azurerm_security_group
Create a network security group that contains a list of network security rules.
Example Usage
resource "azurerm_resource_group" "test" {
name = "acceptanceTestResourceGroup1"
location = "West US"
}
resource "azurerm_network_security_group" "test" {
name = "acceptanceTestSecurityGroup1"
location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}"
security_rule {
name = "test123"
priority = 100
direction = "Inbound"
access = "Allow"
protocol = "Tcp"
source_port_range = "*"
destination_port_range = "*"
source_address_prefix = "*"
destination_address_prefix = "*"
}
tags {
environment = "Production"
}
}
Argument Reference
The following arguments are supported:
-
name
- (Required) Specifies the name of the network security group. Changing this forces a new resource to be created. -
resource_group_name
- (Required) The name of the resource group in which to create the availability set. -
location
- (Required) Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created. -
security_rule
- (Optional) Can be specified multiple times to define multiple security rules. Eachsecurity_rule
block supports fields documented below. -
tags
- (Optional) A mapping of tags to assign to the resource.
The security_rule
block supports:
-
name
- (Required) The name of the security rule. -
description
- (Optional) A description for this rule. Restricted to 140 characters. -
protocol
- (Required) Network protocol this rule applies to. Can be Tcp, Udp or * to match both. -
source_port_range
- (Required) Source Port or Range. Integer or range between 0 and 65535 or * to match any. -
destination_port_range
- (Required) Destination Port or Range. Integer or range between 0 and 65535 or * to match any. -
source_address_prefix
- (Required) CIDR or source IP range or * to match any IP. Tags such as ‘VirtualNetwork’, ‘AzureLoadBalancer’ and ‘Internet’ can also be used. -
destination_address_prefix
- (Required) CIDR or destination IP range or * to match any IP. Tags such as ‘VirtualNetwork’, ‘AzureLoadBalancer’ and ‘Internet’ can also be used. -
access
- (Required) Specifies whether network traffic is allowed or denied. Possible values are “Allow” and “Deny”. -
priority
- (Required) Specifies the priority of the rule. The value can be between 100 and 4096. The priority number must be unique for each rule in the collection. The lower the priority number, the higher the priority of the rule. -
direction
- (Required) The direction specifies if rule will be evaluated on incoming or outgoing traffic. Possible values are “Inbound” and “Outbound”.
Attributes Reference
The following attributes are exported:
id
- The Network Security Group ID.
Import
Network Security Groups can be imported using the resource id
, e.g.
terraform import azurerm_network_security_group.group1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Network/networkSecurityGroups/mySecurityGroup
See the source of this document at Terraform.io