This repository is no longer maintained actively. Please visit https://github.com/kumarvna?tab=repositories for the latest updates.
Azure virtual machine scale sets let you create and manage a group of identical, load balanced VMs. The number of VM instances can automatically increase or decrease in response to demand or a defined schedule. Scale sets provide high availability to your applications, and allow you to centrally manage, configure, and update a large number of VMs.
This module deploys Windows or Linux virtual machine scale sets with Public / Private Load Balancer support and many other features.
These types of resources supported:
- Linux Virtual Machine Scale Set
- Windows Virtual Machine Scale Set
- Public Azure Load Balancer
- Private Azure Load Balancer
- Inbound NAT Rule
- Network Security Group
- Log Analytics Agent Extension
- Azure Monitoring Diagnostics
module "vmscaleset" {
source = "kumarvna/vm-scale-sets/azurerm"
version = "2.0.0"
# Resource Group and location, VNet and Subnet detials (Required)
resource_group_name = "rg-hub-demo-internal-shared-westeurope-001"
virtual_network_name = "vnet-default-hub-westeurope"
subnet_name = "snet-management-default-hub-westeurope"
vmscaleset_name = "testvmss"
# (Optional) To enable Azure Monitoring and install log analytics agents
log_analytics_workspace_name = var.log_analytics_workspace_id
hub_storage_account_name = var.hub_storage_account_id
# This module support multiple Pre-Defined Linux and Windows Distributions.
# These distributions support the Automatic OS image upgrades in virtual machine scale sets
# Linux images: ubuntu1804, ubuntu1604, centos75, coreos
# Windows Images: windows2012r2dc, windows2016dc, windows2019dc, windows2016dccore
# Specify the RSA key for production workloads and set generate_admin_ssh_key argument to false
# When you use Autoscaling feature, instances_count will become default and minimum instance count.
os_flavor = "linux"
linux_distribution_name = "ubuntu1804"
generate_admin_ssh_key = false
admin_ssh_key_data = "~/.ssh/id_rsa.pub"
instances_count = 2
# Public and private load balancer support for VM scale sets
# Specify health probe port to allow LB to detect the backend endpoint status
# Standard Load Balancer helps load-balance TCP and UDP flows on all ports simultaneously
# Specify the list of ports based on your requirement for Load balanced ports
# for additional data disks, provide the list for required size for the disk.
load_balancer_type = "public"
load_balancer_health_probe_port = 80
load_balanced_port_list = [80, 443]
additional_data_disks = [100, 200]
# Enable Auto scaling feature for VM scaleset by set argument to true.
# Instances_count in VMSS will become default and minimum instance count.
# Automatically scale out the number of VM instances based on CPU Average only.
enable_autoscale_for_vmss = true
minimum_instances_count = 2
maximum_instances_count = 5
scale_out_cpu_percentage_threshold = 80
scale_in_cpu_percentage_threshold = 20
# Network Seurity group port allow definitions for each Virtual Machine
# NSG association to be added automatically for all network interfaces.
# SSH port 22 and 3389 is exposed to the Internet recommended for only testing.
# For production environments, we recommend using a VPN or private connection
nsg_inbound_rules = [
{
name = "http"
destination_port_range = "80"
source_address_prefix = "*"
},
{
name = "https"
destination_port_range = "443"
source_address_prefix = "*"
},
]
# Adding TAG's to your Azure resources (Required)
# ProjectName and Env are already declared above, to use them here, create a varible.
tags = {
ProjectName = "demo-internal"
Env = "dev"
Owner = "user@example.com"
BusinessUnit = "CORP"
ServiceClass = "Gold"
}
}
This module utilizes azureadmin
as a local administrator on virtual machines. If you want to you use custom username, then specify the same by setting up the argument admin_username
with valid user string.
By default, this module generates a strong password for all virtual machines. If you want to set the custom password, specify the argument admin_password
with valid string.
This module also generates SSH2 Key pair for Linux servers by default, however, it is only recommended to use for dev environment. For production environments, please generate your own SSH2 key with a passphrase and input the key by providing the path to the argument admin_ssh_key_data
.
Automatic OS image upgrades are enabled on this module, so it helps update management by safely and automatically upgrading the OS disk for all instances in the scale set. Once configured, the latest OS image published by image publishers is automatically applied to the scale set without user intervention. Upgrades batches of instances in a rolling manner each time a new image is published by the publisher.
Only certain OS platform images are currently supported. Following pre-defined Windows or Linux images are available with the automatic upgrade option. To deploy these images specify linux_distribution_name
or windows_distribution_name
argument with following distributions.
OS type | Available Pre-defined Images |
---|---|
Linux | ubuntu1804 , ubuntu1604 , centos75 , coreos |
Windows | windows2012r2dc , windows2016dc , windows2019dc , windows2016dccore |
If the pre-defined Windows or Linux variants are not sufficient then, you can specify the custom image by setting up the argument custom_image
with appropriate values. Custom images can be used to bootstrap configurations such as preloading applications, application configurations, and other OS configurations. For more information check here
module "vmscaleset" {
source = "kumarvna/vm-scale-sets/azurerm"
version = "2.0.0"
# .... omitted
os_flavor = "linux"
linux_distribution_name = "ubuntu1804"
generate_admin_ssh_key = false
admin_ssh_key_data = "~/.ssh/id_rsa.pub"
instances_count = 2
custom_image = {
publisher = "myPublisher"
offer = "myOffer"
sku = "mySKU"
version = "latest"
}
# .... omitted
This is an optional feature and only applicable if you are using your own DNS servers superseding default DNS services provided by Azure. Set the argument dns_servers = ["4.4.4.4"]
to enable this option. For multiple DNS servers, set the argument dns_servers = ["4.4.4.4", "8.8.8.8"]
While creating the Linux servers, its recommended to use ssh2 keys to log in than using a password. By default, this module generates the ssh2 key pair for Linux VM's. If you want the password to login Linux VM, set the argument disable_password_authentication = false
, this instructs the module to create a random password.
The setting must be enabled for every network interface that is attached to the virtual machine that receives traffic that the virtual machine needs to forward. A virtual machine can forward traffic whether it has multiple network interfaces or a single network interface attached to it. While IP forwarding is an Azure setting, the virtual machine must also run an application able to forward the traffic, such as firewall, WAN optimization, and load balancing applications. IP forwarding is typically used with user-defined routes.
By default, this not enabled and set to disable. To enable the IP forwarding using this module, set the argument enable_ip_forwarding = true
.
Accelerated networking enables single root I/O virtualization (SR-IOV) to a VM, greatly improving its networking performance. This high-performance path bypasses the host from the data path, which reduces latency, jitter, and CPU utilization for the most demanding network workloads on supported VM types.
Accelerated Networking is supported on most general-purpose and compute-optimized instance sizes with two or more virtual CPUs (vCPUs). These supported series are Dv2/DSv2 and F/Fs.
On instances that support hyperthreading, accelerated networking is supported on VM instances with four or more vCPUs. Supported series are: D/Dsv3, D/Dsv4, E/Esv3, Ea/Easv4, Fsv2, Lsv2, Ms/Mms, and Ms/Mmsv2.
By default, this not enabled and set to disable. To enable the accelerated networking using this module, set the argument enable_accelerated_networking = true
.
The Internal Load Balancer Virtual IP is accessible within the entire virtual network as well as from on-premises and inter connected VNets through the secure IP Sec tunnel. By default, the Azure DHCP servers assign the private IPv4 address for the load balancer. You can specify static IP address for Internal load balancer. Unless necessary, you should never manually set the IP address.
By default this not enabled and set to be dynamic. To enable the static private IP using this module, set the argument private_ip_address_allocation_type = "Static"
and set the argument private_ip_address
with valid static private IP.
We can create multiple virtual machines from an Azure managed VM image. A managed VM image contains the information necessary to create a VM, including the OS and data disks. The virtual hard disks (VHDs) that make up the image, including both the OS disks and any data disks, are stored as managed disks. One managed image supports up to 20 simultaneous deployments.
When you use the managed VM image, custom image, or any other source image reference are not valid. By default, this not enabled and set to use predefined or custom images. To utilize Azure managed VM Image by this module, set the argument source_image_id
with valid manage image resource id.
Azure Hybrid Benefit for Windows Server allows you to use your on-premises Windows Server licenses and run Windows virtual machines on Azure at a reduced cost. You can use Azure Hybrid Benefit for Windows Server to deploy new virtual machines with Windows OS.
By default, this is set to None
. To use the Azure Hybrid Benefit for windows server deployment by this module, set the argument license_type
to valid values. Possible values are None
, Windows_Client
and Windows_Server
.
Azure managed disks are block-level storage volumes that are managed by Azure and used with Azure Virtual Machines. Managed disks are like a physical disk in an on-premises server but virtualized. With managed disks, all you have to do is specify the disk size, the disk type, and provision the disk. Once you provision the disk, Azure handles the rest. The available types of disks are ultra disks, premium solid-state drives (SSD), standard SSDs, and standard hard disk drives (HDD).
By default, this module uses the standard SSD with Locally redundant storage (StandardSSD_LRS
). To use other type of disks, set the argument os_disk_storage_account_type
with valid values. Possible values are Standard_LRS
, StandardSSD_LRS
and Premium_LRS
.
Azure virtual machine scale sets support VM instances with attached data disks. You can attach data disks when the scale set is created, or to an existing scale set.
By default, this module uses the standard Locally redundant storage (Standard_LRS
). To use other type of disks, set the argument additional_data_disks_storage_account_type
with valid values. Possible values are Standard_LRS
, StandardSSD_LRS
and Premium_LRS
.
This module also supports attaching data disks by setting up the argument additional_data_disks = [100, 300]
with valid disk size in GB.
Note: When you create a scale set with attached data disks, you need to mount and format the disks from within a VM to use them (just like for standalone Azure VMs). A convenient way to complete this process is to use a Custom Script Extension that calls a script to partition and format all the data disks on a VM.
By default, a scale set consists of a single placement group with a maximum size of 100 VMs. If a scale set property called singlePlacementGroup is set to false, the scale set can be composed of multiple placement groups and has a range of 0-1,000 VMs.
By default this is enabled and set to true
. To change this value to allow multiple placement groups set the argument single_placement_group = false
In general, Azure scale set virtual machines do not require their own public IP addresses. For most scenarios, it is more economical and secure to associate a public IP address to a load balancer or to a Bastion server, which then routes incoming connections to scale set virtual machines as needed.
However, some scenarios do require scale set virtual machines to have their own public IP addresses. An example is where virtual machines need to make external connections to one another across regions in a distributed database.
To create a scale set that assigns a public IP address to each virtual machine, set the argument assign_public_ip_to_each_vm_in_vmss = true
Enabling automatic instance repairs for Azure virtual machine scale sets helps achieve high availability for applications by maintaining a set of healthy instances. If an instance in the scale set is found to be unhealthy as reported by Application Health extension or Load balancer health probes, then this feature automatically performs instance repair by deleting the unhealthy instance and creating a new one to replace it.
When an instance goes through a state change operation because of a PUT, PATCH or POST action performed on the scale set (for example reimage, redeploy, update, etc.), then any repair action on that instance is performed only after waiting for the grace period. Grace period is the amount of time to allow the instance to return to healthy state. Grace period is specified in minutes in ISO 8601 format and has a default value of 30 minutes.
The automatic instance repair feature can be enabled while creating a new scale set by setting up the argument enable_automatic_instance_repair = true
and the grace period can be managed using the argument grace_period = "PT30M"
. Default grace period is 30 minutes.
By default, the network security groups connected to Network Interface and allow necessary traffic and block everything else (deny-all rule). Use nsg_inbound_rules
in this Terraform module to create a Network Security Group (NSG) for network interface and allow it to add additional rules for inbound flows.
In the Source and Destination columns, VirtualNetwork
, AzureLoadBalancer
, and Internet
are service tags, rather than IP addresses. In the protocol column, Any encompasses TCP
, UDP
, and ICMP
. When creating a rule, you can specify TCP
, UDP
, ICMP
or *
. 0.0.0.0/0
in the Source and Destination columns represents all addresses.
You cannot remove the default rules, but you can override them by creating rules with higher priorities.
module "vmscaleset" {
source = "kumarvna/vm-scale-sets/azurerm"
version = "2.0.0"
# .... omitted
os_flavor = "linux"
linux_distribution_name = "ubuntu1804"
generate_admin_ssh_key = false
admin_ssh_key_data = "~/.ssh/id_rsa.pub"
instances_count = 2
nsg_inbound_rules = [
{
name = "ssh"
destination_port_range = "80"
source_address_prefix = "*"
},
{
name = "http"
destination_port_range = "443"
source_address_prefix = "*"
},
]
}
Well-defined naming and metadata tagging conventions help to quickly locate and manage resources. These conventions also help associate cloud usage costs with business teams via chargeback and show back accounting mechanisms.
An effective naming convention assembles resource names by using important resource information as parts of a resource's name. For example, using these recommended naming conventions, a public IP resource for a production SharePoint workload is named like this: pip-sharepoint-prod-westus-001
.
When applying metadata tags to the cloud resources, you can include information about those assets that couldn't be included in the resource name. You can use that information to perform more sophisticated filtering and reporting on resources. This information can be used by IT or business teams to find resources or generate reports about resource usage and billing.
The following list provides the recommended common tags that capture important context and information about resources. Use this list as a starting point to establish your tagging conventions.
Tag Name | Description | Key | Example Value | Required? |
---|---|---|---|---|
Project Name | Name of the Project for the infra is created. This is mandatory to create a resource names. | ProjectName | {Project name} | Yes |
Application Name | Name of the application, service, or workload the resource is associated with. | ApplicationName | {app name} | Yes |
Approver | Name Person responsible for approving costs related to this resource. | Approver | {email} | Yes |
Business Unit | Top-level division of your company that owns the subscription or workload the resource belongs to. In smaller organizations, this may represent a single corporate or shared top-level organizational element. | BusinessUnit | FINANCE, MARKETING,{Product Name},CORP,SHARED | Yes |
Cost Center | Accounting cost center associated with this resource. | CostCenter | {number} | Yes |
Disaster Recovery | Business criticality of this application, workload, or service. | DR | Mission Critical, Critical, Essential | Yes |
Environment | Deployment environment of this application, workload, or service. | Env | Prod, Dev, QA, Stage, Test | Yes |
Owner Name | Owner of the application, workload, or service. | Owner | {email} | Yes |
Requester Name | User that requested the creation of this application. | Requestor | {email} | Yes |
Service Class | Service Level Agreement level of this application, workload, or service. | ServiceClass | Dev, Bronze, Silver, Gold | Yes |
Start Date of the project | Date when this application, workload, or service was first deployed. | StartDate | {date} | No |
End Date of the Project | Date when this application, workload, or service is planned to be retired. | EndDate | {date} | No |
This module allows you to manage the above metadata tags directly or as an variable using
variables.tf
. All Azure resources which support tagging can be tagged by specifying key-values in argumenttags
. TagResourceName
is added automatically to all resources.
module "vmscaleset" {
source = "kumarvna/vm-scale-sets/azurerm"
version = "2.0.0"
# Resource Group, location, VNet and Subnet details
resource_group_name = "rg-hub-tieto-internal-shared-westeurope-001"
# ... omitted
tags = {
ProjectName = "demo-internal"
Env = "dev"
Owner = "user@example.com"
BusinessUnit = "CORP"
ServiceClass = "Gold"
}
}
Name | Version |
---|---|
terraform | >= 0.13 |
azurerm | ~> 2.27.0 |
Name | Version |
---|---|
azurerm | 2.27.0 |
random | n/a |
tls | n/a |
Name | Description | Type | Default |
---|---|---|---|
resource_group_name |
The name of the resource group in which resources are created | string | "" |
location |
The location of the resource group in which resources are created | string | "" |
virtual_network_name |
The name of the virtual network | string | "" |
subnet_name |
The name of the subnet to use in VM scale set | string | "" |
vmscaleset_name |
Specifies the name of the virtual machine scale set resource | string | "" |
log_analytics_workspace_name |
The name of log analytics workspace name | string | "" |
hub_storage_account_name |
The name of the hub storage account to store logs | string | "" |
load_balancer_sku |
The SKU of the Azure Load Balancer. Accepted values are Basic and Standard |
string | "Standard" |
load_balancer_type |
Controls the type of load balancer should be created. Possible values are public and private |
string | "private" |
enable_lb_nat_pool |
If enabled load balancer NAT pool will be created for SSH if flavor is Linux and for RDP if flavor is windows | string | false |
nat_pool_frontend_ports |
Optional override for default NAT ports | list(number) | [50000, 50119] |
os_flavor |
Specify the flavor of the operating system image to deploy Virtual Machine. Possible values are windows and linux |
string | "windows" |
virtual_machine_size |
The Virtual Machine SKU for the Virtual Machine | string | "Standard_A2_v2" |
instances_count |
The number of Virtual Machines required | number | 1 |
availability_zones |
A list of Availability Zones in which the Virtual Machines in this Scale Set should be created in | list(number) | [1, 2, 3] |
availability_zone_balance |
Should the Virtual Machines in this Scale Set be strictly evenly distributed across Availability Zones? | string | true |
single_placement_group |
Allow to have cluster of 100 VMs only per VM scale set | string | true |
license_type |
Specifies the type of on-premise license which should be used for this Virtual Machine. Possible values are None , Windows_Client and Windows_Server . |
string | "None" |
os_upgrade_mode |
Specifies how Upgrades (e.g. changing the Image/SKU) should be performed to Virtual Machine Instances. Possible values are Automatic , Manual and Rolling . |
string | Automatic |
enable_automatic_instance_repair |
Should the automatic instance repair be enabled on this Virtual Machine Scale Set? | string | false |
grace_period |
Amount of time (in minutes, between 30 and 90, defaults to 30 minutes) for which automatic repairs will be delayed. | string | "PT30M" |
source_image_id |
The ID of an Image which each Virtual Machine should be based on | string | null |
custom_image |
Provide the custom image to this module if the default variants are not sufficient | map(object) | null |
linux_distribution_list |
Pre-defined Azure Linux VM images list | map(object) | ubuntu1804 |
linux_distribution_name |
Variable to pick an OS flavor for Linux based Virtual Machine. Possible values are centos75 , ubuntu1804 , ubuntu1604 , coreos |
string | ubuntu1804 |
windows_distribution_list |
Pre-defined Azure Windows VM images list | map(object) | "windows2019dc" |
windows_distribution_name |
Variable to pick an OS flavor for Windows based VM. Possible values are windows2012r2dc , windows2016dc , windows2019dc , windows2016dccore |
string | "windows2019dc" |
os_disk_storage_account_type |
The Type of Storage Account for Internal OS Disk. Possible values include Standard_LRS, StandardSSD_LRS and Premium_LRS. | string | "StandardSSD_LRS" |
additional_data_disks |
Adding additional disks capacity to add each instance (GB) | list(number) | [] |
additional_data_disks_storage_account_type |
The Type of Storage Account which should back this Data Disk. Possible values include Standard_LRS, StandardSSD_LRS, Premium_LRS and UltraSSD_LRS. | string | "Standard_LRS" |
generate_admin_ssh_key |
Generates a secure private key and encodes it as PEM | string | true |
admin_ssh_key_data |
specify the path to the existing SSH key to authenticate Linux virtual machine | string | "" |
disable_password_authentication |
Should Password Authentication be disabled on this Virtual Machine. Applicable to Linux Virtual machine | string | true |
admin_username |
The username of the local administrator used for the Virtual Machine | string | "azureadmin" |
admin_password |
The Password which should be used for the local-administrator on the Virtual Machines | string | null |
private_ip_address_allocation_type |
The allocation method used for the Private IP Address. Possible values are Dynamic and Static. | string | false |
lb_private_ip_address |
The Static Private IP Address to assign to the Load Balancer. This is valid only when private_ip_address_allocation is set to Static . |
string | null |
enable_ip_forwarding |
Should IP Forwarding be enabled? | string | false |
enable_accelerated_networking |
Should Accelerated Networking be enabled? | string | false |
dns_servers |
List of dns servers to use for network interface | string | [] |
nsg_inbound_rules |
List of network rules to apply to network interface | object | {} |
assign_public_ip_to_each_vm_in_vmss |
Create a virtual machine scale set that assigns a public IP address to each VM | string | false |
enable_autoscale_for_vmss |
Manages a AutoScale Setting which can be applied to Virtual Machine Scale Sets | string | false |
minimum_instances_count |
The minimum number of instances for this resource. Valid values are between 0 and 1000 | string | null |
maximum_instances_count |
The maximum number of instances for this resource. Valid values are between 0 and 1000 | string | "" |
scale_out_cpu_percentage_threshold |
Specifies the threshold % of the metric that triggers the scale out action. | number | 80 |
scale_in_cpu_percentage_threshold |
Specifies the threshold % of the metric that triggers the scale in action. | number | 20 |
scaling_action_instances_number |
The number of instances involved in the scaling action | number | 1 |
Tags |
A map of tags to add to all resources | map | {} |
Name | Description |
---|---|
admin_ssh_key_public |
The generated public key data in PEM format |
admin_ssh_key_private |
The generated private key data in PEM format |
windows_vm_password |
Password for the windows Virtual Machine |
load_balancer_public_ip |
The Public IP address allocated for load balancer |
load_balancer_private_ip |
The Private IP address allocated for load balancer |
load_balancer_nat_pool_id |
The resource ID of the Load Balancer NAT pool |
load_balancer_health_probe_id |
The resource ID of the Load Balancer health Probe |
load_balancer_rules_id |
The resource ID of the Load Balancer Rule |
network_security_group_id |
The resource id of Network security group |
linux_virtual_machine_scale_set_name |
The name of the Linux Virtual Machine Scale Set |
linux_virtual_machine_scale_set_id |
The resource ID of the Linux Virtual Machine Scale Set |
linux_virtual_machine_scale_set_unique_id |
The unique ID of the Linux Virtual Machine Scale Set |
windows_virtual_machine_scale_set_name |
The name of the windows Virtual Machine Scale Set |
windows_virtual_machine_scale_set_id |
The resource ID of the windows Virtual Machine Scale Set |
windows_virtual_machine_scale_set_unique_id |
The unique ID of the windows Virtual Machine Scale Set |
Originally created by Kumaraswamy Vithanala