generated from miljodir/terraform-azurerm-template
-
Notifications
You must be signed in to change notification settings - Fork 0
main
github-actions[bot] edited this page Sep 2, 2024
·
3 revisions
To use this module in your Terraform, use the below source value.
module "main" {
source = "[email protected]:miljodir/terraform-azurerm-nsg?ref=1.1.1"
# also any inputs for the module (see below)
}
Name | Version |
---|---|
terraform | ~> 1.5 |
azurerm | >= 3.0, < 5.0 |
Name | Version |
---|---|
azurerm | >= 3.0, < 5.0 |
No modules.
Name | Type |
---|---|
azurerm_network_security_group.nsg | resource |
azurerm_network_security_rule.custom_rules_for | resource |
azurerm_network_security_rule.default_rules_for | resource |
Name | Description | Type | Default | Required |
---|---|---|---|---|
resource_group_name | Name of the resource group | string |
n/a | yes |
custom_rules | Security rules for the network security group using this format name = [priority, direction, access, protocol, source_port_range, destination_port_range, source_address_prefix, destination_address_prefix, description] | any |
[] |
no |
disable_microsegmentation | Disable microsegmentation between subnets? Should only be used if necessary. Defaults to false. | bool |
false |
no |
location | Location (Azure Region) for the network security group. | string |
"norwayeast" |
no |
security_group_name | Network security group name | string |
"nsg" |
no |
tags | The tags to associate with your network security group. | map(string) |
{} |
no |
Name | Description |
---|---|
network_security_group_id | n/a |
network_security_group_name | n/a |
- PR #3 - Multi-repo update: Ensure terraform uses azurerm 4.0 provider
Preparation for 4.0 upgrade
- PR #2 - Remove possibility to run something apart from for_each on nsg rules
Removes support for non for-each rules as these cause issues when being shuffled around.
- PR #1 - Add outline for v1 module
Creates v1 tag of existing module