- name : Prepare random number
set_fact :
rpfx : "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
run_once : yes
- name : Create virtual network
azure_rm_virtualnetwork :
resource_group : "{{ resource_group }}"
name : testVnet
address_prefixes : "10.0.0.0/16"
- name : Add subnet
azure_rm_subnet :
resource_group : "{{ resource_group }}"
name : testSubnet
address_prefix : "10.0.1.0/24"
virtual_network : testVnet
- name : Create public IP address
azure_rm_publicipaddress :
resource_group : "{{ resource_group }}"
allocation_method : Static
name : testPublicIP
- name : Create load balancer
azure_rm_loadbalancer :
resource_group : "{{ resource_group }}"
name : testLB
public_ip_address_name : testPublicIP
- name : Create network security group within same resource group of VMSS.
azure_rm_securitygroup :
resource_group : "{{ resource_group }}"
name : testNetworkSecurityGroup
- name : Create network security group in different resource group of VMSS.
azure_rm_securitygroup :
resource_group : "{{ resource_group_secondary }}"
name : testNetworkSecurityGroup2
- name : Create VMSS
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}
vm_size : Standard_DS1_v2
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
capacity : 2
virtual_network_name : testVnet
subnet_name : testSubnet
upgrade_policy : Manual
tier : Standard
managed_disk_type : Standard_LRS
os_disk_caching : ReadWrite
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
data_disks :
- lun : 0
disk_size_gb : 64
caching : ReadWrite
managed_disk_type : Standard_LRS
register : results
- name : Assert that VMSS was created
assert :
that : results.changed
- name : Create VMSS -- test upgrade_policy idempotence
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}
vm_size : Standard_DS1_v2
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
capacity : 2
virtual_network_name : testVnet
subnet_name : testSubnet
upgrade_policy : Automatic
tier : Standard
managed_disk_type : Standard_LRS
os_disk_caching : ReadWrite
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
data_disks :
- lun : 0
disk_size_gb : 64
caching : ReadWrite
managed_disk_type : Standard_LRS
check_mode : yes
register : results
- name : Assert that VMSS was created
assert :
that : results.changed
- name : Retrieve scaleset facts
azure_rm_virtualmachine_scaleset_facts :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}
format : curated
register : output_scaleset
- name : Get scaleset body
set_fact :
body : "{{ output_scaleset.vmss[0] }}"
- name : Try to update VMSS using output as input
azure_rm_virtualmachine_scaleset :
resource_group : "{{ body.resource_group }}"
name : "{{ body.name }}"
vm_size : "{{ body.vm_size }}"
admin_username : "{{ body.admin_username }}"
ssh_password_enabled : "{{ body.ssh_password_enabled }}"
admin_password : "Password1234!"
capacity : "{{ body.capacity }}"
virtual_network_name : "{{ body.virtual_network_name }}"
subnet_name : "{{ body.subnet_name }}"
upgrade_policy : "{{ body.upgrade_policy }}"
tier : "{{ body.tier }}"
managed_disk_type : "{{ body.managed_disk_type }}"
os_disk_caching : "{{ body.os_disk_caching }}"
image : "{{ body.image }}"
data_disks : "{{ body.data_disks }}"
register : results
- name : Assert that VMSS was updated
assert :
that : not results.changed
- name : Delete VMSS
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}
state : absent
remove_on_absent : [ 'all' ]
vm_size : Standard_DS1_v2
capacity : 2
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
- name : Create VMSS (check mode)
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}1
vm_size : Standard_DS1_v2
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
capacity : 2
virtual_network_name : testVnet
subnet_name : testSubnet
load_balancer : testLB
upgrade_policy : Manual
tier : Standard
managed_disk_type : Standard_LRS
os_disk_caching : ReadWrite
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
data_disks :
- lun : 0
disk_size_gb : 64
caching : ReadWrite
managed_disk_type : Standard_LRS
register : results
check_mode : yes
- name : Assert that VMSS can be created
assert :
that : results.changed
- name : Create VMSS
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}1
vm_size : Standard_DS1_v2
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
capacity : 2
virtual_network_name : testVnet
subnet_name : testSubnet
load_balancer : testLB
upgrade_policy : Manual
tier : Standard
managed_disk_type : Standard_LRS
os_disk_caching : ReadWrite
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
data_disks :
- lun : 0
disk_size_gb : 64
caching : ReadWrite
managed_disk_type : Standard_LRS
register : results
- name : Assert that VMSS ran
assert :
that : results.changed
- name : Delete VMSS
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}1
state : absent
remove_on_absent : [ 'all' ]
vm_size : Standard_DS1_v2
capacity : 2
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
- name : Create VMSS with security group in same resource group, with accelerated networking(check mode).
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}2
vm_size : Standard_D3_v2
capacity : 1
virtual_network_name : testVnet
subnet_name : testSubnet
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
upgrade_policy : Manual
security_group : testNetworkSecurityGroup
enable_accelerated_networking : yes
register : results
check_mode : yes
- name : Assert that VMSS can be created
assert :
that : results.changed
- name : Create VMSS with security group in same resource group, with accelerated networking.
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}2
vm_size : Standard_D3_v2
capacity : 1
virtual_network_name : testVnet
subnet_name : testSubnet
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
upgrade_policy : Manual
security_group : testNetworkSecurityGroup
enable_accelerated_networking : yes
register : results
- name : Assert that VMSS ran
assert :
that :
- 'results.changed'
- 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.enableAcceleratedNetworking == true'
- 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup != {}'
- name : Delete VMSS
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}2
state : absent
remove_on_absent : [ 'all' ]
vm_size : Standard_D3_v2
capacity : 1
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
- name : Create VMSS with security group in different resource group(check mode).
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}3
vm_size : Standard_DS1_v2
capacity : 1
virtual_network_name : testVnet
subnet_name : testSubnet
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
upgrade_policy : Manual
security_group :
name : testNetworkSecurityGroup2
resource_group : "{{ resource_group_secondary }}"
register : results
check_mode : yes
- name : Assert that VMSS ran
assert :
that : results.changed
- name : Create VMSS with security group in different resource group.
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}3
vm_size : Standard_DS1_v2
capacity : 1
virtual_network_name : testVnet
subnet_name : testSubnet
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
upgrade_policy : Manual
security_group :
name : testNetworkSecurityGroup2
resource_group : "{{ resource_group_secondary }}"
register : results
- name : Assert that VMSS ran
assert :
that :
- 'results.changed'
- '"testNetworkSecurityGroup2" in results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup.id'
- name : Delete VMSS
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}3
state : absent
remove_on_absent : [ 'all' ]
vm_size : Standard_DS1_v2
capacity : 1
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
- name : Fail when instance type is not supported to enable accelerated networking
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testVMSS{{ rpfx }}4
vm_size : Standard_DS1_v2
virtual_network_name : testVnet
subnet_name : testSubnet
admin_username : testuser
ssh_password_enabled : true
admin_password : "Password1234!"
image :
offer : CoreOS
publisher : CoreOS
sku : Stable
version : latest
upgrade_policy : Manual
enable_accelerated_networking : yes
register : results
ignore_errors : yes
- name : Assert failure to show that accelerated networking is enabled only with supported instance types.
assert :
that :
- '"VMSizeIsNotPermittedToEnableAcceleratedNetworkingForVmss" in results.msg'
- name : Delete network security group
azure_rm_securitygroup :
resource_group : "{{ resource_group }}"
name : testNetworkSecurityGroup
state : absent
- name : Delete network security group
azure_rm_securitygroup :
resource_group : "{{ resource_group_secondary }}"
name : testNetworkSecurityGroup2
state : absent
- name : Delete load balancer
azure_rm_loadbalancer :
resource_group : "{{ resource_group }}"
name : testLB
state : absent
- name : Delete public IP address
azure_rm_publicipaddress :
resource_group : "{{ resource_group }}"
state : absent
name : testPublicIP
- name : Delete virtual network
azure_rm_virtualnetwork :
resource_group : "{{ resource_group }}"
name : testVnet
state : absent
address_prefixes : "10.0.0.0/16"
# TODO: Until we have a module to create/delete images this is the best tests
# I can do
- name : assert error thrown with invalid image dict
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testvm002
state : present
vm_size : Standard_DS1_v2
image :
offer : UbuntuServer
register : fail_invalid_image_dict
failed_when : 'fail_invalid_image_dict.msg != "parameter error: expecting image to contain [publisher, offer, sku, version] or [name, resource_group]"'
- name : assert error thrown with invalid image type
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testvm002
state : present
vm_size : Standard_DS1_v2
image :
- testing
register : fail_invalid_image_type
failed_when : 'fail_invalid_image_type.msg != "parameter error: expecting image to be a string or dict not list"'
- name : assert error finding missing custom image
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testvm002
state : present
vm_size : Standard_DS1_v2
image : invalid-image
register : fail_missing_custom_image
failed_when : fail_missing_custom_image.msg != "Error could not find image with name invalid-image"
- name : assert error finding missing custom image (dict style)
azure_rm_virtualmachine_scaleset :
resource_group : "{{ resource_group }}"
name : testvm002
state : present
vm_size : Standard_DS1_v2
image :
name : invalid-image
register : fail_missing_custom_image_dict
failed_when : fail_missing_custom_image_dict.msg != "Error could not find image with name invalid-image"