HashiCorp Terraform Provider for Azure Stack
Most enterprises are looking to leverage the capabilities of a public cloud environment, but often have strict data security or regulatory requirements that prevent them from fully transitioning away from on-premises data centers. To help with this concern, Microsoft introduced Azure Stack. Azure Stack is an extension of Azure Cloud, aimed at providing the benefits of Azure’s cloud computing capabilities via on-premises environments without raising some of the security concerns of the cloud. Organizations opting to use Azure Stack as part of a hybrid cloud environment, can now provision and manage infrastructure using HashiCorp Terraform through a new, dedicated provider. Below we’ll cover some of the changes that are required for using the new Azure Stack provider for Terraform and discuss some of the resources that are now available.
» Creating a Service Principal
In order to use the Azure Stack provider, operators must first create a Service Principal through the Azure (Public) Portal. Currently, this is the only way for the provider to authenticate to Azure Stack. There are two tasks that users must complete. The first is to create an Application in the Azure Active Directory. The second is to grant that Application access to manage resources for the Azure Subscription that will be used. Once the Service Principal has been created, it can either be added as an environmental variable or as part of the provider resource block within your Terraform configuration. For more detailed instructions on how to create this Service Principal, please consult the Terraform docs.
» Resources Available
Similar to the Azure Provider for Terraform, the new Azure Stack Provider calls APIs from the Azure Resource Manager library. There are currently about 20 resources available for configuration. Resources are available from the following categories:
- Data Sources
- Base
- Compute
- DNS
- Network
- Storage
To see an example configuration of these resources, please visit the Azure Stack provider docs.
For more information on Terraform, please visit: https://www.hashicorp.com/terraform.
Sign up for the latest HashiCorp news
More blog posts like this one
![Terraform extension for VS Code speeds up loading of large workspaces](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714155806-blog-library-product-terraform-dark-gradient.jpg&w=3840&q=75)
Terraform extension for VS Code speeds up loading of large workspaces
New releases of the HashiCorp Terraform extension for Visual Studio Code and Terraform language server significantly reduce memory usage and start up time for large workspaces.
![Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1572286031-vault-terraform-background.png&w=1920&q=75)
Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?
Learn how HCP Terraform and Terraform Enterprise users can use Vault-backed dynamic credentials to secure their infrastructure during provisioning better than the base-level dynamic provider credentials.
![HCP Terraform adds granular API access for audit trails](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714170900-blog-library-product-hcp-terraform-dark.jpg&w=3840&q=75)
HCP Terraform adds granular API access for audit trails
HCP Terraform eliminates the need to rely on organization permissions to the audit trails endpoint, streamlining permissions workflows and reducing risk.