avm-res-network-applicationgatewaywebapplicationfirewallpolicy

Azure/avm-res-network-applicationgatewaywebapplicationfirewallpolicy/azurerm

Terraform Module HCL AZURERM ✓ Verified

AVM Resource Module for Application Gateway Web Application Firewall (WAF) Policy

Install
module "avm-res-network-applicationgatewaywebapplicationfirewallpolicy" {
source = "Azure/avm-res-network-applicationgatewaywebapplicationfirewallpolicy/azurerm"
version = "0.2.0"
}
⭐ Source on GitHub 📦 Registry page
README

Application Gateway Web Application Firewall Policy This is a repo for the application gateway web application firewall policy. > [!IMPORTANT] > As the overall AVM framework is not GA (generally available) yet - the CI framework and test automation is not fully functional and implemented across all supported languages yet - breaking changes are expected, and additional customer feedback is yet to be gathered and incorporated. Hence, modules MUST NOT be published at version 1.0.0 or higher at this time. > > All module MUST be published as a pre-release version (e.g., 0.1.0, 0.1.1, 0.2.0, etc.) until the AVM framework becomes GA. > > However, it is important to note that this DOES NOT mean that the modules cannot be consumed and utilized. They CAN be leveraged in all types of environments (d

Inputs (11)
NameTypeDescriptionDefault
locationstringAzure region where the resource should be deployed. required
resource_group_namestringThe resource group where the resources will be deployed. required
managed_rulesobject({ exclusion = optio --- `exclusion` block supports the following: - `match_variable` - (Required required
namestringThe name of the this resource. required
role_assignmentsmap(object({ role_definitiA map of role assignments to create on this resource. The map key is deliberatel{}
tagsmap(string)(Optional) Tags of the resource.null
timeoutsobject({ create = optional - `create` - (Defaults to 30 minutes) Used when creating the Web Application Finull
enable_telemetryboolThis variable controls whether or not telemetry is enabled for the module. For mtrue
policy_settingsobject({ enabled - `enabled` - (Optional) Describes if the policy is in enabled state or disablenull
custom_rulesmap(object({ action - `action` - (Required) Type of action. Possible values are `Allow`, `Block` annull
lockobject({ kind = string Controls the Resource Lock configuration for this resource. The following propernull
Outputs (4)
http_listener_ids — The ID of the HTTP Listener associated with the WAF Policy.
name — The name of the WAF Policy.
path_based_rule_ids — The ID of the Path Based Rule associated with the WAF Policy.
resource_id — The ID of the WAF Policy.
Resources (5)
azurerm_management_lockazurerm_role_assignmentazurerm_web_application_firewall_policymodtm_telemetryrandom_uuid
Details
FrameworkTerraform Module
LanguageHCL
Version0.2.0
Cloud AZURERM
★ Stars1
Forks5
Total downloads75.1k
Inputs11
Outputs4
Resources5
Examples2
LicenseMIT
NamespaceAzure
Updated