Cloud Partner

Microsoft Azure

HashiCorp and Microsoft are longstanding partners in the cloud infrastructure community. In 2017, Microsoft committed to a multi-year partnership aimed at further integrating Azure services with HashiCorp products. As a result of this collaboration, organizations can rely on tools like Terraform to create and manage Azure infrastructure. The tight integration and support for Azure allows operators to easily deploy resources on Azure using Terraform and secure them via Vault. Additionally, Microsoft utilizes HashiCorp tools for internal use. Packer is trusted for the creation of new Linux images for Azure services. This collaboration enables Microsoft and HashiCorp to create new and innovative ways for their products to integrate further, easing the cloud adoption journey for enterprise organizations.

Website


Integration

How Microsoft Azure works with HashiCorp Product Suite

» Provision Infrastructure

Operators moving into the cloud face three unique challenges: addressing infrastructure heterogeneity, managing scale, and enabling self service consumption across organizations. To address these challenges for users adopting Azure, HashiCorp offers a dedicated Terraform provider for the purpose of provisioning and managing Azure cloud-based services. Users can write configurations using infrastructure as code, check them into version control, version them, and run a few commands to test and apply changes to their Azure infrastructure.

Terraform Integrations for Azure:
Terraform Provider
Azure Modules
Terraform Provider for Azure Stack
Setting Up Azure AKS

Additional Resources:
HashiCorp Terraform on Azure
Microsoft Terraform Hub
Expanding the HashiCorp Partnership

Get Started with Terraform Read Documentation

» Secure Secrets

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, encryption keys for secrets and other sensitive data using a UI, CLI, and HTTP API. For Azure users, Vault offers a dedicated Auth Method for Azure Active Directory, an Azure Secrets Engine, and an Azure Key Vault seal.

Vault Integrations for Azure
Vault Auth Method
Vault Secrets Engine
Vault Cloud Auto-unseal

Additional Resources
HashiCorp Vault speaks Azure Active Directory
How to identify and eliminate secrets sprawl on Azure with HashiCorp Vault

Get Started with Vault Read Documentation

» Run Applications

Nomad is a flexible, enterprise-grade cluster scheduler that can run a diverse workload of micro-service, batch, containerized and non-containerized applications. Nomad's lightweight architecture and zero external dependencies minimize operational overhead in any on-prem or public cloud environment. Nomad Enterprise adds collaboration and governance capabilities, allowing organizations to run Nomad in a multi-team setting and meet governance and policy requirements. Users on Azure are able to run Docker-based or legacy, non-containerized workloads on both Linux and Windows using a common workflow.

Get Started with Nomad Read Documentation

» Connect Applications

Consul is a service mesh offering for discovering, securing, and configuring services across your infrastructure. Consul clusters allow agents to talk across data centers to provide health monitoring, K/V storage, and a variety of other services. To create these clusters, Consul relies on the creation of agents that assume either a server or client role and join an existing cluster upon startup. To help prevent failures in cluster formation, Consul users utilizes the command "retry-join" provisioned for Azure. This instructs agents to join the first private IP of a server with a given tag and key value and authorized via a secret key.

Consul Integrations for Azure:
Auto Retry for Azure
Modern Service Discovery with Consul on Azure: Part 1
Modern Service Discovery with Consul on Azure: Part 2
Building cloud-native applications with Azure and HashiCorp

Get Started with Consul Read Documentation

Resources