avm-res-network-frontdoorwebapplicationfirewallpolicy

Azure/avm-res-network-frontdoorwebapplicationfirewallpolicy/azurerm

Terraform Module HCL AZURERM ✓ Verified

Front Door Web Application Firewall (WAF) Policy

Install
module "avm-res-network-frontdoorwebapplicationfirewallpolicy" {
source = "Azure/avm-res-network-frontdoorwebapplicationfirewallpolicy/azurerm"
version = "0.1.0"
}
⭐ Source on GitHub 📦 Registry page
README

terraform-azurerm-avm-res-network-frontdoorwebapplicationfirewallpolicy Description This Terraform module creates an Azure CDN Front Door Web Application Firewall (WAF) policy with customizable settings. It allows you to define both managed and custom rules to enhance the security of your Azure Front Door service. > [!IMPORTANT] > As the overall AVM framework is not GA (generally available) yet - the CI framework and test automation is not fully functional and implemented across all supported languages yet - breaking changes are expected, and additional customer feedback is yet to be gathered and incorporated. Hence, modules MUST NOT be published at version 1.0.0 or higher at this time. > > All module MUST be published as a pre-release version (e.g., 0.1.0, 0.1.1, 0.2.0, etc.) until the AV

Inputs (15)
NameTypeDescriptionDefault
sku_namestringSKU name of the WAF Policy. Possible values are 'Standard_AzureFrontDoor' and 'P required
modestringThe mode of the WAF Policy. Possible values are 'Detection' and 'Prevention'. required
namestringThe name of the this resource. required
resource_group_namestringThe resource group where the resources will be deployed. required
enable_telemetryboolThis variable controls whether or not telemetry is enabled for the module. For mtrue
managed_ruleslist(object({ type = stThe `managed_rules` variable is a list of managed rule configurations for Azure [ { "action": "Block", "type":
redirect_urlstringOptional. The redirect URL for the WAF Policy.null
request_body_check_enabledboolIndicates whether to enable request body check. Default is true.true
tagsmap(string)(Optional) Tags of the resource.null
custom_block_response_bodystringOptional. The custom block response body. If the action type is block, customer null
custom_block_response_status_codenumberOptional. Customer can override the response status code setting this varibale. null
enabledboolIndicates whether the WAF Policy is enabled or disabled. Default is true.true
role_assignmentsmap(object({ role_definitiA map of role definitions and scopes to be assigned as part of this resources im{}
custom_ruleslist(object({ name A list of custom rules to be applied to the WAF (Web Application Firewall) Polic[]
lockobject({ kind = string Controls the Resource Lock configuration for this resource. The following propernull
Outputs (2)
resource — This is the full output for the resource.
resource_id — The ID of the WAF Policy.
Resources (5)
azurerm_cdn_frontdoor_firewall_policyazurerm_management_lockazurerm_role_assignmentmodtm_telemetryrandom_uuid
Details
FrameworkTerraform Module
LanguageHCL
Version0.1.0
Cloud AZURERM
★ Stars0
Forks5
Total downloads6.2k
Inputs15
Outputs2
Resources5
Examples3
LicenseMIT
NamespaceAzure
Updated