-
Notifications
You must be signed in to change notification settings - Fork 449
The library Module usage
This section provides a guideline on how to use the CARML Bicep modules.
This section shows you how to deploy a Bicep template.
This sub-section gives you an example on how to deploy a template from your local drive.
This example targets a resource group level template.
New-AzResourceGroup -Name 'ExampleGroup' -Location "Central US"
$inputObject = @{
DeploymentName = 'ExampleDeployment'
ResourceGroupName = 'ExampleGroup'
TemplateFile = "$home\ResourceModules\arm\Microsoft.KeyVault\vault\deploy.bicep"
}
New-AzResourceGroupDeployment @inputObject
This example targets a resource group level template.
az group create --name 'ExampleGroup' --location "Central US"
$inputObject = @(
'--name', 'ExampleDeployment',
'--resource-group', 'ExampleGroup',
'--template-file', "$home\ResourceModules\arm\Microsoft.KeyVault\vault\deploy.bicep",
'--parameters', 'storageAccountType=Standard_GRS',
)
az deployment group create @inputObject
This section gives you an example on how to deploy a template that is stored at a publicly available remote location.
New-AzResourceGroup -Name 'ExampleGroup' -Location "Central US"
$inputObject = @{
DeploymentName = 'ExampleDeployment'
ResourceGroupName = 'ExampleGroup'
TemplateUri = 'https://raw.githubusercontent.com/Azure/ResourceModules/main/arm/Microsoft.KeyVault/vaults/deploy.bicep'
}
New-AzResourceGroupDeployment @inputObject
az group create --name 'ExampleGroup' --location "Central US"
$inputObject = @(
'--name', 'ExampleDeployment',
'--resource-group', 'ExampleGroup',
'--template-uri', 'https://raw.githubusercontent.com/Azure/ResourceModules/main/arm/Microsoft.KeyVault/vaults/deploy.bicep',
'--parameters', 'storageAccountType=Standard_GRS',
)
az deployment group create @inputObject
This section shows you how you can orchestrate a deployment using multiple resource modules
The template-orchestrated approach means using a main or so-called master template for deploying resources in Azure. The master template will only contain nested deployments, where the modules - instead of embedding their content into the master template - will be linked from the master template.
With this approach, modules need to be stored in an available location, where Azure Resource Manager (ARM) can access them. This can be achieved by storing the modules templates in an accessible location location like template specs or the Bicep registry.
In an enterprise environment, the recommended approach is to store these templates in a private environment, only accessible by enterprise resources. Thus, only trusted authorities can have access to these files.
The following example shows how you could orchestrate a deployment of multiple resources using modules from a private Bicep registry. In this example we will deploy a resource group with a contained NSG and use the same in a subsequent VNET deployment.
targetScope = 'subscription'
// ================ //
// Input Parameters //
// ================ //
// RG parameters
@description('Optional. The name of the resource group to deploy')
param resourceGroupName string = 'validation-rg'
@description('Optional. The location to deploy into')
param location string = deployment().location
// NSG parameters
@description('Optional. The name of the vnet to deploy')
param networkSecurityGroupName string = 'BicepRegistryDemoNsg'
// VNET parameters
@description('Optional. The name of the vnet to deploy')
param vnetName string = 'BicepRegistryDemoVnet'
@description('Optional. An Array of 1 or more IP Address Prefixes for the Virtual Network.')
param vNetAddressPrefixes array = [
'10.0.0.0/16'
]
@description('Optional. An Array of subnets to deploy to the Virual Network.')
param subnets array = [
{
name: 'PrimarySubnet'
addressPrefix: '10.0.0.0/24'
networkSecurityGroupName: networkSecurityGroupName
}
{
name: 'SecondarySubnet'
addressPrefix: '10.0.1.0/24'
networkSecurityGroupName: networkSecurityGroupName
}
]
// =========== //
// Deployments //
// =========== //
// Resource Group
module rg 'br/modules:microsoft.resources.resourcegroups:0.4.735' = {
name: 'registry-rg'
params: {
name: resourceGroupName
location: location
}
}
// Network Security Group
module nsg 'br/modules:microsoft.network.networksecuritygroups:0.4.735' = {
name: 'registry-nsg'
scope: resourceGroup(resourceGroupName)
params: {
name: networkSecurityGroupName
}
dependsOn: [
rg
]
}
// Virtual Network
module vnet 'br/modules:microsoft.network.virtualnetworks:0.4.735' = {
name: 'registry-vnet'
scope: resourceGroup(resourceGroupName)
params: {
name: vnetName
addressPrefixes: vNetAddressPrefixes
subnets: subnets
}
dependsOn: [
nsg
rg
]
}
The example assumes you are using a bicepconfig.json
configuration file like:
{
"moduleAliases": {
"br": {
"modules": {
"registry": "<registryName>.azurecr.io",
"modulePath": "bicep/modules"
}
}
}
}
The following example shows how you could orchestrate a deployment of multiple resources using template specs. In this example we will deploy a NSG and use the same in a subsequent VNET deployment.
targetScope = 'subscription'
// ================ //
// Input Parameters //
// ================ //
// RG parameters
@description('Optional. The name of the resource group to deploy')
param resourceGroupName string = 'validation-rg'
@description('Optional. The location to deploy into')
param location string = deployment().location
// Network Security Group parameters
@description('Optional. The name of the vnet to deploy')
param networkSecurityGroupName string = 'TemplateSpecDemoNsg'
// Virtual Network parameters
@description('Optional. The name of the vnet to deploy')
param vnetName string = 'TemplateSpecDemoVnet'
@description('Optional. An Array of 1 or more IP Address Prefixes for the Virtual Network.')
param vNetAddressPrefixes array = [
'10.0.0.0/16'
]
@description('Optional. An Array of subnets to deploy to the Virual Network.')
param subnets array = [
{
name: 'PrimarySubnet'
addressPrefix: '10.0.0.0/24'
networkSecurityGroupName: networkSecurityGroupName
}
{
name: 'SecondarySubnet'
addressPrefix: '10.0.1.0/24'
networkSecurityGroupName: networkSecurityGroupName
}
]
// =========== //
// Deployments //
// =========== //
// Resource Group
module rg 'ts/modules:microsoft.resources.resourcegroups:0.4.735' = {
name: 'rgDeployment'
params: {
name: resourceGroupName
location: location
}
}
// Network Security Group
module nsg 'ts/modules:microsoft.network.networksecuritygroups:0.4.735' = {
name: 'nsgDeployment'
scope: resourceGroup(resourceGroupName)
params: {
name: networkSecurityGroupName
}
dependsOn: [
rg
]
}
// Virtual Network
module vnet 'ts/modules:microsoft.network.virtualnetworks:0.4.735' = {
name: 'vnetDeployment'
scope: resourceGroup(resourceGroupName)
params: {
name: vnetName
addressPrefixes: vNetAddressPrefixes
subnets : subnets
}
dependsOn: [
rg
nsg
]
}
The example assumes you are using a bicepconfig.json
configuration file like:
{
"moduleAliases": {
"ts": {
"modules": {
"subscription": "<<subscriptionId>>",
"resourceGroup": "artifacts-rg"
}
}
}
}