@@ -38,6 +38,7 @@ The following resources are used by this module:
3838- [ azurerm_mysql_firewall_rule.firewall] ( https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mysql_firewall_rule ) (resource)
3939- [ azurerm_mysql_server.server] ( https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mysql_server ) (resource)
4040- [ azurerm_mysql_virtual_network_rule.virtualnetworks] ( https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mysql_virtual_network_rule ) (resource)
41+ - [ azurerm_private_endpoint.mysql-private-endpoint] ( https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/private_endpoint ) (resource)
4142
4243## Required Inputs
4344
@@ -49,6 +50,19 @@ Description: Admin password
4950
5051Type: ` string `
5152
53+ ### charset
54+
55+ Description: Charset for the databases, which needs to be a valid PostgreSQL charset
56+
57+ Type: ` string `
58+
59+ ### collation
60+
61+ Description: Collation for the databases, which needs to be a valid PostgreSQL collation. Note that Microsoft uses
62+ different notation - f.e. en-US instead of en\_ US
63+
64+ Type: ` string `
65+
5266### database\_ suffixes
5367
5468Description: List of suffixes for databases to be created
@@ -94,7 +108,8 @@ Default: `"mysqladmin"`
94108### allowed\_ ips
95109
96110Description: A hash of permissions to access the database server by ip. The hash key is the name suffix and each value
97- has a start and an end value.
111+ has a start and an end value. For public access set start\_ ip\_ address to 0.0.0.0 and end\_ ip\_ address to
112+ 255.255.255.255. This variable is not used if public\_ access = false.
98113
99114Type:
100115
@@ -141,27 +156,30 @@ Default: `"8.0"`
141156
142157### public\_ access
143158
144- Description: Wether to allow public access to the database server
159+ Description: Wether to allow public access to the database server. True will create firewall rules for allowed\_ ips and for subnets. False will
160+ create a private endpoint in each given subnet (allowed\_ ips will not be used then) - you have to set
161+ enforce\_ private\_ link\_ endpoint\_ network\_ policies = true on your subnet in this case (see
162+ https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/subnet#enforce_private_link_endpoint_network_policies ).
145163
146164Type: ` bool `
147165
148166Default: ` false `
149167
150- ### suffix
168+ ### subnets
151169
152- Description: Naming suffix to allow multiple instances of this module
170+ Description: Maps of prefix => subnet id that has access to the server
153171
154- Type: ` string `
172+ Type: ` map( string) `
155173
156- Default: ` "" `
174+ Default: ` {} `
157175
158- ### virtual \_ networks
176+ ### suffix
159177
160- Description: Maps of prefix => virtual network id that has access to the server
178+ Description: Naming suffix to allow multiple instances of this module
161179
162- Type: ` map( string) `
180+ Type: ` string `
163181
164- Default: ` {} `
182+ Default: ` "" `
165183
166184## Outputs
167185
0 commit comments