azurerm_sql_firewall_rule
Allows you to manage an Azure SQL Firewall Rule
Example Usage
resource "azurerm_resource_group" "test" {
name = "acceptanceTestResourceGroup1"
location = "West US"
}
resource "azurerm_sql_database" "test" {
name = "MySQLDatabase"
resource_group_name = "${azurerm_resource_group.test.name}"
location = "West US"
tags {
environment = "production"
}
}
resource "azurerm_sql_firewall_rule" "test" {
name = "FirewallRule1"
resource_group_name = "${azurerm_resource_group.test.name}"
server_name = "${azurerm_sql_server.test.name}"
start_ip_address = "10.0.17.62"
end_ip_address = "10.0.17.62"
}
Argument Reference
The following arguments are supported:
-
name
- (Required) The name of the SQL Server. -
resource_group_name
- (Required) The name of the resource group in which to create the sql server. -
server_name
- (Required) The name of the SQL Server on which to create the Firewall Rule. -
start_ip_address
- (Required) The starting IP address to allow through the firewall for this rule. -
end_ip_address
- (Required) The ending IP address to allow through the firewall for this rule.
Attributes Reference
The following attributes are exported:
id
- The SQL Firewall Rule ID.
Import
SQL Firewall Rules can be imported using the resource id
, e.g.
terraform import azurerm_sql_firewall_rule.rule1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver/firewallRules/rule1
See the source of this document at Terraform.io