为 Azure 资源添加标签
在以下指南中,您将在 Port 中创建一个自助操作,执行GitHub workflow ,为storage account 添加标记。
先决条件
- 本指南假定你已经拥有一个 Azure 存储账户的蓝图和一些资源。如果尚未创建蓝图,请首先参考本guide 。
- 事先了解 Port Actions 对于学习本指南至关重要。了解有关它们的更多信息here 。
- 一个 GitHub 仓库,其中包含您的操作资源,即 github 工作流文件。
示例--为存储账户添加标签
请按照以下步骤开始操作:
- 创建以下 GitHub Action secrets:
1.创建以下 Port 凭据:
PORT_CLIENT_ID
- Port客户端 IDlearn more 。PORT_CLIENT_SECRET
- Port客户端secretlearn more. 2.创建以下 Azure 云凭证: 提示 按照此guide 创建服务 principal,以便获取 Azure 凭据。 :::ARM_CLIENT_ID
- 应用程序的 Azure 客户 ID(APP ID)。ARM_CLIENT_SECRET
- 应用程序的 Azure 客户端secret(密码)。ARM_SUBSCRIPTION_ID
- 应用程序的 Azure 订阅 ID。ARM_TENANT_ID
- AzureTenant ID 。
- Install Port's GitHub app by clicking here.
3.在self-service page 或使用以下 JSON 定义创建 Port 操作:
Port Action: Add Tags to Azure Storage
tip
<GITHUB-ORG>
- your GitHub organization or user name.<GITHUB-REPO-NAME>
- your GitHub repository name.
{
"identifier": "add_tags_to_azure_storage",
"title": "Add Tags to Azure Storage",
"icon": "Azure",
"userInputs": {
"properties": {
"tags": {
"title": "Tags",
"type": "object"
}
},
"required": [
"tags"
],
"order": []
},
"invocationMethod": {
"type": "GITHUB",
"org": "<GITHUB-ORG>",
"repo": "<GITHUB-REPO-NAME>",
"workflow": "tag-azure-resource.yml",
"omitUserInputs": false,
"omitPayload": false,
"reportWorkflowStatus": true
},
"trigger": "DAY-2",
"description": "Add tags to azure storage acount",
"requiredApproval": false
}
- Terraform
- Azure CLI
- Update the following Terraform templates in the
terraform
folder at the root of your GitHub repository:tipFork our example repository to get started.
1. `main.tf` - Include a tags field within the configuration of the storage account resource.
2. `variables.tf` – Introduce a new variable named `resource_tags`.
main.tf
main.tf
...
resource "azurerm_storage_account" "storage_account" {
name = var.storage_account_name
resource_group_name = var.resource_group_name
location = var.location
account_tier = "Standard"
account_replication_type = "LRS"
account_kind = "StorageV2"
tags = var.resource_tags
}
...
variables.tf
variables.tf
// ...
variable "resource_tags" {
type = map(string)
default = {
Environment = "Production"
}
}
// ...
- Create a workflow file under
.github/workflows/tag-azure-resource.yml
with the following content:
GitHub workflow script
note
Replace the following variables for the terraform init
step:
RESOURCE_GROUP_NAME
with a resource group from your Azure account. Check this guide to find your resource groups.STORAGE_ACCOUNT_NAME
: The storage account containing.TF_STATE_CONTAINER
: The name of the container used for storing the Terraform state files.TF_STATE_KEY
: Indicate the key that uniquely identifies the configuration file.
tag-azure-resource.yml
name: "Tag Azure Resource"
on:
workflow_dispatch:
inputs:
tags:
required: true
type: string
port_payload:
required: true
description:
Port's payload, including details for who triggered the action and
general context (blueprint, run id, etc...)
type: string
env:
TF_LOG: INFO
TF_INPUT: false
jobs:
terraform:
name: "Add Tags to Azure Resource"
runs-on: ubuntu-latest
defaults:
run:
shell: bash
# We keep Terraform files in the terraform directory.
working-directory: ./terraform
# working-directory: ./
steps:
- name: Checkout the repository to the runner
uses: actions/checkout@v2
- name: Setup Terraform with specified version on the runner
uses: hashicorp/setup-terraform@v2
with:
terraform_version: 1.6.0
- name: Terraform init
id: init
# run: terraform init
env:
ARM_CLIENT_ID: ${{ secrets.ARM_CLIENT_ID }}
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }}
ARM_TENANT_ID: ${{ secrets.ARM_TENANT_ID }}
ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }}
RESOURCE_GROUP_NAME: YourResourceGroup
STORAGE_ACCOUNT_NAME: YourStorageAccount
TF_STATE_CONTAINER: tfstate
TF_STATE_KEY: terraform.tfstate
run: |
terraform init \
-backend-config="resource_group_name=$RESOURCE_GROUP_NAME" \
-backend-config="storage_account_name=$STORAGE_ACCOUNT_NAME" \
-backend-config="container_name=$TF_STATE_CONTAINER" \
-backend-config="key=$TF_STATE_KEY" \
-input=false
- name: Terraform format
id: fmt
run: terraform fmt -check
- name: Terraform validate
id: validate
run: terraform validate
- name: Run Terraform Plan and Apply (Azure)
id: plan-azure
env:
ARM_CLIENT_ID: ${{ secrets.ARM_CLIENT_ID }}
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }}
ARM_TENANT_ID: ${{ secrets.ARM_TENANT_ID }}
ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }}
TF_VAR_port_client_id: ${{ secrets.PORT_CLIENT_ID }}
TF_VAR_port_client_secret: ${{ secrets.PORT_CLIENT_SECRET }}
TF_VAR_port_run_id: ${{fromJson(inputs.port_payload).context.runId}}
TF_VAR_storage_account_name: ${{fromJson(inputs.port_payload).context.entity}}
TF_VAR_resource_tags: ${{ github.event.inputs.tags }}
run: |
terraform plan \
-input=false \
-out=tfazure-${GITHUB_RUN_NUMBER}.tfplan
terraform apply -auto-approve -input=false tfazure-${GITHUB_RUN_NUMBER}.tfplan
- name: Terraform Azure Status
if: steps.plan-azure.outcome == 'failure'
run: exit 1
- name: Create a log message
uses: port-labs/port-github-action@v1
with:
clientId: ${{ secrets.PORT_CLIENT_ID }}
clientSecret: ${{ secrets.PORT_CLIENT_SECRET }}
baseUrl: https://api.getport.io
operation: PATCH_RUN
runId: ${{fromJson(inputs.port_payload).context.runId}}
logMessage: Added tags to ${{fromJson(inputs.port_payload).context.entity}}
4.创建一个 GitHub Action secret AZURE_CREDENTIALS
,其值如下: (请参阅Using secrets in GitHub Actions%3C/keepr%3E.)
AZURE_CREDENTIALS = {
"clientSecret": "******",
"subscriptionId": "******",
"tenantId": "******",
"clientId": "******"
}
5.在.github/workflows/tag-azure-resource.yml
下创建一个工作流程文件,内容如下:
GitHub workflow script
note
Replace the RESOURCE_GROUP_NAME
with a resource group from your Azure account. Check this guide to find your resource groups.
tag-azure-resource.yml
name: "Tag Azure Resource CLI"
on:
workflow_dispatch:
inputs:
tags:
required: true
type: string
port_payload:
required: true
description:
Port's payload, including details for who triggered the action and
general context (blueprint, run id, etc...)
type: string
jobs:
build-and-deploy:
runs-on: ubuntu-latest
steps:
- name: Install jq
run: sudo apt-get install jq -y
- uses: azure/login@v1
with:
creds: ${{ secrets.AZURE_CREDENTIALS }}
- name: Azure CLI script
uses: azure/CLI@v1
env:
RESOURCE_GROUP: YourResourceGroup
STORAGE_NAME: ${{ fromJson(inputs.port_payload).context.entity }}
TAGS: ${{ github.event.inputs.tags }}
with:
azcliversion: latest
inlineScript: |
az account show
resource=$(az resource show -g ${RESOURCE_GROUP} -n ${STORAGE_NAME} --resource-type Microsoft.Storage/storageAccounts --query "id" --output tsv)
tags=$(echo ${TAGS} | jq -r 'to_entries|map("\(.key)=\(.value|tojson)")|join(" ")')
az tag create --resource-id $resource --tags $tags
- Trigger the action from the self-service page of your Port application.