azurestack_network_security_rule
Manages a Network Security Rule.
NOTE on Network Security Groups and Network Security Rules: Terraform currently provides both a standalone Network Security Rule resource, and allows for Network Security Rules to be defined in-line within the Network Security Group resource. At this time you cannot use a Network Security Group with in-line Network Security Rules in conjunction with any Network Security Rule resources. Doing so will cause a conflict of rule settings and will overwrite rules.
Example Usage
resource "azurestack_resource_group" "test" { name = "acceptanceTestResourceGroup1" location = "West US" } resource "azurestack_network_security_group" "test" { name = "acceptanceTestSecurityGroup1" location = "${azurestack_resource_group.test.location}" resource_group_name = "${azurestack_resource_group.test.name}" } resource "azurestack_network_security_rule" "test" { name = "test123" priority = 100 direction = "Outbound" access = "Allow" protocol = "Tcp" source_port_range = "*" destination_port_range = "*" source_address_prefix = "*" destination_address_prefix = "*" resource_group_name = "${azurestack_resource_group.test.name}" network_security_group_name = "${azurestack_network_security_group.test.name}" }
Argument Reference
The following arguments are supported:
-
name
- (Required) The name of the security rule. This needs to be unique across all Rules in the Network Security Group. Changing this forces a new resource to be created. -
resource_group_name
- (Required) The name of the resource group in which to create the Network Security Rule. Changing this forces a new resource to be created. -
network_security_group_name
- (Required) The name of the Network Security Group that we want to attach the rule to. Changing this forces a new resource to be created. -
description
- (Optional) A description for this rule. Restricted to 140 characters. -
protocol
- (Required) Network protocol this rule applies to. Possible values includeTcp
,Udp
or*
(which matches both). -
source_port_range
- (Optional) Source Port or Range. Integer or range between0
and65535
or*
to match any. -
destination_port_range
- (Optional) Destination Port or Range. Integer or range between0
and65535
or*
to match any. -
source_address_prefix
- (Optional) CIDR or source IP range or * to match any IP. Tags such as ‘VirtualNetwork’, ‘AzureLoadBalancer’ and ‘Internet’ can also be used. -
destination_address_prefix
- (Optional) CIDR or destination IP range or * to match any IP. Tags such as ‘VirtualNetwork’, ‘AzureLoadBalancer’ and ‘Internet’ can also be used. -
access
- (Required) Specifies whether network traffic is allowed or denied. Possible values areAllow
andDeny
. -
priority
- (Required) Specifies the priority of the rule. The value can be between 100 and 4096. The priority number must be unique for each rule in the collection. The lower the priority number, the higher the priority of the rule. -
direction
- (Required) The direction specifies if rule will be evaluated on incoming or outgoing traffic. Possible values areInbound
andOutbound
.
Attributes Reference
The following attributes are exported:
-
id
- The Network Security Rule ID.
Import
Network Security Rules can be imported using the resource id
, e.g.
terraform import azurestack_network_security_rule.rule1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Network/networkSecurityGroups/mySecurityGroup/securityRules/rule1
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/azurestack/r/network_security_rule.html