azurerm_sql_firewall_rule
Allows you to manage an Azure SQL Firewall Rule
Example Usage
resource "azurerm_resource_group" "test" { name = "acceptanceTestResourceGroup1" location = "West US" } resource "azurerm_sql_server" "test" { name = "mysqlserver" resource_group_name = "${azurerm_resource_group.test.name}" location = "West US" version = "12.0" administrator_login = "4dm1n157r470r" administrator_login_password = "4-v3ry-53cr37-p455w0rd" } resource "azurerm_sql_firewall_rule" "test" { name = "FirewallRule1" resource_group_name = "${azurerm_resource_group.test.name}" server_name = "${azurerm_sql_server.test.name}" start_ip_address = "10.0.17.62" end_ip_address = "10.0.17.62" }
Argument Reference
The following arguments are supported:
-
name
- (Required) The name of the firewall rule. -
resource_group_name
- (Required) The name of the resource group in which to create the sql server. -
server_name
- (Required) The name of the SQL Server on which to create the Firewall Rule. -
start_ip_address
- (Required) The starting IP address to allow through the firewall for this rule. -
end_ip_address
- (Required) The ending IP address to allow through the firewall for this rule.
NOTE: The Azure feature
Allow access to Azure services
can be enabled by settingstart_ip_address
andend_ip_address
to0.0.0.0
which (is documented in the Azure API Docs).
Attributes Reference
The following attributes are exported:
-
id
- The SQL Firewall Rule ID.
Import
SQL Firewall Rules can be imported using the resource id
, e.g.
terraform import azurerm_sql_firewall_rule.rule1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver/firewallRules/rule1
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/azurerm/r/sql_firewall_rule.html