Azure CLI (az) Deployment
Details how to deploy a Trustgrid appliance and related resources using the Azure CLI (az) commands.
7 minute read
Requirement | Description |
---|---|
Disk Size | At least 30 GB |
Interfaces |
|
CPU & RAM | See Instance Type below for recommendations |
Trustgrid has validated using the B-series burstable - Azure Virtual Machines instance type.
VPN throughput is tied to CPU the recommended size depends on roles, expected throughput.
One WAN interface with a public IP and one LAN interface on a private subnet. The nodes will need to be able to route to all required hosts/applications that need to communicate across the Trustgrid virtual network.
The LAN interface needs to have IP Forwarding Enabled in order to forward the traffic across the tunnel.
See Azure virtual network traffic routing.
The Trustgrid official community image, trustgrid-node-2204-prod
, in the public gallery trustgrid-45680719-9aa7-43b9-a376-dc03bcfdb0ac
is currently published in the following region. If you need to deploy in another region please contact Trustgrid support. If you are not a direct customer of Trustgrid, please check with your vendor that is utilizing Trustgrid to have them contact support.
Region Display Name | Region Name |
---|---|
East US | eastus |
Central US | centralus |
North Central US | northcentralus |
South Central US | southcentralus |
West US | westus |
For gateways:
For edge nodes:
For all clustered nodes:
An Azure routing table resource needs to be associated with the LAN interface’s subnet.
Copy this sample json file for use in creating a custom role with the required permissions. See process below.
The assignableScopes section will need to be modified to represent the resource information of the target Azure account.
{
"properties": {
"roleName": "tg-route-table",
"description": "manage azure route table",
"assignableScopes": [
],
"permissions": [
{
"actions": [
"Microsoft.Network/networkWatchers/nextHop/action",
"Microsoft.Network/networkInterfaces/effectiveRouteTable/action",
"Microsoft.Network/routeTables/routes/delete",
"Microsoft.Network/routeTables/routes/write",
"Microsoft.Network/routeTables/routes/read",
"Microsoft.Network/routeTables/join/action",
"Microsoft.Network/routeTables/delete",
"Microsoft.Network/routeTables/write",
"Microsoft.Network/routeTables/read",
"Microsoft.Network/networkInterfaces/read",
"Microsoft.Network/virtualNetworks/read",
"Microsoft.Compute/virtualMachines/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}
In the Azure portal search for “Subscriptions” and select the Subscriptions service
Select the subscription that contains the Trustgrid VMs
Select “Access control (IAM),” then click “+Add”, then “Add custom role”
Save the JSON above to a file named azure-custom-role-sample.json
.
Select “Start from JSON” and from the file selector, select the downloaded json file.
Optionally, update the role name to meet your internal naming conventions.
Click Next
.
On the Permissions page you will see the permissions that will be granted. Click Next
again.
On the Assignable Scopes page click +Add Assignable Scope
From the Type select Resource Group
From the Subscription, select the subscription your VMs and virtual networks are in.
From the Select pane on the right search for and select the Resource Group containing you VM’s
Click Select
and then Next
.
On the JSON page, click the Next
button.
Click Review + Create, then click Create.
Assign the custom role to your Trustgrid VM’s system-assigned
In the Azure portal search for Resource Groups and select the service
Select your target Resource Group
Select the Access Control (IAM) panel, then click +Add, then “Add role assignment”
Search for and select the desired role and click Next
Under “Assign access to” select “Managed Identity” then click +Select members
From the Managed Identity dropdown select Virtual Machine
Select the identity for your first Trustgrid VM
Click select.
Click +Select members again and repeat with your second Trustgrid VM
Click “Review + Assign” then “Review + Assign” a second time
These permissions can take some time to go into effect.
One of more Virtual Machines will need to be deployed into the target Azure subscription to act as the Trustgrid nodes using the official community image. Then the remote registration process can be used to activate the nodes in the Trustgrid portal.
If the Site Tech is not part of the organization that is a Trustgrid’s direct customer, Trustgrid’s professional service team will need documented approval from that customer before proceeding with assisting in the deployment.
Documentation Coming Soon for…
Details how to deploy a Trustgrid appliance and related resources using the Azure CLI (az) commands.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.