db-sql
claranet/db-sql/azurerm
Terraform module composition (feature) for Azure SQL Database (SQLServer based)
Azure SQL     This Terraform module creates an Azure SQL Server and associated databases in an optional SQL Elastic Pool with DTU purchasing model or vCore purchasing model only along with Firewall rules and Diagnostic settings enabled. Migration from 8.x.x to 8.3.x The variable allowed_cidr_list variable has been renamed to allowed_cidrs and the resource azurerm_mssql_firewall_rule.main is now using a for_each loop to create the firewall rules (was using a count before). In order to migrate your state without recreating the firewall rules, you can run : ``bash tofu state rm module.sql.azurerm_mssql_firewall_rule.main ` Then add to your IA
| Name | Type | Description | Default |
|---|---|---|---|
| environment | string | Project environment. | required |
| location | string | Azure location. | required |
| stack | string | Project stack name. | required |
| client_name | string | Client name/account used in naming. | required |
| location_short | string | Short string for Azure location. | required |
| resource_group_name | string | Resource group name. | required |
| logs_destinations_ids | list(string) | List of destination resources IDs for logs diagnostic destination. Can be `Stora | required |
| administrator_login | string | Administrator login for SQL Server. | required |
| administrator_password | string | Administrator password for SQL Server. | required |
| create_databases_users | bool | True to create a user named <db>_user on each database with generated password a | true |
| threat_detection_policy_enabled | bool | True to enable thread detection policy on the databases. | false |
| express_vulnerability_assessment_enabled | bool | True to enable express vulnerability assessment for this SQL Server. | false |
| databases_extended_auditing_retention_days | number | Databases extended auditing logs retention. | 30 |
| tls_minimum_version | string | The TLS minimum version for all SQL Database associated with the server. Valid v | "1.2" |
| databases_extended_auditing_enabled | bool | True to enable extended auditing for SQL databases. | false |
| sql_server_extended_auditing_enabled | bool | True to enable extended auditing for SQL Server. | false |
| sql_server_extended_auditing_retention_days | number | Server extended auditing logs retention. | 30 |
| threat_detection_policy_retention_days | number | Specifies the number of days to keep in the Threat Detection audit logs. | 7 |
| security_storage_account_container_name | string | Storage Account container name where to store SQL Server vulnerability assessmen | null |
| allowed_cidrs | any | List/map of allowed CIDR ranges to access the SQL server. Default to all Azure s | {
"azure-services": "0.0.0.0/32"
} |
| security_storage_account_access_key | string | Storage Account access key used to store security logs and reports. | null |
| server_extra_tags | map(string) | Extra tags to add on SQL Server or ElasticPool. | {} |
| server_version | string | Version of the SQL Server. Valid values are: 2.0 (for v11 server) and 12.0 (for | "12.0" |
| elastic_pool_max_size | string | Maximum size of the Elastic Pool in gigabytes. | null |
| single_databases_sku_name | string | Specifies the name of the SKU used by the database. For example, `GP_S_Gen5_2`, | "GP_Gen5_2" |
| databases_zone_redundant | bool | True to have databases zone redundant, which means the replicas of the databases | null |
| point_in_time_backup_interval_in_hours | number | The hours between each differential backup. This is only applicable to live data | 12 |
| threat_detection_policy_disabled_alerts | list(string) | Specifies a list of alerts which should be disabled. Possible values include `Ac | [] |
| elastic_pool_license_type | string | Specifies the license type applied to this database. Possible values are `Licens | null |
| … and 10 more inputs | |||
elastic_pool_resource — SQL Elastic Pool resource.elastic_pool_id — ID of the SQL Elastic Pool.default_databases_users — Map of the SQL Databases dedicated usersadministrator_password — SQL Administrator password.databases_id — Map of the SQL Databases names => IDs.default_administrator_databases_connection_strings — Map of the SQL Databases with administrator credentials connection stringsvulnerability_assessment_id — ID of the MS SQL Server Vulnerability Assessment.custom_databases_users_roles — Map of the custom SQL Databases users rolesterraform_module — Information about this Terraform module.databases_resource — SQL Databases resource list.custom_databases_users — Map of the custom SQL Databases usersidentity_principal_id — SQL Server system identity principal ID.security_alert_policy_id — ID of the MS SQL Server Security Alert Policyresource — SQL Server resource object.administrator_login — SQL Administrator login.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,