Skip to content

rubrikinc/terraform-azure-polaris-cloud-native_subscription

Repository files navigation

Terraform Module - Azure Rubrik Cloud Native Subscription

This module adds an Azure subscription to Rubrik Security Cloud (RSC/Polaris) using an existing Azure tenant. It is designed to be used with the Terraform Module - Azure Rubrik Cloud Native Tenant module.

Prerequisites

There are a few services you'll need in order to get this project off the ground:

Usage

# Add a single subscription in a single region.

terraform {
  required_providers {
    azuread = {
      source  = "hashicorp/azuread"
    }
    polaris = {
      source  = "rubrikinc/polaris"
      version = "0.9.0-beta.1"
    } 
  }
}

# Configure the Azure Active Directory Provider
provider "azuread" {
  tenant_id = "abcdef01-2345-6789-abcd-ef0123456789"
}

# Initialize the Azure RM provider from the shell environment.
provider "azurerm" {
  skip_provider_registration = "true"
  features {}
  subscription_id = "01234567-99ab-cdef-0123-456789abcdef"
}

# Point the provider to the RSC service account to use.
provider "polaris" {
  credentials = "../.creds/customer-service-account.json"
} 

module "polaris-azure-cloud-native_tenant" {
  source                          = "rubrikinc/polaris-cloud-native_tenant/azure"
  
  azure_tenant_id                 = "abcdef01-2345-6789-abcd-ef0123456789"
  polaris_credentials             = "../.creds/customer-service-account.json"
}

module "polaris-azure-cloud-native_subscription" {
  source                              = "rubrikinc/polaris-cloud-native_subscription/azure"
  
  azure_service_principal_object_id   = module.polaris-azure-cloud-native_tenant.azure_service_principal_object_id
  azure_subscription_id               = "01234567-99ab-cdef-0123-456789abcdef"
  azure_resource_group_name           = "RubrikBackups-RG-DontDelete-terraform"
  azure_resource_group_region         = "westus"
  azure_resource_group_tags           = {
    "Environment" = "Test"
    "Owner"       = "Terraform" 
  }
  exocompute_details                  = {
    exocompute_config_1 = {
      region                    = "westus"
      subnet_name               = "subnet1"
      vnet_name                 = "vnet1"
      vnet_resource_group_name  = "vnet-rg"
    }
  }
  polaris_credentials                 = "../.creds/customer-service-account.json"
  regions_to_protect                  = ["westus"]
  rsc_azure_features                  = [
                                          "AZURE_SQL_DB_PROTECTION",
                                          "AZURE_SQL_MI_PROTECTION",
                                          "CLOUD_NATIVE_ARCHIVAL",
                                          "CLOUD_NATIVE_ARCHIVAL_ENCRYPTION",
                                          "CLOUD_NATIVE_PROTECTION",
                                          "EXOCOMPUTE"
                                        ]
  rsc_service_principal_tenant_domain = module.polaris-azure-cloud-native_tenant.rsc_service_principal_tenant_domain
}
# Add a multiple subscriptions in the same tenant with multiple regions for Exocompute.
# Using shared Exocompute 

terraform {
  required_providers {
    azuread = {
      source  = "hashicorp/azuread"
    }
    polaris = {
      source  = "rubrikinc/polaris"
      version = "0.9.0-beta.1"
    } 
  }
}

# Configure the Azure Active Directory Provider
provider "azuread" {
  tenant_id = "abcdef01-2345-6789-abcd-ef0123456789"
}

# Initialize the Azure RM provider from the shell environment.
provider "azurerm" {
  skip_provider_registration = "true"
  features {}
  subscription_id = "01234567-99ab-cdef-0123-456789abcdef"
}

# Point the provider to the RSC service account to use.
provider "polaris" {
  credentials = "../.creds/customer-service-account.json"
} 

module "polaris-azure-cloud-native_tenant" {
  source                          = "rubrikinc/polaris-cloud-native_tenant/azure"
  
  azure_tenant_id                 = "abcdef01-2345-6789-abcd-ef0123456789"
  polaris_credentials             = "../.creds/customer-service-account.json"
}

module "polaris-azure-cloud-native_subscription_1" {
  source  = "rubrikinc/polaris-cloud-native_subscription/azure"
  
  azure_service_principal_object_id   = module.polaris-azure-cloud-native_tenant.azure_service_principal_object_id
  azure_subscription_id               = "01234567-99ab-cdef-0123-456789abcdef"
  azure_resource_group_name           = "RubrikBackups-RG-DontDelete-terraform"
  azure_resource_group_region         = "westus"
  azure_resource_group_tags           = {
    "Environment" = "Test"
    "Owner"       = "Terraform" 
  }
  exocompute_details                  = {
    exocompute_config_1 = {
      region                    = "eastus"
      subnet_name               = "subnet1"
      vnet_name                 = "vnet1"
      vnet_resource_group_name  = "vnet-eastus-rg"
    }
    exocompute_config_2 = {
      region                    = "westus"
      subnet_name               = "subnet2"
      vnet_name                 = "vnet2"
      vnet_resource_group_name  = "vnet-westus-rg"
    }
    exocompute_config_3 = {
      region                    = "westus2"
      subnet_name               = "subnet3"
      vnet_name                 = "vnet3"
      vnet_resource_group_name  = "vnet-westus2-rg"
    }
  }
  polaris_credentials                 = "../.creds/customer-service-account.json"
  regions_to_protect                  = ["westus","westus2","eastus"]
  rsc_azure_features                  = [
                                          "CLOUD_NATIVE_ARCHIVAL",
                                          "CLOUD_NATIVE_ARCHIVAL_ENCRYPTION",
                                          "EXOCOMPUTE"
                                        ]
  rsc_service_principal_tenant_domain = module.polaris-azure-cloud-native_tenant.rsc_service_principal_tenant_domain
}

module "polaris-azure-cloud-native_subscription_2" {
  source                              = "rubrikinc/polaris-cloud-native_subscription/azure"
  
  azure_service_principal_object_id   = module.polaris-azure-cloud-native_tenant.azure_service_principal_object_id
  azure_subscription_id               = "01234567-99ab-cdef-fedc-ba987654"
  azure_resource_group_name           = "RubrikBackups-RG-DontDelete-terraform"
  azure_resource_group_region         = "westus"
  azure_resource_group_tags           = {
    "Environment" = "Test"
    "Owner"       = "Terraform" 
  }
  polaris_credentials                 = "../.creds/customer-service-account.json"
  regions_to_protect                  = ["westus","eastus"]
  rsc_azure_features                  = [
                                          "CLOUD_NATIVE_PROTECTION",
                                          "AZURE_SQL_DB_PROTECTION",
                                          "AZURE_SQL_MI_PROTECTION",
                                          "EXOCOMPUTE"
                                        ]
  rsc_service_principal_tenant_domain = module.polaris-azure-cloud-native_tenant.rsc_service_principal_tenant_domain
}

resource "polaris_azure_exocompute" "subscription_2" {
  cloud_account_id      = module.polaris-azure-cloud-native_subscription_2.polaris_azure_subscription_id
  host_cloud_account_id = module.polaris-azure-cloud-native_subscription_1.polaris_azure_subscription_id
}

Requirements

Name Version
polaris =0.9.0-beta.3

Providers

Name Version
azurerm n/a
polaris =0.9.0-beta.3

Resources

Name Type
azurerm_resource_group.default resource
azurerm_role_assignment.resource_group resource
azurerm_role_assignment.subscription resource
azurerm_role_definition.resource_group resource
azurerm_role_definition.subscription resource
azurerm_user_assigned_identity.default resource
polaris_azure_exocompute.polaris resource
polaris_azure_subscription.default resource
azurerm_subnet.polaris data source
azurerm_subscription.current data source
polaris_azure_permissions.default data source

Modules

No modules.

Inputs

Name Description Type Default Required
azure_resource_group_name Name of the Azure resource group to store snapshots and Exocompute artifacts. string "Rubrik-Backups-RG-Do-Not-Delete" no
azure_resource_group_region Region of the Azure resource group to store snapshots and Exocompute artifacts. string n/a yes
azure_resource_group_tags Tags to apply to the Azure resource group to store snapshots and Exocompute artifacts. map(string) {} no
azure_service_principal_object_id Azure service principal object id. string n/a yes
azure_subscription_id Azure subscription id. string n/a yes
delete_snapshots_on_destroy Should snapshots be deleted when the resource is destroyed. bool false no
exocompute_details Region and subnet pair to run Exocompute in.
map(object({
region = string
pod_overlay_network_cidr = string
subnet_name = string
vnet_name = string
vnet_resource_group_name = string
}))
{} no
polaris_credentials Full path to credentials file for RSC/Polaris. string n/a yes
regions_to_protect List of regions to protect. list(string) n/a yes
rsc_azure_features List of Azure features to enable. list(string) n/a yes
rsc_service_principal_tenant_domain Tenant domain of the Service Principal created in RSC. string n/a yes

Outputs

Name Description
polaris_azure_subscription_id n/a

Login to Azure

Before running Terraform using the azurerm_* or azapi_* data sources and resources, an authentication with Azure is required. Terraform Module for AzureRM CLI Authentication provides a complete guide on how to authenticate Terraform with Azure. The following commands can be used from a command line interface with the Microsoft Azure CLI to manually run Terraform:

az login --tenant <tenant_id>

Where <tenant_id> is the ID of the tenant to login to. If you only have one tenant you can remove the --tenant option.

Next before running this module, the subscription must be selected. Do this by running the command:

az account set --subscription <subscription_id>

Where <subscription_id> is the ID of the subscription where CCES will be deployed.

Initialize the Directory

The directory can be initialized for Terraform use by running the terraform init command:

-> terraform init                                                                                                 

Initializing the backend...

Initializing provider plugins...
- terraform.io/builtin/terraform is built in to Terraform
- Finding latest version of hashicorp/azurerm...
- Finding latest version of rubrikinc/polaris...
- Installing hashicorp/azurerm v3.76.0...
- Installed hashicorp/azurerm v3.76.0 (signed by HashiCorp)
- Installing rubrikinc/polaris v0.7.2...
- Installed rubrikinc/polaris v0.7.2 (signed by a HashiCorp partner, key ID 6B41B7EAD9DB76FB)

Partner and community providers are signed by their developers.
If you'd like to know more about provider signing, you can read about it here:
https://www.terraform.io/docs/cli/plugins/signing.html

Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.

Terraform has been successfully initialized!

You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.

Planning

Run terraform plan to get information about what will happen when we apply the configuration; this will test that everything is set up correctly.

Applying

We can now apply the configuration to add the Azure subscription to RSC using the terraform apply command.

Destroying

Once the subscription no longer needs protection, it can be removed from RSC using the terraform destroy command, and entering yes when prompted.

Tips

Exocompute Details from the Command Line

To specify exocompute_details as an environment variable use something like this:

export TF_VAR_exocompute_details='{"exocompute_config_1":"{"region":"westus","subnet_name":"subnet1","vnet_name":"vnet1","vnet_resource_group_name":vnet_rg"}}

Removing the last subscription from RSC for a tenant.

If you remove the last subscription from RSC for a tenant, the tenant will also be removed from RSC. To add another subscription for the tenant, the tenant will have to be added back again.

Troubleshooting:

Missing Tenant

You may receive the following error when applying the Terraform plan:

╷
│ Error: failed to add subscription: failed to request addAzureCloudAccountWithoutOauth: graphql response body is an error (status code 200): NOT_FOUND: Failed to get service principal in the tenant. Azure may take some time to sync service principal. Please try after a minute (Azure error: [Unknown] Unknown service error) (code: 404, traceId: T908tqj5/shh8TMK9rX2lA==)
│ 
│   with polaris_azure_subscription.polaris,
│   on main.tf line 84, in resource "polaris_azure_subscription" "polaris":
│   84: resource "polaris_azure_subscription" "polaris" {
│ 

If this happens, it's likely due to the last subscription in a tenant being removed from RSC, but the terraform.tfstate file remains from the Terraform Module - Azure Rubrik Cloud Native Tenant module. In this case when the last subscription was removed from RSC, the tenant was automatically removed by RSC. To solve this, re-run the Terraform Module - Azure Rubrik Cloud Native Tenant module to create a new service principal.

How You Can Help

We glady welcome contributions from the community. From updating the documentation to adding more functionality, all ideas are welcome. Thank you in advance for all of your issues, pull requests, and comments!

Developers

This README.md was created with terraform-docs. To update any of the auto generated parameters between the <!-- BEGIN_TF_DOCS --> and <!-- END_TF_DOCS --> lines first modify the .terraform-docs.yml file, if needed. Then run gen_docs.sh in this modules directory. For any documentation that needs to be modified outside of the <!-- BEGIN_TF_DOCS --> and <!-- END_TF_DOCS --> lines, modify this README.md file directly.

License