azurerm_network_security_group
Manages a network security group that contains a list of network security rules. Network security groups enable inbound or outbound traffic to be enabled or denied.
NOTE on Network Security Groups and Network Security Rules: Terraform currently provides both a standalone Network Security Rule resource, and allows for Network Security Rules to be defined in-line within the Network Security Group resource. At this time you cannot use a Network Security Group with in-line Network Security Rules in conjunction with any Network Security Rule resources. Doing so will cause a conflict of rule settings and will overwrite rules.
Example Usage
resource "azurerm_resource_group" "test" {
name = "acceptanceTestResourceGroup1"
location = "West US"
}
resource "azurerm_network_security_group" "test" {
name = "acceptanceTestSecurityGroup1"
location = "${azurerm_resource_group.test.location}"
resource_group_name = "${azurerm_resource_group.test.name}"
security_rule {
name = "test123"
priority = 100
direction = "Inbound"
access = "Allow"
protocol = "Tcp"
source_port_range = "*"
destination_port_range = "*"
source_address_prefix = "*"
destination_address_prefix = "*"
}
tags {
environment = "Production"
}
}
Argument Reference
The following arguments are supported:
-
name- (Required) Specifies the name of the network security group. Changing this forces a new resource to be created. -
resource_group_name- (Required) The name of the resource group in which to create the network security group. Changing this forces a new resource to be created. -
location- (Required) Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created. -
security_rule- (Optional) One or moresecurity_ruleblocks as defined below. -
tags- (Optional) A mapping of tags to assign to the resource.
The security_rule block supports:
-
name- (Required) The name of the security rule. -
description- (Optional) A description for this rule. Restricted to 140 characters. -
protocol- (Required) Network protocol this rule applies to. Can beTcp,Udpor*to match both. -
source_port_range- (Optional) Source Port or Range. Integer or range between0and65535or*to match any. This is required ifsource_port_rangesis not specified. -
source_port_ranges- (Optional) List of source ports or port ranges. This is required ifsource_port_rangeis not specified. -
destination_port_range- (Optional) Destination Port or Range. Integer or range between0and65535or*to match any. This is required ifdestination_port_rangesis not specified. -
destination_port_ranges- (Optional) List of destination ports or port ranges. This is required ifdestination_port_rangeis not specified. -
source_address_prefix- (Optional) CIDR or source IP range or * to match any IP. Tags such as ‘VirtualNetwork’, ‘AzureLoadBalancer’ and ‘Internet’ can also be used. This is required ifsource_address_prefixesis not specified. -
source_address_prefixes- (Optional) List of source address prefixes. Tags may not be used. This is required ifsource_address_prefixis not specified. -
source_application_security_group_ids- (Optional) A List of source Application Security Group ID's -
destination_address_prefix- (Optional) CIDR or destination IP range or * to match any IP. Tags such as ‘VirtualNetwork’, ‘AzureLoadBalancer’ and ‘Internet’ can also be used. This is required ifdestination_address_prefixesis not specified. -
destination_address_prefixes- (Optional) List of destination address prefixes. Tags may not be used. This is required ifdestination_address_prefixis not specified. -
destination_application_security_group_ids- (Optional) A List of destination Application Security Group ID's -
access- (Required) Specifies whether network traffic is allowed or denied. Possible values areAllowandDeny. -
priority- (Required) Specifies the priority of the rule. The value can be between 100 and 4096. The priority number must be unique for each rule in the collection. The lower the priority number, the higher the priority of the rule. -
direction- (Required) The direction specifies if rule will be evaluated on incoming or outgoing traffic. Possible values areInboundandOutbound.
Attributes Reference
The following attributes are exported:
-
id- The Network Security Group ID.
Import
Network Security Groups can be imported using the resource id, e.g.
terraform import azurerm_network_security_group.group1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Network/networkSecurityGroups/mySecurityGroup
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/azurerm/r/network_security_group.html