nsg

claranet/nsg/azurerm

Terraform Module HCL AZURERM

Terraform module for Azure Network Security Group

Install
module "nsg" {
source = "claranet/nsg/azurerm"
version = "8.1.3"
}
plain text: /constructs/tfmod-claranet-nsg-azurerm/install.txt
⭐ Source on GitHub 📦 Registry page
README

Azure Network Security Group ![Changelog](CHANGELOG.md) ![Notice](NOTICE) ![Apache V2 License](LICENSE) ![OpenTofu Registry](https://search.opentofu.org/module/claranet/nsg/azurerm/) This module creates an Azure Network Security Group with possible predefined rules. The default module configuration deny all inbound traffic. When Flow Logs are enabled Make sure to use a Storage Account with no existing lifecycle management rules as this will add a new rule and overwrite the existing ones. Fore more details, see https://github.com/hashicorp/terraform-provider-azurerm/issues/6935. Global versioning rule for Claranet Azure modules | Module version | Terraform version | OpenTofu version | AzureRM version | | -------------- | ----------------- | ---------------- | --------------- | | >= 8.x.x |

Inputs (44)
NameTypeDescriptionDefault
stackstringProject stack name. required
client_namestringClient name/account used in naming. required
location_shortstringShort string for Azure location. required
resource_group_namestringResource group name. required
locationstringAzure location. required
environmentstringProject environment. required
flow_log_storage_account_idstringNetwork watcher flow log storage account ID.null
winrm_source_allowedanyAllowed source for inbound WinRM traffic. Can be a Service Tag, "*" or a CIDR li[]
additional_ruleslist(object({ priority Additional network security group rules to add. For arguements please refer to [[]
cifs_inbound_allowedboolTrue to allow inbound CIFS traffic.false
custom_namestringSecurity Group custom name.null
ssh_inbound_allowedboolTrue to allow inbound SSH traffic.false
rdp_source_allowedanyAllowed source for inbound RDP traffic. Can be a Service Tag, "*" or a CIDR list[]
application_gateway_rules_enabledboolTrue to configure rules mandatory for hosting an Application Gateway. See [documfalse
load_balancer_rules_enabledboolTrue to configure rules mandatory for hosting a Load Balancer.false
extra_tagsmap(string)Additional tags to associate with your Network Security Group.{}
use_existing_network_watcherboolWhether to use an existing Network Watcher or not? Useful when the Network Watchtrue
network_watcher_resource_group_namestringThe name of the Resource Group in which the Network Watcher was deployed. Changinull
https_inbound_allowedboolTrue to allow inbound HTTPS traffic.false
nfs_source_allowedanyAllowed source for inbound NFSv4 traffic. Can be a Service Tag, "*" or a CIDR li[]
default_tags_enabledboolOption to enable or disable default tags.true
winrm_inbound_allowedboolTrue to allow inbound secure WinRM traffic.false
flow_log_traffic_analytics_interval_in_minutesnumberHow frequently service should do flow analytics in minutes.10
flow_log_locationstringThe location where the Network Watcher Flow Log resides. Changing this forces a null
network_watcher_namestringThe name of the Network Watcher. Changing this forces a new resource to be creatnull
flow_log_traffic_analytics_enabledboolBoolean flag to enable/disable traffic analytics.true
… and 4 more inputs
Outputs (6)
resource — Network security group resource object.
id — Network security group ID.
name — Network security group name.
network_watcher_flow_log_id — Network watcher flow log ID.
network_watcher_flow_log_resource — Network watcher flow log resource object.
resource_group_name — Network security group resource group name.
Resources (3)
azurerm_network_security_groupazurerm_network_security_ruleazurerm_network_watcher_flow_log
Details
FrameworkTerraform Module
LanguageHCL
Version8.1.3
Cloud AZURERM
★ Stars6
Forks17
Total downloads285.3k
Inputs44
Outputs6
Resources3
Examples1
LicenseApache-2.0
Namespaceclaranet
Updated