Allows you to manage an Azure SQL Firewall Rule
resource "azurerm_resource_group" "test" {
name = "acceptanceTestResourceGroup1"
location = "West US"
}
resource "azurerm_sql_server" "test" {
name = "mysqlserver"
resource_group_name = "${azurerm_resource_group.test.name}"
location = "West US"
version = "12.0"
administrator_login = "4dm1n157r470r"
administrator_login_password = "4-v3ry-53cr37-p455w0rd"
}
resource "azurerm_sql_firewall_rule" "test" {
name = "FirewallRule1"
resource_group_name = "${azurerm_resource_group.test.name}"
server_name = "${azurerm_sql_server.test.name}"
start_ip_address = "10.0.17.62"
end_ip_address = "10.0.17.62"
}
The following arguments are supported:
name - (Required) The name of the firewall rule.
resource_group_name - (Required) The name of the resource group in which to create the sql server.
server_name - (Required) The name of the SQL Server on which to create the Firewall Rule.
start_ip_address - (Required) The starting IP address to allow through the firewall for this rule.
end_ip_address - (Required) The ending IP address to allow through the firewall for this rule.
NOTE: The Azure feature
Allow access to Azure servicescan be enabled by settingstart_ip_addressandend_ip_addressto0.0.0.0which (is documented in the Azure API Docs).
The following attributes are exported:
id - The SQL Firewall Rule ID. SQL Firewall Rules can be imported using the resource id, e.g.
terraform import azurerm_sql_firewall_rule.rule1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver/firewallRules/rule1
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/azurerm/r/sql_firewall_rule.html