You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Azure Networking Plugin integrates RightScale Self-Service with the basic functionality of the Azure Load Balancer, network interface and network peering.
Requirements
A general understanding CAT development and definitions
Refer to the guide documentation for details SS Guides
The admin, ss_designer & ss_end_user roles, in a RightScale account with SelfService enabled. admin is needed to retrieved the RightScale Credential values identified below.
Azure Service Principal (AKA Azure Active Directory Application) with the appropriate permissions to manage resources in the target subscription
The following RightScale Credentials
AZURE_APPLICATION_ID
AZURE_APPLICATION_KEY
The following packages are also required (See the Installation section for details):
Create RightScale Credentials with values that match the Application ID (Credential name: AZURE_APPLICATION_ID) & Authentication Key (Credential name: AZURE_APPLICATION_KEY)
In the Design section, use the Upload CAT interface to complete the following:
Upload each of packages listed in the Requirements Section
Upload the rs_azure_networking_plugin.rb file located in this repository
How to Use
The Azure Networking Plugin has been packaged as plugins/rs_azure_networking_plugin. In order to use this plugin you must import this plugin into a CAT.
import"plugins/rs_azure_networking_plugin"
For more information on using packages, please refer to the RightScale online documentation. Importing a Package
Azure Load Balancer, network interface and network peering resources can now be created by specifying a resource declaration with the desired fields. See the Supported Actions section for a full list of supported actions.
The resulting resource can be manipulated just like the native RightScale resources in RCL and CAT. See the Examples Section for more examples and complete CAT's.
Name of resource group in which to launch the Deployment
location
Yes
Datacenter to launch in
frontendIPConfigurations
No
Object representing the Frontend IPs to be used for the Load Balancer
backendAddressPools
No
Collection of Backend Address Pools used by this Load Balancer
loadBalancingRules
No
Object collection representing the Load Balancing Rules for this Load Balancer
probes
No
Collection of Probe objects used in the Load Balancer
inboundNatPools
No
Defines an external port range for Inbound Nat to a single backend port on NICs associated with this Load Balancer. Inbound Nat Rules are created automatically for each NIC associated with the Load Balancer using an external port from this range. Defining an Inbound Nat Pool on your Load Balancer is mutually exclusive with defining Inbound Nat Rules. Inbound Nat Pools are referenced from Virtual Machine Scale Sets. NICs that are associated with individual Virtual Machines cannot reference an Inbound Nat Pool. They have to reference individual Inbound Nat Rules.
inboundNatRules
No
Collection of Inbound Nat Rules used by this Load Balancer. Defining Inbound Nat Rules on your Load Balancer is mutually exclusive with defining an Inbound Nat Pool. Inbound Nat Pools are referenced from Virtual Machine Scale Sets. NICs that are associated with individual Virtual Machines cannot reference an Inbound Nat Pool. They have to reference individual Inbound Nat Rules.
Name of resource group in which the network resides
local_vnet
Yes
The VNET name of local peer
remote_vnet
Yes
The VNET name of remote peer
properties.allowVirtualNetworkAccess
No
Whether the VMs in the linked virtual network space would be able to access all the VMs in local Virtual network space. Defaults to true
properties.allowForwardedTraffic
No
Whether the forwarded traffic from the VMs in the remote virtual network will be allowed/disallowed. Defaults to false
properties.useRemoteGateways
No
If remote gateways can be used on this virtual network. If the flag is set to true, and allowGatewayTransit on remote peering is also true, virtual network will use gateways of remote virtual network for transit. Only one peering can have this flag set to true. This flag cannot be set if virtual network already has a gateway. Defaults to false
properties.allowGatewayTransit
No
If gateway links can be used in remote virtual networking to link to this virtual network. Defaults to false
The Azure Networking Plugin makes no attempt to support non-Azure resources. (i.e. Allow the passing the RightScale or other resources as arguments to an LB resource.)