commit 9b0409c1708ee2430957617198bf52eba3dd3484 Author: Ditmar Visser Date: Tue May 27 18:57:23 2025 +0000 feat: opdracht 1 diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..0047684 --- /dev/null +++ b/.gitignore @@ -0,0 +1,42 @@ +# ---> Ansible +*.retry + +# ---> Terraform +# Local .terraform directories +**/.terraform/* + +# .tfstate files +*.tfstate +*.tfstate.* + +# Crash log files +crash.log +crash.*.log + +# Exclude all .tfvars files, which are likely to contain sensitive data, such as +# password, private keys, and other secrets. These should not be part of version +# control as they are data points which are potentially sensitive and subject +# to change depending on the environment. +*.tfvars +*.tfvars.json + +# Ignore override files as they are usually used to override resources locally and so +# are not checked in +override.tf +override.tf.json +*_override.tf +*_override.tf.json + +# Ignore transient lock info files created by terraform apply +.terraform.tfstate.lock.info + +# Include override files you do wish to add to version control using negated pattern +# !example_override.tf + +# Include tfplan files to ignore the plan output of command: terraform plan -out=tfplan +# example: *tfplan* + +# Ignore CLI configuration files +.terraformrc +terraform.rc + diff --git a/opdracht-1/.gitignore b/opdracht-1/.gitignore new file mode 100644 index 0000000..c13bb9b --- /dev/null +++ b/opdracht-1/.gitignore @@ -0,0 +1 @@ +inventory.ini \ No newline at end of file diff --git a/opdracht-1/.terraform.lock.hcl b/opdracht-1/.terraform.lock.hcl new file mode 100644 index 0000000..48f8c1a --- /dev/null +++ b/opdracht-1/.terraform.lock.hcl @@ -0,0 +1,79 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/azurerm" { + version = "4.27.0" + constraints = "~> 4.27.0" + hashes = [ + "h1:2fs47aLDaEm93ANXXVRdTjlbUBmFBZRsFjyshKoPE3o=", + "zh:0c69edea1995bd3bd9e61980757169c35bf22281b660b5c755b6cb13d08d29d2", + "zh:25b86bf7b9678371d8573983954c571696f3e64a3967133be3b835da36307106", + "zh:49921cff4f26a49bafada60cd07dabb52c5eb35231059ed928a4f4722e269c82", + "zh:4b986166531f9fd1289f01d8220519443e74888a21da512c1b841b006dad6215", + "zh:53fb65b2ca4df637f03e4748a100a7d7fc77249e307c03e294d6259cec0310f6", + "zh:5c0d021a387ca4e2a5a01da009746a08c45f08e971c10d9bda54539d7264d671", + "zh:600043f2b20dc5a45275e43f175c19fe8b6e8e9557a0c884aef018f1f63de90e", + "zh:a0284f6f38912f67bb4cb7829fda3fa75be81fea6a9b21119965c2a839430092", + "zh:a7ac0576e2069ef77557042c6b5157ded364fbd355b2f9bf7f5441622424086e", + "zh:c5db0bcafe986868e28cc6225b68b2d1cf4bf631939d260ca845f17a9aa1677d", + "zh:ce620c0eb71b1fdd925828b30cf232a869abccf1c459180f2f991c4166315251", + "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + ] +} + +provider "registry.terraform.io/hashicorp/local" { + version = "2.5.2" + hashes = [ + "h1:JlMZD6nYqJ8sSrFfEAH0Vk/SL8WLZRmFaMUF9PJK5wM=", + "zh:136299545178ce281c56f36965bf91c35407c11897f7082b3b983d86cb79b511", + "zh:3b4486858aa9cb8163378722b642c57c529b6c64bfbfc9461d940a84cd66ebea", + "zh:4855ee628ead847741aa4f4fc9bed50cfdbf197f2912775dd9fe7bc43fa077c0", + "zh:4b8cd2583d1edcac4011caafe8afb7a95e8110a607a1d5fb87d921178074a69b", + "zh:52084ddaff8c8cd3f9e7bcb7ce4dc1eab00602912c96da43c29b4762dc376038", + "zh:71562d330d3f92d79b2952ffdda0dad167e952e46200c767dd30c6af8d7c0ed3", + "zh:78d5eefdd9e494defcb3c68d282b8f96630502cac21d1ea161f53cfe9bb483b3", + "zh:805f81ade06ff68fa8b908d31892eaed5c180ae031c77ad35f82cb7a74b97cf4", + "zh:8b6b3ebeaaa8e38dd04e56996abe80db9be6f4c1df75ac3cccc77642899bd464", + "zh:ad07750576b99248037b897de71113cc19b1a8d0bc235eb99173cc83d0de3b1b", + "zh:b9f1c3bfadb74068f5c205292badb0661e17ac05eb23bfe8bd809691e4583d0e", + "zh:cc4cbcd67414fefb111c1bf7ab0bc4beb8c0b553d01719ad17de9a047adff4d1", + ] +} + +provider "registry.terraform.io/hashicorp/template" { + version = "2.2.0" + hashes = [ + "h1:94qn780bi1qjrbC3uQtjJh3Wkfwd5+tTtJHOb7KTg9w=", + "zh:01702196f0a0492ec07917db7aaa595843d8f171dc195f4c988d2ffca2a06386", + "zh:09aae3da826ba3d7df69efeb25d146a1de0d03e951d35019a0f80e4f58c89b53", + "zh:09ba83c0625b6fe0a954da6fbd0c355ac0b7f07f86c91a2a97849140fea49603", + "zh:0e3a6c8e16f17f19010accd0844187d524580d9fdb0731f675ffcf4afba03d16", + "zh:45f2c594b6f2f34ea663704cc72048b212fe7d16fb4cfd959365fa997228a776", + "zh:77ea3e5a0446784d77114b5e851c970a3dde1e08fa6de38210b8385d7605d451", + "zh:8a154388f3708e3df5a69122a23bdfaf760a523788a5081976b3d5616f7d30ae", + "zh:992843002f2db5a11e626b3fc23dc0c87ad3729b3b3cff08e32ffb3df97edbde", + "zh:ad906f4cebd3ec5e43d5cd6dc8f4c5c9cc3b33d2243c89c5fc18f97f7277b51d", + "zh:c979425ddb256511137ecd093e23283234da0154b7fa8b21c2687182d9aea8b2", + ] +} + +provider "registry.terraform.io/josenk/esxi" { + version = "1.10.3" + hashes = [ + "h1:o78ERC8riDT2nHWCbXECt+S/RKwM98/G5ZojJHRm8fA=", + "zh:208a6a8092fa50d63fe1780447f2c4c3115b1987902a0c986452172c2c35677e", + "zh:3a0755aec960e32dbfbb31be61bba6ee2d11aff0513707e93f4eaebe3d557d93", + "zh:3daef19f36c9438771833dc15ae0eddc95faf9df00f9de9ab143bd031314ce50", + "zh:4cb4ba24aa3975f3928f5f16bc535ce0b18159ede16abaee39f93b3e13c36334", + "zh:56f30098aca0874210c4546530a5bfa5dd49bfad63950f3d9f3623cc6767280b", + "zh:716c62ae2d0cb7c64b5b3328792d7e135c4c0905e399e4b7335b7808508a7027", + "zh:81b0e8fab21088785e51f2d6af518ac31959b104facb2a25b0481d586a6fc692", + "zh:8b415ab7e39ca8e16f923bc73a8af418859faa594d97ed73e3a4aff7a736b08f", + "zh:9072bdd960ef85dc735b82423560b027ebb44790af1e84b122f1014f96acfc91", + "zh:9e6e1c2a7bf93c4705d280cea5b3d6bfb84c4540b92563e64fbc3a20155ef775", + "zh:af14c0e96273470dfb398b1701f575e5ea4963c208a32a4436db5ea0e2f2f385", + "zh:c79e772730ab4ac75c58d368f452c7a76abc738bb3666df0cfb567ac01e32c59", + "zh:d0068e7ca381d4b18df8b0219540733c996dfc69a89673b6bf52e4d69350c09a", + "zh:e188b20664bdcda50c45d071a8d0ba9870368941dac9138cd655f50db4ea15d2", + ] +} diff --git a/opdracht-1/README.md b/opdracht-1/README.md new file mode 100644 index 0000000..a54c5d3 --- /dev/null +++ b/opdracht-1/README.md @@ -0,0 +1,3 @@ +# IAC – Week 3 Assignment 1 + +This deploys a VM to Azure and adds the public IP address to the `inventory.ini`. \ No newline at end of file diff --git a/opdracht-1/ansible-inventory.tmpl b/opdracht-1/ansible-inventory.tmpl new file mode 100644 index 0000000..794cd6c --- /dev/null +++ b/opdracht-1/ansible-inventory.tmpl @@ -0,0 +1,2 @@ +[all] +vm ansible_host=${ip} diff --git a/opdracht-1/cloudinit-azure.yaml b/opdracht-1/cloudinit-azure.yaml new file mode 100644 index 0000000..cadf8a9 --- /dev/null +++ b/opdracht-1/cloudinit-azure.yaml @@ -0,0 +1,8 @@ +#cloud-config +local-hostname: vm-host-naam + +users: + - name: iac + ssh-authorized-keys: + - ${azure-ssh-key} + shell: /bin/bash \ No newline at end of file diff --git a/opdracht-1/main.tf b/opdracht-1/main.tf new file mode 100644 index 0000000..308dab3 --- /dev/null +++ b/opdracht-1/main.tf @@ -0,0 +1,118 @@ +variable "azure_private_key_path" { + default = "/home/student/.ssh/azure" +} + +data "local_file" "azure_private_key" { + filename = var.azure_private_key_path +} + +# Azure + +resource "azurerm_virtual_network" "main" { + name = "${var.prefix}-network" + address_space = ["10.0.0.0/16"] + location = var.azure_location + resource_group_name = var.azure_resourcegroup +} + +resource "azurerm_subnet" "main" { + name = "internal" + resource_group_name = var.azure_resourcegroup + virtual_network_name = azurerm_virtual_network.main.name + address_prefixes = ["10.0.2.0/24"] +} + +resource "azurerm_public_ip" "pip" { + name = "${var.prefix}-pip" + resource_group_name = var.azure_resourcegroup + location = var.azure_location + allocation_method = "Static" +} + +resource "azurerm_network_interface" "main" { + name = "${var.prefix}-nic" + location = var.azure_location + resource_group_name = var.azure_resourcegroup + + ip_configuration { + name = "internal" + subnet_id = azurerm_subnet.main.id + private_ip_address_allocation = "Dynamic" + public_ip_address_id = azurerm_public_ip.pip.id + } +} + +resource "azurerm_network_security_group" "main" { + name = "${var.prefix}-nsg" + location = var.azure_location + resource_group_name = var.azure_resourcegroup + security_rule { + access = "Allow" + direction = "Inbound" + name = "tls" + priority = 100 + protocol = "Tcp" + source_port_range = "*" + source_address_prefix = "*" + destination_port_range = "22" + destination_address_prefix = azurerm_network_interface.main.private_ip_address + } +} + +resource "azurerm_network_interface_security_group_association" "main" { + network_interface_id = azurerm_network_interface.main.id + network_security_group_id = azurerm_network_security_group.main.id +} + +# Render userdata template with skylab SSH key +data "template_file" "azure_cloudinit" { + template = file("${path.module}/cloudinit-azure.yaml") + vars = { + azure-ssh-key = trimspace(data.azurerm_ssh_public_key.azure.public_key) + } +} + +resource "azurerm_linux_virtual_machine" "main" { + name = "${var.prefix}-vm" + location = var.azure_location + resource_group_name = var.azure_resourcegroup + network_interface_ids = [ + azurerm_network_interface.main.id, + ] + size = "Standard_B2ats_v2" + + admin_username = "adminuser" + admin_ssh_key { + username = "adminuser" + public_key = data.azurerm_ssh_public_key.azure.public_key + } + + custom_data = base64encode(data.template_file.azure_cloudinit.rendered) + + os_disk { + caching = "ReadWrite" + storage_account_type = "Standard_LRS" + } + + source_image_reference { + publisher = "Canonical" + offer = "ubuntu-24_04-lts" + sku = "server" + version = "latest" + } +} + +locals { + inventory_content = templatefile("${path.module}/ansible-inventory.tmpl", { + ip = azurerm_linux_virtual_machine.main.public_ip_address }) +} + +resource "local_file" "ansible_inventory" { + content = local.inventory_content + filename = "${path.module}/inventory.ini" +} + + +output "ip_addresses" { + value = local_file.ansible_inventory.content +} diff --git a/opdracht-1/providers.tf b/opdracht-1/providers.tf new file mode 100644 index 0000000..5ccfaca --- /dev/null +++ b/opdracht-1/providers.tf @@ -0,0 +1,26 @@ +terraform { + required_providers { + esxi = { + source = "registry.terraform.io/josenk/esxi" + } + azurerm = { + source = "hashicorp/azurerm" + version = "~> 4.27.0" + } + } +} + +provider "esxi" { + esxi_hostname = var.esxi_hostname + esxi_hostport = var.esxi_hostport + esxi_hostssl = var.esxi_hostssl + esxi_username = var.esxi_username + esxi_password = var.esxi_password +} + + +provider "azurerm" { + resource_provider_registrations = "none" + subscription_id = var.azure_subscriptionid + features {} +} diff --git a/opdracht-1/secrets.auto.tfvars.example b/opdracht-1/secrets.auto.tfvars.example new file mode 100644 index 0000000..121f1e9 --- /dev/null +++ b/opdracht-1/secrets.auto.tfvars.example @@ -0,0 +1,5 @@ +esxi_hostname = "" +esxi_username = "" +esxi_password = "" +azure_subscriptionid = "" +azure_resourcegroup = "" \ No newline at end of file diff --git a/opdracht-1/variables.tf b/opdracht-1/variables.tf new file mode 100644 index 0000000..ac86407 --- /dev/null +++ b/opdracht-1/variables.tf @@ -0,0 +1,47 @@ +# variable "esxi_hostname" { +# description = "IP address of the ESXi host" +# } + +# variable "esxi_hostport" { +# description = "SSH port of the ESXi host" +# default = "22" +# } + +# variable "esxi_hostssl" { +# description = "SSL port of the ESXi host" +# default = "443" +# } + +# variable "esxi_username" { +# description = "Username to connect to the ESXi host" +# } + +# variable "esxi_password" { +# description = "Password to connect to the ESXi host" +# sensitive = true +# } + +variable "azure_subscriptionid" { + description = "ID of the Azure Subscription." + sensitive = true +} + +variable "azure_resourcegroup" { + description = "Name of the Azure Resource Group." +} + +variable "azure_location" { + description = "Location of the Azure resources" + default = "westeurope" +} + +variable "prefix" { + description = "The Prefix used for all resources" + default = "week-3-opdracht-1" +} + +# Pull the SSH public key from Azure Key Vault +data "azurerm_ssh_public_key" "azure" { + name = "azure" + resource_group_name = var.azure_resourcegroup +} diff --git a/opdracht-3/ansible-inventory.tmpl b/opdracht-3/ansible-inventory.tmpl new file mode 100644 index 0000000..ea10269 --- /dev/null +++ b/opdracht-3/ansible-inventory.tmpl @@ -0,0 +1,15 @@ +{ + "all": { + "hosts": [ +%{ for guest in webservers ~} + "${guest}", +%{ endfor ~} +%{ for guest in databaseservers ~} + "${guest}", +%{ endfor ~} + ], + "vars": { + "ansible_user": "ubuntu" + } + } +}