This scenario deploys the networking hub across multiple regions
The networking landing zone allows you to deploy most networking topologies on Microsoft Azure. The same landing zone used with different parameters should allow you to deploy most network configurations.
- Hub and spoke
- Virtual WAN
- Application DMZ scenario
- Any custom network topology based on virtual networks or virtual WAN
- Library of network security groups definition
Networking landing zone operates at level 2.
For a review of the hierarchy approach of Cloud Adoption Framework for Azure landing zones on Terraform, you can refer to the following documentation.
This example allows you to deploy the following topology:
Component | Type of resource | Purpose |
---|---|---|
vnet-hub-re1, vnet-hub-re2 | Resource group | resource group to host the virtual network |
vnet_hub_re1, vnet-hub-re2 | Virtual network | virtual network used as a hub |
GatewaySubnet,AzureFirewallSubnet,AzureBastionSubnet, jumpbox, private_endpoints | Virtual Subnets | virtual subnets |
azure_bastion_nsg, empty_nsg, application_gateway, api_management, jumpbox | Network security groups | network security groups that can be attached to virtual subnets. |
hub_re1_TO_hub_re2, and hub_re2_TO_hub_re1 | Virtual network peering | Peering between vnet_hub_re1 and vnet-hub-re2 |
bastion-re1-pip1, bastion-re2-pip1 | Public IP address | Public IP address to be used in vnet_hub_re1 and vnet-hub-re2, to be used by Azure Bastion |
bastion-re1, bastion-re2 | Azure Bastion | Azure Bastion host in order to access the virtual network. |
Please review the configuration files and make sure you are deploying in the expected region and with the expected settings.
Once you have picked a scenario for test, you can deploy it using:
rover -lz /tf/caf/landingzones/caf_networking \
-level level2 \
-var-folder /tf/caf/landingzones/caf_networking/scenario/101-multi-region-hub \
-a apply