azure.azcollection.azure_rm_sqlfirewallrule – Manage Firewall Rule instance
Note
This plugin is part of the azure.azcollection collection (version 1.4.0).
To install it use: ansible-galaxy collection install azure.azcollection.
To use it in a playbook, specify: azure.azcollection.azure_rm_sqlfirewallrule.
New in version 0.1.2: of azure.azcollection
Synopsis
- Create, update and delete instance of Firewall Rule.
Requirements
The below requirements are needed on the host that executes this module.
- python >= 2.7
- azure >= 2.0.0
Parameters
| Parameter | Choices/Defaults | Comments | 
|---|---|---|
| ad_user  string  | Active Directory username. Use when authenticating with an Active Directory user rather than service principal. | |
| adfs_authority_url  string   added in 0.0.1 of azure.azcollection  | Azure AD authority url. Use when authenticating with Username/password, and has your own ADFS authority. | |
| api_profile  string   added in 0.0.1 of azure.azcollection  | Default: "latest" | Selects an API profile to use when communicating with Azure services. Default value of  latestis appropriate for public clouds; future values will allow use with Azure Stack. | 
| auth_source  string   added in 0.0.1 of azure.azcollection  | 
 | Controls the source of the credentials to use for authentication. Can also be set via the  ANSIBLE_AZURE_AUTH_SOURCEenvironment variable.When set to  auto(the default) the precedence is module parameters ->env->credential_file->cli.When set to  env, the credentials will be read from the environment variablesWhen set to  credential_file, it will read the profile from~/.azure/credentials.When set to  cli, the credentials will be sources from the Azure CLI profile.subscription_idor the environment variableAZURE_SUBSCRIPTION_IDcan be used to identify the subscription ID if more than one is present otherwise the default az cli subscription is used.When set to  msi, the host machine must be an azure resource with an enabled MSI extension.subscription_idor the environment variableAZURE_SUBSCRIPTION_IDcan be used to identify the subscription ID if the resource is granted access to more than one subscription, otherwise the first subscription is chosen.The  msiwas added in Ansible 2.6. | 
| cert_validation_mode  string   added in 0.0.1 of azure.azcollection  | 
 | Controls the certificate validation behavior for Azure endpoints. By default, all modules will validate the server certificate, but when an HTTPS proxy is in use, or against Azure Stack, it may be necessary to disable this behavior by passing  ignore. Can also be set via credential file profile or theAZURE_CERT_VALIDATIONenvironment variable. | 
| client_id  string  | Azure client ID. Use when authenticating with a Service Principal. | |
| cloud_environment  string   added in 0.0.1 of azure.azcollection  | Default: "AzureCloud" | For cloud environments other than the US public cloud, the environment name (as defined by Azure Python SDK, eg,  AzureChinaCloud,AzureUSGovernment), or a metadata discovery endpoint URL (required for Azure Stack). Can also be set via credential file profile or theAZURE_CLOUD_ENVIRONMENTenvironment variable. | 
| end_ip_address  string  | The end IP address of the firewall rule. Must be IPv4 format. Must be greater than or equal to start_ip_address. Use value  0.0.0.0to represent all Azure-internal IP addresses. | |
| name  string / required  | The name of the firewall rule. | |
| password  string  | Active Directory user password. Use when authenticating with an Active Directory user rather than service principal. | |
| profile  string  | Security profile found in ~/.azure/credentials file. | |
| resource_group  string / required  | The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal. | |
| secret  string  | Azure client secret. Use when authenticating with a Service Principal. | |
| server_name  string / required  | The name of the server. | |
| start_ip_address  string  | The start IP address of the firewall rule. Must be IPv4 format. Use value  0.0.0.0to represent all Azure-internal IP addresses. | |
| state  string  | 
 | State of the SQL Database. Use  presentto create or update an SQL Database andabsentto delete it. | 
| subscription_id  string  | Your Azure subscription Id. | |
| tenant  string  | Azure tenant ID. Use when authenticating with a Service Principal. | 
Notes
Note
- For authentication with Azure you can pass parameters, set environment variables, use a profile stored in ~/.azure/credentials, or log in before you run your tasks or playbook with az login.
- Authentication is also possible using a service principal or Active Directory user.
- To authenticate via service principal, pass subscription_id, client_id, secret and tenant or set environment variables AZURE_SUBSCRIPTION_ID, AZURE_CLIENT_ID, AZURE_SECRET and AZURE_TENANT.
- To authenticate via Active Directory user, pass ad_user and password, or set AZURE_AD_USER and AZURE_PASSWORD in the environment.
- Alternatively, credentials can be stored in ~/.azure/credentials. This is an ini file containing a [default] section and the following keys: subscription_id, client_id, secret and tenant or subscription_id, ad_user and password. It is also possible to add additional profiles. Specify the profile by passing profile or setting AZURE_PROFILE in the environment.
See Also
See also
- Sign in with Azure CLI
- 
How to authenticate using the az logincommand.
Examples
- name: Create (or update) Firewall Rule
  azure_rm_sqlfirewallrule:
    resource_group: myResourceGroup
    server_name: firewallrulecrudtest-6285
    name: firewallrulecrudtest-5370
    start_ip_address: 172.28.10.136
    end_ip_address: 172.28.10.138
   Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Returned | Description | 
|---|---|---|
| id  string  | always | Resource ID. Sample: /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.Sql/servers/firewallrulecrudtest-628 5/firewallRules/firewallrulecrudtest-5370 | 
Authors
- Zim Kalinowski (@zikalino)
    © 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
    https://docs.ansible.com/ansible/2.11/collections/azure/azcollection/azure_rm_sqlfirewallrule_module.html