network-security-group

Azure/network-security-group/azurerm

Terraform Module HCL AZURERM

Terraform module to create a network security group and assign it to the specified subnet

Install
module "network-security-group" {
source = "Azure/network-security-group/azurerm"
version = "4.1.0"
}
⭐ Source on GitHub 📦 Registry page
README

terraform-azurerm-network-security-group Notice on Upgrade to V4.x We've added a CI pipeline for this module to speed up our code review and to enforce a high code quality standard, if you want to contribute by submitting a pull request, please read Pre-Commit & Pr-Check & Test section, or your pull request might be rejected by CI pipeline. A pull request will be reviewed when it has passed Pre Pull Request Check in the pipeline, and will be merged when it has passed the acceptance tests. Once the CI pipeline failed, please read the pipeline's output, thanks for your cooperation. V4.0.0 is a major version upgrade. Extreme caution must be taken during the upgrade to avoid resource replacement and downtime by accident. Running terraform plan first to inspect the plan is strongly advised. Ter

Inputs (12)
NameTypeDescriptionDefault
resource_group_namestringName of the resource group required
destination_address_prefixeslist(string)Destination address prefix to be applied to all predefined rules. Example ["10.0null
security_group_namestringNetwork security group name"nsg"
source_address_prefixlist(string)Source address prefix to be applied to all predefined rules. list(string) only a[ "*" ]
source_address_prefixeslist(string)Destination address prefix to be applied to all predefined rules. Example ["10.0null
tagsmap(string)The tags to associate with your network security group.{}
destination_address_prefixlist(string)Destination address prefix to be applied to all predefined rules. list(string) o[ "*" ]
predefined_rulesanyPredefined rules[]
rulesmap(any)Standard set of predefined rules{ "ActiveDirectory-AllowADDSWebService
use_for_eachboolChoose wheter to use 'for_each' as iteration technic to generate the rules, defafalse
custom_rulesanySecurity rules for the network security group using this format name = [name, pr[]
locationstringLocation (Azure Region) for the network security group.""
Outputs (2)
network_security_group_name — The name of newly created network security group
network_security_group_id — The id of newly created network security group
Resources (2)
azurerm_network_security_groupazurerm_network_security_rule
Details
FrameworkTerraform Module
LanguageHCL
Version4.1.0
Cloud AZURERM
★ Stars107
Forks100
Total downloads640.7k
Inputs12
Outputs2
Resources2
Examples36
Submodules36
LicenseMIT
NamespaceAzure
Updated