» azurerm_sql_firewall_rule

Allows you to manage an Azure SQL Firewall Rule

» Example Usage

resource "azurerm_resource_group" "test" {
  name     = "acceptanceTestResourceGroup1"
  location = "West US"
}

resource "azurerm_sql_server" "test" {
  name                         = "mysqlserver"
  resource_group_name          = "${azurerm_resource_group.test.name}"
  location                     = "West US"
  version                      = "12.0"
  administrator_login          = "4dm1n157r470r"
  administrator_login_password = "4-v3ry-53cr37-p455w0rd"
}

resource "azurerm_sql_firewall_rule" "test" {
  name                = "FirewallRule1"
  resource_group_name = "${azurerm_resource_group.test.name}"
  server_name         = "${azurerm_sql_server.test.name}"
  start_ip_address    = "10.0.17.62"
  end_ip_address      = "10.0.17.62"
}

» Argument Reference

The following arguments are supported:

  • name - (Required) The name of the firewall rule.

  • resource_group_name - (Required) The name of the resource group in which to create the sql server.

  • server_name - (Required) The name of the SQL Server on which to create the Firewall Rule.

  • start_ip_address - (Required) The starting IP address to allow through the firewall for this rule.

  • end_ip_address - (Required) The ending IP address to allow through the firewall for this rule.

» Attributes Reference

The following attributes are exported:

  • id - The SQL Firewall Rule ID.

» Import

SQL Firewall Rules can be imported using the resource id, e.g.

terraform import azurerm_sql_firewall_rule.rule1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver/firewallRules/rule1