AZURRE-VM-NSG-ALERTS
What's in it?
This will deploy the following Resources:
Resource Groups
- rg_compute
- rg_networking
- rg_storage
- rg_monitoring
- rg_security
Virtual Networks
* Vnet - vnet-uks-main
* Snet - snet-uks-compute
* Snet - snet-uks-storage
* Snet - snet-uks-network
* Snet - snet-uks-security
* Snet - snet-uks-firewall
Storage Accounts
* SA - saukstestdiag01
Virtual Machines + NIC
* VM - vm-uks-tst-vm-1
* NIC - nic-uks-test-virtualmachine_1-1
Network Security Groups
* NSG - nsg-uks-test-virtualmachine_1-1
Firewall, Firewall Policy and Public IP
* FW Name - fw-gbl-test-firewall (Standard Plan)
* FW Policy Name - fw-gbl-test-firewallpolicy
* FW Public IP - pubip-uks-test-firewall-1
DDoS
* DDoS Name - ddos-protection-plan (Standard)
Alerts
* A number of alerts for each resource
What does this code do?
It will deploy the Resource Groups and Virtual Networks, and then deploy a Virtual Machine into the Compute Resource Groups and Subnets.
It will then attach a basic NSG to the Compute network (The rules will need to be added depending on your requirements).
In addition to this, an Azure Firewall and Policy will be deployed to the Network Resource Groups and Subnets (And the AzureFirewallSubnet), as well as a Standard DDoS Plan which will attach itself to the Virtual Network to protect the resources.
Azure Alerting will then be applied to all resources to alert to DdoS attacks, availability issues, latency, lack of VM Disk space, utilisation issues,
and resource deletion, set to fire alerts to an Action Group (This will need altering based on your requirements.
Future Tasks
* Create a network diagram and add it here for visability.
* Create an answers.tfvars file and remove answers from variables.tf to the answers.tfvars file.
* Add code for Virtual Machine (Linux), Virtual Machine Scale Sets, and Availability Sets.