)

Terraform Code

Deploy a dual-region Hub and Spoke Vnet topology using Virtual Network Appliances (NVA) for traffic inspection. Learn about multi-region traffic routing patterns, hybrid DNS resolution, NVA deployment, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Hub and Spoke using NVA (Dual Region)

Terraform codes in this collection cover different hub and spoke network patterns using Virtual WAN.

2.1. Virtual WAN - Single Region

Terraform Code

Deploy a single-region Virtual WAN (Vwan) topology to observe traffic routing patterns. Learn about traffic routing patterns, hybrid DNS resolution, connecting NVA into the virtual hub, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Virtual WAN (Single Region)

2.2. Virtual WAN - Dual Region

Terraform Code

Deploy a dual-region Virtual WAN (Vwan) topology to observe traffic routing patterns. Learn about multi-region traffic routing patterns, hybrid DNS resolution, connecting NVA into the virtual hubs, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Virtual WAN (Dual Region)

2.3. Secured Virtual WAN - Single Region

Terraform Code

Deploy a single-region Secured Virtual WAN (Vwan) topology to observe traffic routing patterns. Routing Intent feature is enabled to allow traffic inspection through the Azure firewall in the virtual hub. Learn about traffic routing patterns, routing intent security policies, hybrid DNS resolution, NVA integration into the virtual hub, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Secured Virtual WAN (Single Region)

2.4. Secured Virtual WAN - Dual Region

Terraform Code

Deploy a dual-region Secured Virtual WAN (Vwan) topology to observe traffic routing patterns. Routing Intent feature is enabled to allow traffic inspection through the Azure firewalls in the virtual hubs. Learn about multi-region traffic routing patterns, routing intent security policies, hybrid DNS resolution, connecting NVA into the virtual hubs, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Secured Virtual WAN (Dual Region)

3.1. Secured Hub and Spoke - Single Region (Virtual Network Manager)

Terraform Code

Deploy a single-region Hub and Spoke Secured Virtual Network (Vnet) topology using the Azure Virtual Network Manager (AVNM) service. Learn about traffic routing patterns, hybrid DNS resolution, firewall security policies, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Secure Hub and Spoke - Single Region (Virtual Network Manager)

3.2. Secured Hub and Spoke - Dual Region (Virtual Network Manager)

Terraform Code

Deploy a dual-region Hub and Spoke Secured Virtual Network (Vnet) topology using the Azure Virtual Network Manager (AVNM) service. Learn about traffic routing patterns, hybrid DNS resolution, firewall security policies, and PrivateLink Services access to IaaS, PrivateLink access to PaaS services.

Secure Hub and Spoke - Dual Region (Virtual Network Manager)

(In progress)

About

Collection of terraform codes for various Azure network topologies.


Languages

Language:HCL 79.6%Language:Shell 17.6%Language:Smarty 2.7%Language:Python 0.2%Language:Dockerfile 0.0%