This issue is a test case for landing zone starter deployment.
This issue is for a: (mark with an x)
- [ ] bug report -> please search issues before submitting
- [X] test case
- [ ] feature request
- [ ] documentation issue or request
- [ ] regression (a behavior that used to work and stopped in a new release)
Test steps
(Optionally) Create a branch (or Fork) for testing
Clone repository to your local computer (or into a Codespace)
Landing Zone RGs in separate subscriptions - assumes location is eastus (eus)
a. anoa-eus-alerting-dev-rg
b. anoa-eus-devsecops-dev-rg
c. anoa-eus-hub-core-dev-rg
d. anoa-eus-id-dev-rg
e. anoa-eus-ops-dev-rg
f. anoa-eus-ops-mgt-logging-dev-rg
Check for AZ firewall at premium level in anoa-eus-hub-core-dev-rg
Check if there is a Log Analytics workspace in anoa-eus-ops-mgt-logging-dev-rg
Check if there is a Activity log alert rule in the anoa-eus-alerting-dev-rg
Check if there is a vnet, subnet and nsg in all the resource groups
Check if Force Tunneling is in each management spoke resource groups
This issue is a test case for landing zone starter deployment.
This issue is for a: (mark with an
x
)Test steps
(Optionally) Create a branch (or Fork) for testing
Clone repository to your local computer (or into a Codespace)
cd <cloned-dir>/infrastructure/terraform
cp ../../tfvars/parameters.tfvars .
Select the location for deployment.
eastus
terraform version
(should be version >= 1.4.6)Authenticate Terraform with Azure
terraform init
terraform plan -out test.plan
terraform apply -f test.plan
Local Terraform State -
terraform.tfstate
Landing Zone RGs in separate subscriptions - assumes location is eastus (eus) a. anoa-eus-alerting-dev-rg b. anoa-eus-devsecops-dev-rg c. anoa-eus-hub-core-dev-rg d. anoa-eus-id-dev-rg e. anoa-eus-ops-dev-rg f. anoa-eus-ops-mgt-logging-dev-rg
Check for AZ firewall at premium level in
anoa-eus-hub-core-dev-rg
Check if there is a Log Analytics workspace in
anoa-eus-ops-mgt-logging-dev-rg
Check if there is a Activity log alert rule in the
anoa-eus-alerting-dev-rg
Check if there is a vnet, subnet and nsg in all the resource groups
Check if
Force Tunneling
is in each management spoke resource groupsOther helpful details