azurerm_sql_firewall_rule
Allows you to manage an Azure SQL Firewall Rule
Example Usage
resource "azurerm_resource_group" "test" {
  name     = "acceptanceTestResourceGroup1"
  location = "West US"
}
resource "azurerm_sql_server" "test" {
    name = "mysqlserver"
    resource_group_name = "${azurerm_resource_group.test.name}"
    location = "West US"
    version = "12.0"
    administrator_login = "4dm1n157r470r"
    administrator_login_password = "4-v3ry-53cr37-p455w0rd"
}
resource "azurerm_sql_firewall_rule" "test" {
  name                = "FirewallRule1"
  resource_group_name = "${azurerm_resource_group.test.name}"
  server_name         = "${azurerm_sql_server.test.name}"
  start_ip_address    = "10.0.17.62"
  end_ip_address      = "10.0.17.62"
}
Argument Reference
The following arguments are supported:
- 
name- (Required) The name of the firewall rule. - 
resource_group_name- (Required) The name of the resource group in which to create the sql server. - 
server_name- (Required) The name of the SQL Server on which to create the Firewall Rule. - 
start_ip_address- (Required) The starting IP address to allow through the firewall for this rule. - 
end_ip_address- (Required) The ending IP address to allow through the firewall for this rule. 
NOTE: The Azure feature
Allow access to Azure servicescan be enabled by settingstart_ip_addressandend_ip_addressto0.0.0.0which (is documented in the Azure API Docs).
Attributes Reference
The following attributes are exported:
- 
id- The SQL Firewall Rule ID. 
Import
SQL Firewall Rules can be imported using the resource id, e.g.
terraform import azurerm_sql_firewall_rule.rule1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver/firewallRules/rule1
    © 2018 HashiCorpLicensed under the MPL 2.0 License.
    https://www.terraform.io/docs/providers/azurerm/r/sql_firewall_rule.html