Closed AErmie closed 2 months ago
Part of these modifications will require updating the vWAN configuration, to include routing intents and routing policies, to force Internet traffic to/through the Firewall.
Successfully applied changes to the vWAN routing intent and routing policy, to force Internet traffic through the Azure Firewall.
Sample code has bee created (and tested) that successfully...
Sample code can be found in the /azure_firewall/
directory in thie azure-lz-core-forge repo.
[!NOTE] This code is not based on the Azure Verified Module, but is custom created.
Was able to update the existing Azure Policy and enable the Firewall Policy Analytics, using the azapi_update_resource
resource.
However, when re-running the Forge Plan workflow, it shows that it will remove/undo the policy analytics configurations.
This means that we need to figure out how to enable/control the Policy Analytics through the CAF deployment. In the CAF connectivity locals.tf file, there is a reference to azurerm_firewall_policy
but it is unclear how to properly configure this. It's position in the code implies it is part of the azure_firewall
block, but when testing this, it did not work. Additionally, there is an open GitHub Issue (Feature Request: Enable Policy Analytics on Firewall Policy), which provides a work-around (using the advanced
custom_settings
).
Successfully updated the CAF settings.connectivity.tf file, using and advanced
block, to enable Azure Firewall Policy Analytics through the CAF module.
Note the following important points discovered:
connectivity
is for the traditional hub-and-spoke, virtual_wan
is for the vWAN topology)var.primary_location
)/subscriptions/<SUB_ID>/resourceGroups/<RG_NAME>/providers/Microsoft.OperationalInsights/workspaces/,LAW_ID>
) versus just the nameterraform plan
output does not show the Log Analytics ID that was provided (which makes you think the configuration is not working correctly), but just shows that Insights will be enabledResource ID
obtained directly from the Portal, does not provide the correct syntax required!
resourceGroups
and Microsoft.OperationalInsights
sections (it provides them all in lowercase, where camelCase is required)
Currently, Azure Firewall is deployed and implemented using the Azure landing zones Terraform module.
We need to research and test what is and is not supported through the CAF Terraform module, in particular the Azure Firewall Policy. This should be tested by creating a Rule Collection, along with a sample DNAT Rule, Network Rule, and Application Rule.
Additionally, Firewall Policy Analytics should be enabled and configured to use an existing Log Analytics Workspace. Other Firewall configurations (ie. custom DNS, Threat Intelligence, TLS Inspection, IDPS, Web Categories, etc.) will be handled on-demand/as needed at a later point.
Include confirming what traffic is routed through the firewall.
Acceptance Criteria