Created
October 22, 2024 20:31
-
-
Save amgdy/9da9ec6cb2d058086a8e903e00c816b0 to your computer and use it in GitHub Desktop.
Create the Azure Network Security Group to run GitHub-hosted runners inside Azure VNET. This enables you to use GitHub-managed infrastructure for CI/CD while providing you with full control over the networking policies of your runners.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Exit immediately if a command exits with a non-zero status | |
set -e | |
# Variables | |
# Prompt the user for input | |
read -rp "Enter the resource group name: " resourceGroup | |
read -rp "Enter the location: " location | |
read -rp "Enter the NSG name: " nsgName | |
# Create the NSG | |
az network nsg create --resource-group "$resourceGroup" --name "$nsgName" --location "$location" | |
# Add security rules | |
az network nsg rule create --resource-group "$resourceGroup" --nsg-name "$nsgName" --name AllowVnetOutBoundOverwrite --priority 200 --direction Outbound --access Allow --protocol Tcp --source-address-prefix '*' --source-port-range '*' --destination-address-prefix 'VirtualNetwork' --destination-port-range 443 | |
az network nsg rule create --resource-group "$resourceGroup" --nsg-name "$nsgName" --name AllowOutBoundActions --priority 210 --direction Outbound --access Allow --protocol '*' --source-address-prefix '*' --source-port-range '*' --destination-address-prefixes '4.175.114.51/32' '20.102.35.120/32' '4.175.114.43/32' '20.72.125.48/32' '20.19.5.100/32' '20.7.92.46/32' '20.232.252.48/32' '52.186.44.51/32' '20.22.98.201/32' '20.246.184.240/32' '20.96.133.71/32' '20.253.2.203/32' '20.102.39.220/32' '20.81.127.181/32' '52.148.30.208/32' '20.14.42.190/32' '20.85.159.192/32' '52.224.205.173/32' '20.118.176.156/32' '20.236.207.188/32' '20.242.161.191/32' '20.166.216.139/32' '20.253.126.26/32' '52.152.245.137/32' '40.118.236.116/32' '20.185.75.138/32' '20.96.226.211/32' '52.167.78.33/32' '20.105.13.142/32' '20.253.95.3/32' '20.221.96.90/32' '51.138.235.85/32' '52.186.47.208/32' '20.7.220.66/32' '20.75.4.210/32' '20.120.75.171/32' '20.98.183.48/32' '20.84.200.15/32' '20.14.235.135/32' '20.10.226.54/32' '20.22.166.15/32' '20.65.21.88/32' '20.102.36.236/32' '20.124.56.57/32' '20.94.100.174/32' '20.102.166.33/32' '20.31.193.160/32' '20.232.77.7/32' '20.102.38.122/32' '20.102.39.57/32' '20.85.108.33/32' '40.88.240.168/32' '20.69.187.19/32' '20.246.192.124/32' '20.4.161.108/32' '20.22.22.84/32' '20.1.250.47/32' '20.237.33.78/32' '20.242.179.206/32' '40.88.239.133/32' '20.121.247.125/32' '20.106.107.180/32' '20.22.118.40/32' '20.15.240.48/32' '20.84.218.150/32' | |
az network nsg rule create --resource-group "$resourceGroup" --nsg-name "$nsgName" --name AllowOutBoundGitHub --priority 220 --direction Outbound --access Allow --protocol '*' --source-address-prefix '*' --source-port-range '*' --destination-address-prefixes '140.82.112.0/20' '143.55.64.0/20' '185.199.108.0/22' '192.30.252.0/22' '20.175.192.146/32' '20.175.192.147/32' '20.175.192.149/32' '20.175.192.150/32' '20.199.39.227/32' '20.199.39.228/32' '20.199.39.231/32' '20.199.39.232/32' '20.200.245.241/32' '20.200.245.245/32' '20.200.245.246/32' '20.200.245.247/32' '20.200.245.248/32' '20.201.28.144/32' '20.201.28.148/32' '20.201.28.149/32' '20.201.28.151/32' '20.201.28.152/32' '20.205.243.160/32' '20.205.243.164/32' '20.205.243.165/32' '20.205.243.166/32' '20.205.243.168/32' '20.207.73.82/32' '20.207.73.83/32' '20.207.73.85/32' '20.207.73.86/32' '20.207.73.88/32' '20.233.83.145/32' '20.233.83.146/32' '20.233.83.147/32' '20.233.83.149/32' '20.233.83.150/32' '20.248.137.48/32' '20.248.137.49/32' '20.248.137.50/32' '20.248.137.52/32' '20.248.137.55/32' '20.26.156.215/32' '20.26.156.216/32' '20.27.177.113/32' '20.27.177.114/32' '20.27.177.116/32' '20.27.177.117/32' '20.27.177.118/32' '20.29.134.17/32' '20.29.134.18/32' '20.29.134.19/32' '20.29.134.23/32' '20.29.134.24/32' '20.87.245.0/32' '20.87.245.1/32' '20.87.245.4/32' '20.87.245.6/32' '20.87.245.7/32' '4.208.26.196/32' '4.208.26.197/32' '4.208.26.198/32' '4.208.26.199/32' '4.208.26.200/32' | |
az network nsg rule create --resource-group "$resourceGroup" --nsg-name "$nsgName" --name AllowStorageOutbound --priority 230 --direction Outbound --access Allow --protocol '*' --source-address-prefix '*' --source-port-range '*' --destination-address-prefix 'Storage' | |
az network nsg rule create --resource-group "$resourceGroup" --nsg-name "$nsgName" --name DenyInternetOutBoundOverwrite --priority 400 --direction Outbound --access Deny --protocol '*' --source-address-prefix '*' --source-port-range '*' --destination-address-prefix 'Internet' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment