avm-res-servicebus-namespace
Azure/avm-res-servicebus-namespace/azurerm
Terraform Azure Verified Resource Module for Service Bus Namespace
Terraform Azure Service Bus Namespace Module This Terraform module is designed to create Azure Service bus namespaces and its related resources, including queues and topics. > [!WARNING] > Major version Zero (0.y.z) is for initial development. Anything MAY change at any time. A module SHOULD NOT be considered stable till at least it is major version one (1.0.0) or greater. Changes will always be via new versions being published and no changes will be made to existing published versions. For more details please go to Features Creation of queues. Creation of topics and its subscriptions on it EntraID authentication instead of access keys Support for customer-managed keys and double encryption with infrastructure encryption. Enable private endpoint, providing secure access over a private netw
| Name | Type | Description | Default |
|---|---|---|---|
| location | string | Azure region where the resource should be deployed. If null, the location wi | required |
| name | string | Specifies the name of the ServiceBus Namespace resource. Changing this forc | required |
| resource_group_name | string | The name of the resource group in which to create this resource. Changing t | required |
| network_rule_config | object({ trusted_services_ | IP rules only for Basic and Standard, virtual network or IP rules for Premium. | {
"cidr_or_ip_rules": [],
"default_a |
| queues | map(object({ name | Defaults to `{}`. A map of queues to create. The name of the queue must be u | {} |
| enable_telemetry | bool | Defaults to `true`. This variable controls whether or not telemetry is enabled | true |
| authorization_rules | map(object({ name = opti | Defaults to `{}`. Manages a ServiceBus Namespace authorization Rule within a S | {} |
| capacity | number | Always set to `0` for Standard and Basic. Defaults to `1` for Premium. Specifi | null |
| sku | string | Defaults to `Premium`. Defines which tier to use. Options are Basic, Standard | "Premium" |
| infrastructure_encryption_enabled | bool | Defaults to `true`. Used to specify whether enable Infrastructure Encryption (Do | true |
| customer_managed_key | object({ key_name | Defaults to `null`. Ignored for Basic and Standard. Defines a customer managed | null |
| managed_identities | object({ system_assigned | Defaults to `{}`. Controls the Managed Identity configuration on this resource | {} |
| public_network_access_enabled | bool | Defaults to `true`. Is public network access enabled for the Service Bus Namespa | true |
| local_auth_enabled | bool | Defaults to `true`. Whether or not SAS authentication is enabled for the Service | true |
| diagnostic_settings | map(object({ name | Defaults to `{}`. A map of diagnostic settings to create. The map key is delib | {} |
| private_endpoints | map(object({ subnet_resour | Default to `{}`. Ignored for Basic and Standard. A map of private endpoints to | {} |
| tags | map(string) | Defaults to `{}`. A mapping of tags to assign to the resource. These tags will | null |
| minimum_tls_version | string | Defaults to `1.2`. The minimum supported TLS version for this Service Bus Namesp | "1.2" |
| premium_messaging_partitions | number | Always set to `0` for Standard and Basic. Defaults to `1` for Premium. Specifi | null |
| timeouts | object({ create = optional | - `create` - (Defaults to 30 minutes) Used when creating the ServiceBus Namespac | null |
| lock | object({ kind = string | Defaults to `null`. Controls the Resource Lock configuration for this resource | null |
| private_endpoints_manage_dns_zone_group | bool | Default to true. Whether to manage private DNS zone groups with this module. If | true |
| role_assignments | map(object({ role_definiti | Defaults to `{}`. A map of role assignments to create. The map key is delibera | {} |
resource_authorization_rules — The service bus namespace authorization rules created. More info: https://registry.terraform.io/provresource_diagnostic_settings — The diagnostic settings created. More info: https://registry.terraform.io/providers/hashicorp/azurerresource_id — The resource ID of the service bus namespace created.resource_locks — The management locks created. More info: https://registry.terraform.io/providers/hashicorp/azurerm/lresource_private_endpoints — A map of the private endpoints created. More info: https://registry.terraform.io/providers/hashicorpresource_queues_authorization_rules — The service bus queues authorization rules created. More info: https://registry.terraform.io/provideresource_role_assignments — The role assignments created. More info: https://registry.terraform.io/providers/hashicorp/azurerm/lresource_topics — The service bus topics created. More info: https://registry.terraform.io/providers/hashicorp/azurermresource — The service bus namespace created. More info: https://registry.terraform.io/providers/hashicorp/azurresource_private_endpoints_application_security_group_association — The private endpoint application security group associations createdresource_queues — The service bus queues created. More info: https://registry.terraform.io/providers/hashicorp/azurermresource_topics_authorization_rules — The service bus topics authorization rules created. More info: https://registry.terraform.io/provideresource_topics_subscriptions — The service bus topic subscriptions created. More info: https://registry.terraform.io/providers/hash