Skip to content

Latest commit

 

History

History
164 lines (132 loc) · 6.51 KB

File metadata and controls

164 lines (132 loc) · 6.51 KB

Sitecore-Azure-Quickstart-Templates

This repo contains all currently available Azure Resource Manager templates for Sitecore

Documentation

You can read all about Sitecore Azure AppService integration and ARM Template deployment at Sitecore Documentation Site

Compatibility

Choose the compatible templates for your Sitecore version:

Templates Folder Compatible Product versions
Sitecore 8.2.1 Sitecore 8.2 Update-1 and Update-2
Sitecore 8.2.3 Sitecore 8.2 Update-3
Sitecore 8.2.4 Sitecore 8.2 Update-4
Sitecore 8.2.5 Sitecore 8.2 Update-5 and Update-6
Sitecore 8.2.7 Sitecore 8.2 Update-7
Sitecore 9.0.0 Sitecore 9.0
Sitecore 9.0.1 Sitecore 9.0 Update-1
Please note that these ARM templates link to an additional WDP in order to resolve a potential performance issue on start-up (see KB article for more info).
Sitecore 9.0.2 Sitecore 9.0 Update-2
WFFM 8.2.3 Web Forms For Marketers 8.2 Update-3, Update-4 and Update-5
WFFM 9.0.0 Web Forms For Marketers 9.0
AD 1.3.0 Active Directory 1.3
EXM 3.5.0 Email Experience Manager 3.5.0
SXA Sitecore Experience Accelerator 1.3 - 1.6 for Sitecore 8.2 and Sitecore 9.0
Sitecore XC 9.0.0 Sitecore Experience Commerce 9.0 Initial
SXA Storefront 1.0 SXA Storefront 1.0 for Sitecore XC 9.0 Initial

Pre-deployment Checklist

  1. Ensure you have the latest Azure PowerShell SDK installed
  2. Ensure that Sitecore Web Deploy packages you are going to deploy are available for download over the Internet
  3. Download and update the parameter values in the azuredeploy.parameters.json file

Sample PowerShell Script

Below is a sample PowerShell script that can help you to get up and running quickly with the ARM Templates. There is also a Sitecore PowerShell CmdLet available for download at Sitecore Downloads Site that makes the deployment even easier.

# Specify the parameters for the deployment 
$ArmTemplateUrl = "AZUREDEPLOY_JSON_URL"
$ArmParametersPath = ".\azuredeploy.parameters.json"
$licenseFilePath = "PATH_TO_LICENSE_XML"

# Specify the certificate file path and password if you want to deploy Sitecore 9.0 XP or XDB configurations
$certificateFilePath = $null 
$certificatePassword = $null
$certificateBlob = $null

$Name = "RESOURCE_GROUP_NAME"
$location = "AZURE_DATA_CENTER_NAME"
$AzureSubscriptionId = "AZURE_SUBSCRIPTION_ID"

# read the contents of your Sitecore license file
$licenseFileContent = Get-Content -Raw -Encoding UTF8 -Path $licenseFilePath | Out-String

# read the contents of your authentication certificate
if ($certificateFilePath) {
  $certificateBlob = [System.Convert]::ToBase64String([System.IO.File]::ReadAllBytes($certificateFilePath))
}

#region Create Params Object
# license file needs to be secure string and adding the params as a hashtable is the only way to do it
$additionalParams = New-Object -TypeName Hashtable

$params = Get-Content $ArmParametersPath -Raw | ConvertFrom-Json

foreach($p in $params | Get-Member -MemberType *Property)
{
    $additionalParams.Add($p.Name, $params.$($p.Name).value)
}

$additionalParams.Set_Item('licenseXml',$licenseFileContent)
$additionalParams.Set_Item('deploymentId',$Name)

# Inject Certificate Blob and Password into the parameters
if ($certificateBlob) {
  $additionalParams.Set_Item('authCertificateBlob',$certificateBlob)
}
if ($certificatePassword) {
  $additionalParams.Set_Item('authCertificatePassword',$certificatePassword)
}

#endregion

#region Service Principle Details

# By default this script will prompt you for your Azure credentials but you can update the script to use an Azure Service Principal instead by following the details at the link below and updating the four variables below once you are done.
# https://azure.microsoft.com/en-us/documentation/articles/resource-group-authenticate-service-principal/

$UseServicePrincipal = $false
$TenantId = "SERVICE_PRINCIPAL_TENANT_ID"
$ApplicationId = "SERVICE_PRINCIPAL_APPLICATION_ID"
$ApplicationPassword = "SERVICE_PRINCIPAL_APPLICATION_PASSWORD"

#endregion

try 
{
	
	#region Validate Resouce Group Name	

	Write-Host "Validating Resource Group Name..."
	if(!($Name -cmatch '^(?!.*--)[a-z0-9]{2}(|([a-z0-9\-]{0,37})[a-z0-9])$'))
	{
		Write-Error "Name should only contain lowercase letters, digits or dashes,
					 dash cannot be used in the first two or final character,
					 it cannot contain consecutive dashes and is limited between 2 and 40 characters in length!"
		Break;		
	}
		
	#endregion
	
	Write-Host "Setting Azure RM Context..."

 	if($UseServicePrincipal -eq $true)
	{
		#region Use Service Principle
		$secpasswd = ConvertTo-SecureString $ApplicationPassword -AsPlainText -Force
		$mycreds = New-Object System.Management.Automation.PSCredential ($ApplicationId, $secpasswd)
		Login-AzureRmAccount -ServicePrincipal -Tenant $TenantId -Credential $mycreds
		
		Set-AzureRmContext -SubscriptionID $AzureSubscriptionId -TenantId $TenantId
		#endregion
	}
	else
	{
		#region Use Manual Login
		try 
		{
			Write-Host "inside try"
			Set-AzureRmContext -SubscriptionID $AzureSubscriptionId
		}
		catch 
		{
			Write-Host "inside catch"
			Login-AzureRmAccount
			Set-AzureRmContext -SubscriptionID $AzureSubscriptionId
		}
		#endregion		
	}
	
 	Write-Host "Check if resource group already exists..."
	$notPresent = Get-AzureRmResourceGroup -Name $Name -ev notPresent -ea 0
	
	if (!$notPresent) 
	{
		New-AzureRmResourceGroup -Name $Name -Location $location
	}
	
	Write-Host "Starting ARM deployment..."
	New-AzureRmResourceGroupDeployment `
			-Name $Name `
			-ResourceGroupName $Name `
			-TemplateUri $ArmTemplateUrl `
			-TemplateParameterObject $additionalParams `
			# -DeploymentDebugLogLevel All -Debug -Verbose
			
	Write-Host "Deployment Complete."
}
catch 
{
	Write-Error $_.Exception.Message
	Break 
}