» azurerm_sql_firewall_rule
Allows you to manage an Azure SQL Firewall Rule
» Example Usage
resource "azurerm_resource_group" "test" {
name = "acceptanceTestResourceGroup1"
location = "West US"
}
resource "azurerm_sql_server" "test" {
name = "mysqlserver"
resource_group_name = "${azurerm_resource_group.test.name}"
location = "West US"
version = "12.0"
administrator_login = "4dm1n157r470r"
administrator_login_password = "4-v3ry-53cr37-p455w0rd"
}
resource "azurerm_sql_firewall_rule" "test" {
name = "FirewallRule1"
resource_group_name = "${azurerm_resource_group.test.name}"
server_name = "${azurerm_sql_server.test.name}"
start_ip_address = "10.0.17.62"
end_ip_address = "10.0.17.62"
}
» Argument Reference
The following arguments are supported:
-
name
- (Required) The name of the firewall rule. -
resource_group_name
- (Required) The name of the resource group in which to create the sql server. -
server_name
- (Required) The name of the SQL Server on which to create the Firewall Rule. -
start_ip_address
- (Required) The starting IP address to allow through the firewall for this rule. -
end_ip_address
- (Required) The ending IP address to allow through the firewall for this rule.
NOTE: The Azure feature Allow access to Azure services
can be enabled by setting start_ip_address
and end_ip_address
to 0.0.0.0
which (is documented in the Azure API Docs).
» Attributes Reference
The following attributes are exported:
-
id
- The SQL Firewall Rule ID.
» Import
SQL Firewall Rules can be imported using the resource id
, e.g.
terraform import azurerm_sql_firewall_rule.rule1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver/firewallRules/rule1