@@ -62,7 +62,7 @@ resource "azurerm_virtual_network" "myterraformnetwork" {
62
62
name = "myVnet"
63
63
address_space = ["10.0.0.0/16"]
64
64
location = "eastus"
65
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
65
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
66
66
67
67
tags = {
68
68
environment = "Terraform Demo"
@@ -75,8 +75,8 @@ The following section creates a subnet named *mySubnet* in the *myVnet* virtual
75
75
``` hcl
76
76
resource "azurerm_subnet" "myterraformsubnet" {
77
77
name = "mySubnet"
78
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
79
- virtual_network_name = "${ azurerm_virtual_network.myterraformnetwork.name}"
78
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
79
+ virtual_network_name = azurerm_virtual_network.myterraformnetwork.name
80
80
address_prefix = "10.0.2.0/24"
81
81
}
82
82
```
@@ -89,7 +89,7 @@ To access resources across the Internet, create and assign a public IP address t
89
89
resource "azurerm_public_ip" "myterraformpublicip" {
90
90
name = "myPublicIP"
91
91
location = "eastus"
92
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
92
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
93
93
allocation_method = "Dynamic"
94
94
95
95
tags = {
@@ -106,7 +106,7 @@ Network Security Groups control the flow of network traffic in and out of your V
106
106
resource "azurerm_network_security_group" "myterraformnsg" {
107
107
name = "myNetworkSecurityGroup"
108
108
location = "eastus"
109
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
109
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
110
110
111
111
security_rule {
112
112
name = "SSH"
@@ -132,10 +132,10 @@ A virtual network interface card (NIC) connects your VM to a given virtual netwo
132
132
133
133
``` hcl
134
134
resource "azurerm_network_interface" "myterraformnic" {
135
- name = "myNIC"
136
- location = "eastus"
137
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
138
- network_security_group_id = "${ azurerm_network_security_group.myterraformnsg.id}"
135
+ name = "myNIC"
136
+ location = "eastus"
137
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
138
+ network_security_group_id = azurerm_network_security_group.myterraformnsg.id
139
139
140
140
ip_configuration {
141
141
name = "myNicConfiguration"
@@ -158,7 +158,7 @@ To store boot diagnostics for a VM, you need a storage account. These boot diagn
158
158
resource "random_id" "randomId" {
159
159
keepers = {
160
160
# Generate a new ID only when a new resource group is defined
161
- resource_group = "${ azurerm_resource_group.myterraformgroup.name}"
161
+ resource_group = azurerm_resource_group.myterraformgroup.name
162
162
}
163
163
164
164
byte_length = 8
@@ -169,11 +169,11 @@ Now you can create a storage account. The following section creates a storage ac
169
169
170
170
``` hcl
171
171
resource "azurerm_storage_account" "mystorageaccount" {
172
- name = "diag${random_id.randomId.hex}"
173
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
174
- location = "eastus"
175
- account_replication_type = "LRS"
176
- account_tier = "Standard"
172
+ name = "diag${random_id.randomId.hex}"
173
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
174
+ location = "eastus"
175
+ account_replication_type = "LRS"
176
+ account_tier = "Standard"
177
177
178
178
tags = {
179
179
environment = "Terraform Demo"
@@ -192,8 +192,8 @@ The final step is to create a VM and use all the resources created. The followin
192
192
resource "azurerm_virtual_machine" "myterraformvm" {
193
193
name = "myVM"
194
194
location = "eastus"
195
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
196
- network_interface_ids = ["${ azurerm_network_interface.myterraformnic.id}" ]
195
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
196
+ network_interface_ids = [azurerm_network_interface.myterraformnic.id]
197
197
vm_size = "Standard_DS1_v2"
198
198
199
199
storage_os_disk {
@@ -225,7 +225,7 @@ resource "azurerm_virtual_machine" "myterraformvm" {
225
225
226
226
boot_diagnostics {
227
227
enabled = "true"
228
- storage_uri = "${ azurerm_storage_account.mystorageaccount.primary_blob_endpoint}"
228
+ storage_uri = azurerm_storage_account.mystorageaccount.primary_blob_endpoint
229
229
}
230
230
231
231
tags = {
@@ -262,7 +262,7 @@ resource "azurerm_virtual_network" "myterraformnetwork" {
262
262
name = "myVnet"
263
263
address_space = ["10.0.0.0/16"]
264
264
location = "eastus"
265
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
265
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
266
266
267
267
tags = {
268
268
environment = "Terraform Demo"
@@ -272,16 +272,16 @@ resource "azurerm_virtual_network" "myterraformnetwork" {
272
272
# Create subnet
273
273
resource "azurerm_subnet" "myterraformsubnet" {
274
274
name = "mySubnet"
275
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
276
- virtual_network_name = "${ azurerm_virtual_network.myterraformnetwork.name}"
275
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
276
+ virtual_network_name = azurerm_virtual_network.myterraformnetwork.name
277
277
address_prefix = "10.0.1.0/24"
278
278
}
279
279
280
280
# Create public IPs
281
281
resource "azurerm_public_ip" "myterraformpublicip" {
282
282
name = "myPublicIP"
283
283
location = "eastus"
284
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
284
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
285
285
allocation_method = "Dynamic"
286
286
287
287
tags = {
@@ -293,7 +293,7 @@ resource "azurerm_public_ip" "myterraformpublicip" {
293
293
resource "azurerm_network_security_group" "myterraformnsg" {
294
294
name = "myNetworkSecurityGroup"
295
295
location = "eastus"
296
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
296
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
297
297
298
298
security_rule {
299
299
name = "SSH"
@@ -316,14 +316,14 @@ resource "azurerm_network_security_group" "myterraformnsg" {
316
316
resource "azurerm_network_interface" "myterraformnic" {
317
317
name = "myNIC"
318
318
location = "eastus"
319
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
320
- network_security_group_id = "${ azurerm_network_security_group.myterraformnsg.id}"
319
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
320
+ network_security_group_id = azurerm_network_security_group.myterraformnsg.id
321
321
322
322
ip_configuration {
323
323
name = "myNicConfiguration"
324
- subnet_id = "${ azurerm_subnet.myterraformsubnet.id}"
324
+ subnet_id = azurerm_subnet.myterraformsubnet.id
325
325
private_ip_address_allocation = "Dynamic"
326
- public_ip_address_id = "${ azurerm_public_ip.myterraformpublicip.id}"
326
+ public_ip_address_id = azurerm_public_ip.myterraformpublicip.id
327
327
}
328
328
329
329
tags = {
@@ -335,7 +335,7 @@ resource "azurerm_network_interface" "myterraformnic" {
335
335
resource "random_id" "randomId" {
336
336
keepers = {
337
337
# Generate a new ID only when a new resource group is defined
338
- resource_group = "${ azurerm_resource_group.myterraformgroup.name}"
338
+ resource_group = azurerm_resource_group.myterraformgroup.name
339
339
}
340
340
341
341
byte_length = 8
@@ -344,7 +344,7 @@ resource "random_id" "randomId" {
344
344
# Create storage account for boot diagnostics
345
345
resource "azurerm_storage_account" "mystorageaccount" {
346
346
name = "diag${random_id.randomId.hex}"
347
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
347
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
348
348
location = "eastus"
349
349
account_tier = "Standard"
350
350
account_replication_type = "LRS"
@@ -358,8 +358,8 @@ resource "azurerm_storage_account" "mystorageaccount" {
358
358
resource "azurerm_virtual_machine" "myterraformvm" {
359
359
name = "myVM"
360
360
location = "eastus"
361
- resource_group_name = "${ azurerm_resource_group.myterraformgroup.name}"
362
- network_interface_ids = ["${ azurerm_network_interface.myterraformnic.id}" ]
361
+ resource_group_name = azurerm_resource_group.myterraformgroup.name
362
+ network_interface_ids = [azurerm_network_interface.myterraformnic.id]
363
363
vm_size = "Standard_DS1_v2"
364
364
365
365
storage_os_disk {
@@ -391,7 +391,7 @@ resource "azurerm_virtual_machine" "myterraformvm" {
391
391
392
392
boot_diagnostics {
393
393
enabled = "true"
394
- storage_uri = "${ azurerm_storage_account.mystorageaccount.primary_blob_endpoint}"
394
+ storage_uri = azurerm_storage_account.mystorageaccount.primary_blob_endpoint
395
395
}
396
396
397
397
tags = {
0 commit comments