Azure AKS avec Terraform

Salut!

Aujourd’hui nous allons voir ensemble comment nous pouvons automatiser le déploiement de notre cluster AKS avec Terraform.

Je vous invite à lire l’article que j’avais pu écrire il y a quelques mois : Automatiser votre infrastructure Azure avec Terraform.

resource "azurerm_resource_group" "demok8s" {
 name = "k8sterraform"
 location = "East US" (Attention! Seules certaines régions sont pour le moment disponibles: East US, West Europe, Central US, Canada Central and Canada East.)
}

resource "azurerm_kubernetes_cluster" "demok8s" {
 name = "k8sterraform"
 location = "${azurerm_resource_group.demok8s.location}"
 resource_group_name = "${azurerm_resource_group.demok8s.name}"
 kubernetes_version = "1.8.2"
 dns_prefix = "k8sterraform"

linux_profile {
 admin_username = "acctestuser1"

ssh_key {
 key_data = "ssh-rsa AAAABCDE"
 }
 }

agent_pool_profile {
 name = "default"
 count = 1
 vm_size = "Standard_A0"
 os_type = "Linux"
 }

service_principal {
 client_id = "Client_Id_A_Remplacer"
 client_secret = "SP_Secret_A_Remplacer"
 }

tags {
 Environment = "Demo"
 }
}
maxime@Azure:~/aks-terrform$ terraform init

Initializing provider plugins...

The following providers do not have any version constraints in configuration,
so the latest version was installed.

To prevent automatic upgrades to new major versions that may contain breaking
changes, it is recommended to add version = "..." constraints to the
corresponding provider blocks in configuration, with the constraint strings
suggested below.

* provider.azurerm: version = "~> 1.1"

Terraform has been successfully initialized!

You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
maxime@Azure:~/aks-terrform$ terraform plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.


------------------------------------------------------------------------

An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
 + create

Terraform will perform the following actions:

+ azurerm_kubernetes_cluster.demok8s
 id: <computed>
 agent_pool_profile.#: "1"
 agent_pool_profile.0.count: "1"
 agent_pool_profile.0.dns_prefix: <computed>
 agent_pool_profile.0.fqdn: <computed>
 agent_pool_profile.0.name: "default"
 agent_pool_profile.0.os_type: "Linux"
 agent_pool_profile.0.vm_size: "Standard_A0"
 dns_prefix: "k8sterraform"
 kubernetes_version: "1.8.2"
 linux_profile.#: "1"
 linux_profile.0.admin_username: "acctestuser1"
 linux_profile.0.ssh_key.#: "1"
 linux_profile.0.ssh_key.0.key_data: "ssh-rsa AAAABCDEF"
 location: "eastus"
 name: "k8sterraform"
 resource_group_name: "k8sterraform"
 service_principal.#: "1"
 service_principal.2388863275.client_id: "0c1484fa-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
 service_principal.2388863275.client_secret: <sensitive>
 tags.%: "1"
 tags.Environment: "Demo"

+ azurerm_resource_group.demok8s
 id: <computed>
 location: "eastus"
 name: "k8sterraform"
 tags.%: <computed>


Plan: 2 to add, 0 to change, 0 to destroy.

------------------------------------------------------------------------

Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
maxime@Azure:~/aks-terrform$ terraform apply

An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
 + create

Terraform will perform the following actions:

+ azurerm_kubernetes_cluster.demok8s
 id: <computed>
 agent_pool_profile.#: "1"
 agent_pool_profile.0.count: "1"
 agent_pool_profile.0.dns_prefix: <computed>
 agent_pool_profile.0.fqdn: <computed>
 agent_pool_profile.0.name: "default"
 agent_pool_profile.0.os_type: "Linux"
 agent_pool_profile.0.vm_size: "Standard_A0"
 dns_prefix: "k8sterraform"
 kubernetes_version: "1.8.2"
 linux_profile.#: "1"
 linux_profile.0.admin_username: "acctestuser1"
 linux_profile.0.ssh_key.#: "1"
 linux_profile.0.ssh_key.0.key_data: "ssh-rsa AAAABCD"
 location: "eastus"
 name: "k8sterraform"
 resource_group_name: "k8sterraform"
 service_principal.#: "1"
 service_principal.2388863275.client_id: "0c1484fa-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
 service_principal.2388863275.client_secret: <sensitive>
 tags.%: "1"
 tags.Environment: "Demo"

+ azurerm_resource_group.demok8s
 id: <computed>
 location: "eastus"
 name: "k8sterraform"
 tags.%: <computed>


Plan: 2 to add, 0 to change, 0 to destroy.

Do you want to perform these actions?
 Terraform will perform the actions described above.
 Only 'yes' will be accepted to approve.

Enter a value: yes

azurerm_resource_group.demok8s: Creating...
 location: "" => "eastus"
 name: "" => "k8sterraform"
 tags.%: "" => "<computed>"
azurerm_resource_group.demok8s: Creation complete after 0s (ID: /subscriptions/7db5e03c-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/k8sterraform)
azurerm_kubernetes_cluster.demok8s: Creating...
 agent_pool_profile.#: "" => "1"
 agent_pool_profile.0.count: "" => "1"
 agent_pool_profile.0.dns_prefix: "" => "<computed>"
 agent_pool_profile.0.fqdn: "" => "<computed>"
 agent_pool_profile.0.name: "" => "default"
 agent_pool_profile.0.os_type: "" => "Linux"
 agent_pool_profile.0.vm_size: "" => "Standard_A0"
 dns_prefix: "" => "k8sterraform"
 kubernetes_version: "" => "1.8.2"
 linux_profile.#: "" => "1"
 linux_profile.0.admin_username: "" => "acctestuser1"
 linux_profile.0.ssh_key.#: "" => "1"
 linux_profile.0.ssh_key.0.key_data: "" => "ssh-rsa AAAABCDE"
 location: "" => "eastus"
 name: "" => "k8sterraform"
 resource_group_name: "" => "k8sterraform"
 service_principal.#: "" => "1"
 service_principal.2388863275.client_id: "" => "0c1484fa-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
 service_principal.2388863275.client_secret: "<sensitive>" => "<sensitive>"
 tags.%: "" => "1"
 tags.Environment: "" => "Demo"
azurerm_kubernetes_cluster.demok8s: Still creating... (10s elapsed)
azurerm_kubernetes_cluster.demok8s: Still creating... (20s elapsed)
azurerm_kubernetes_cluster.demok8s: Still creating... (30s elapsed)
...
azurerm_kubernetes_cluster.demok8s: Still creating... (9m0s elapsed)
azurerm_kubernetes_cluster.demok8s: Creation complete after 9m4s (ID: /subscriptions/7db5e03c-xxxx-xxxx-xxxx-...erService/managedClusters/k8sterraform)

Apply complete! Resources: 2 added, 0 changed, 0 destroyed.

Documentation: https://www.terraform.io/docs/providers/azurerm/r/kubernetes_cluster.html

 

Azure Video Indexer – Introduction

Salut!

Aujourd’hui dans cet article, nous allons découvrir ensemble: Azure Video Indexer. Le service est encore en preview au moment de l’écriture de cet article, mais je vous invite à l’essayer!

Azure Video Indexer permet d’indexer des vidéos ainsi que faire de l’analyse de sentiments (basée sur les services Azure Cognitives). Plus concrètement, vous allez pouvoir uploader une vidéo sur cette plateforme et ainsi indexer l’ensemble des objets/personnes présents dans cette vidéo.

Ci-dessous quelques exemples que j’ai pu expérimenter :

Dans cet exemple, vous pouvez identifier les personnes présentes dans la vidéo ainsi que le pourcentage de présence dans cette vidéo. Si vous le souhaitez, vous pouvez par exemple regarder uniquement les segments où une personne spécifique est présente.

Ci-dessous, vous pouvez regarder quels sont les principaux mots clés de la vidéo :

Ici, les objets qui ont pu être identifiés au sein de la vidéo :

Les principales marques qui ont pu être identifiées dans la vidéo :

Et même l’analyse des sentiments de l’orateur!

Il est possible de retranscrire le transcript de l’orateur dans une autre langue, idéal si vous souhaitez par exemple créer des sous-titres pour votre vidéo. De l’OCR est également appliqué sur la vidéo, ce qui vous permet d’en extraire facilement le texte.

Une API est également disponible pour automatiser l’ensemble de vos requêtes:

PodCast – Azure News!

Salut!

Cette année, je me lance dans la réalisation de podcast audio avec un focus sur l’actualité Azure, des retours techniques, ainsi que diverses actualités de l’éco-systèmes DevOps.

C’est ainsi que je vous invite à découvrir ensemble mon premier épisode!

A bientôt!