Skip to content

Commit 9914f82

Browse files
committed
module update
1 parent a78de1d commit 9914f82

File tree

7 files changed

+108
-108
lines changed

7 files changed

+108
-108
lines changed

examples/README.md

Lines changed: 68 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -11,26 +11,25 @@ module "mssql-server" {
1111
source = "kumarvna/mssql-db/azurerm"
1212
version = "1.1.0"
1313
14-
1514
# By default, this module will not create a resource group
1615
# proivde a name to use an existing resource group, specify the existing resource group name,
17-
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
18-
resource_group_name = "rg-shared-westeurope-01"
19-
location = "westeurope"
20-
virtual_network_name = "vnet-shared-hub-westeurope-001"
16+
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
17+
create_resource_group = false
18+
resource_group_name = "rg-shared-westeurope-01"
19+
location = "westeurope"
2120
2221
# SQL Server and Database details
23-
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
22+
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
2423
sqlserver_name = "sqldbserver01"
2524
database_name = "demomssqldb"
2625
sql_database_edition = "Standard"
2726
sqldb_service_objective_name = "S1"
2827
29-
# SQL server extended auditing policy defaults to `true`.
30-
# To turn off set enable_sql_server_extended_auditing_policy to `false`
31-
# DB extended auditing policy defaults to `false`.
32-
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
33-
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
28+
# SQL server extended auditing policy defaults to `true`.
29+
# To turn off set enable_sql_server_extended_auditing_policy to `false`
30+
# DB extended auditing policy defaults to `false`.
31+
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
32+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
3433
enable_threat_detection_policy = true
3534
log_retention_days = 30
3635
@@ -48,7 +47,7 @@ module "mssql-server" {
4847
enable_log_monitoring = true
4948
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
5049
51-
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
50+
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
5251
enable_firewall_rules = true
5352
firewall_rules = [
5453
{
@@ -58,14 +57,14 @@ module "mssql-server" {
5857
},
5958
{
6059
name = "desktop-ip"
61-
start_ip_address = "49.204.225.134"
62-
end_ip_address = "49.204.225.134"
60+
start_ip_address = "49.204.225.49"
61+
end_ip_address = "49.204.225.49"
6362
}
6463
]
6564
6665
# Create and initialize a database with custom SQL script
6766
# need sqlcmd utility to run this command
68-
# your desktop public IP must be added firewall rules to run this command
67+
# your desktop public IP must be added firewall rules to run this command
6968
initialize_sql_script_execution = true
7069
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
7170
@@ -95,17 +94,17 @@ module "mssql-server" {
9594
private_subnet_address_prefix = ["10.1.5.0/29"]
9695
9796
# SQL Server and Database details
98-
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
97+
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
9998
sqlserver_name = "sqldbserver01"
10099
database_name = "demomssqldb"
101100
sql_database_edition = "Standard"
102101
sqldb_service_objective_name = "S1"
103102
104-
# SQL server extended auditing policy defaults to `true`.
105-
# To turn off set enable_sql_server_extended_auditing_policy to `false`
106-
# DB extended auditing policy defaults to `false`.
107-
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
108-
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
103+
# SQL server extended auditing policy defaults to `true`.
104+
# To turn off set enable_sql_server_extended_auditing_policy to `false`
105+
# DB extended auditing policy defaults to `false`.
106+
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
107+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
109108
enable_threat_detection_policy = true
110109
log_retention_days = 30
111110
@@ -126,7 +125,7 @@ module "mssql-server" {
126125
enable_log_monitoring = true
127126
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
128127
129-
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
128+
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
130129
enable_firewall_rules = true
131130
firewall_rules = [
132131
{
@@ -142,8 +141,8 @@ module "mssql-server" {
142141
]
143142
144143
# Create and initialize a database with custom SQL script
145-
# need sqlcmd utility to run this command
146-
# your desktop public IP must be added to firewall rules to run this command
144+
# need sqlcmd utility to run this command
145+
# your desktop public IP must be added to firewall rules to run this command
147146
initialize_sql_script_execution = true
148147
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
149148
@@ -165,23 +164,23 @@ module "mssql-server" {
165164
166165
# By default, this module will not create a resource group
167166
# proivde a name to use an existing resource group, specify the existing resource group name,
168-
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
169-
resource_group_name = "rg-shared-westeurope-01"
170-
location = "westeurope"
171-
virtual_network_name = "vnet-shared-hub-westeurope-001"
167+
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
168+
create_resource_group = false
169+
resource_group_name = "rg-shared-westeurope-01"
170+
location = "westeurope"
172171
173172
# SQL Server and Database details
174-
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
173+
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
175174
sqlserver_name = "sqldbserver01"
176175
database_name = "demomssqldb"
177176
sql_database_edition = "Standard"
178177
sqldb_service_objective_name = "S1"
179178
180-
# SQL server extended auditing policy defaults to `true`.
181-
# To turn off set enable_sql_server_extended_auditing_policy to `false`
182-
# DB extended auditing policy defaults to `false`.
183-
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
184-
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
179+
# SQL server extended auditing policy defaults to `true`.
180+
# To turn off set enable_sql_server_extended_auditing_policy to `false`
181+
# DB extended auditing policy defaults to `false`.
182+
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
183+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
185184
enable_threat_detection_policy = true
186185
log_retention_days = 30
187186
@@ -199,11 +198,11 @@ module "mssql-server" {
199198
enable_log_monitoring = true
200199
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
201200
202-
# Sql failover group creation. required secondary locaiton input.
201+
# Sql failover group creation. required secondary locaiton input.
203202
enable_failover_group = true
204203
secondary_sql_server_location = "northeurope"
205204
206-
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
205+
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
207206
enable_firewall_rules = true
208207
firewall_rules = [
209208
{
@@ -220,7 +219,7 @@ module "mssql-server" {
220219
221220
# Create and initialize a database with custom SQL script
222221
# need sqlcmd utility to run this command
223-
# your desktop public IP must be added firewall rules to run this command
222+
# your desktop public IP must be added firewall rules to run this command
224223
initialize_sql_script_execution = true
225224
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
226225
@@ -250,17 +249,17 @@ module "mssql-server" {
250249
private_subnet_address_prefix = ["10.1.5.0/29"]
251250
252251
# SQL Server and Database details
253-
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
252+
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
254253
sqlserver_name = "sqldbserver01"
255254
database_name = "demomssqldb"
256255
sql_database_edition = "Standard"
257256
sqldb_service_objective_name = "S1"
258257
259-
# SQL server extended auditing policy defaults to `true`.
260-
# To turn off set enable_sql_server_extended_auditing_policy to `false`
261-
# DB extended auditing policy defaults to `false`.
262-
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
263-
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
258+
# SQL server extended auditing policy defaults to `true`.
259+
# To turn off set enable_sql_server_extended_auditing_policy to `false`
260+
# DB extended auditing policy defaults to `false`.
261+
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
262+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
264263
enable_threat_detection_policy = true
265264
log_retention_days = 30
266265
@@ -269,7 +268,7 @@ module "mssql-server" {
269268
enable_vulnerability_assessment = false
270269
email_addresses_for_alerts = ["[email protected]", "[email protected]"]
271270
272-
# Sql failover group creation. required secondary locaiton input.
271+
# Sql failover group creation. required secondary locaiton input.
273272
enable_failover_group = true
274273
secondary_sql_server_location = "northeurope"
275274
@@ -285,7 +284,7 @@ module "mssql-server" {
285284
enable_log_monitoring = true
286285
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
287286
288-
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
287+
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
289288
enable_firewall_rules = true
290289
firewall_rules = [
291290
{
@@ -301,8 +300,8 @@ module "mssql-server" {
301300
]
302301
303302
# Create and initialize a database with custom SQL script
304-
# need sqlcmd utility to run this command
305-
# your desktop public IP must be added to firewall rules to run this command
303+
# need sqlcmd utility to run this command
304+
# your desktop public IP must be added to firewall rules to run this command
306305
initialize_sql_script_execution = true
307306
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
308307
@@ -329,25 +328,25 @@ Run `terraform destroy` when you don't need these resources.
329328

330329
## Outputs
331330

332-
Name | Description
333-
---- | -----------
334-
`resource_group_name` | The name of the resource group in which resources are created
335-
`resource_group_location`| The location of the resource group in which resources are created
336-
`storage_account_id`|The ID of the storage account
337-
`storage_account_name`|The name of the storage account
338-
`primary_sql_server_id`|The primary Microsoft SQL Server ID
339-
`primary_sql_server_fqdn`|The fully qualified domain name of the primary Azure SQL Server
340-
`secondary_sql_server_id`|The secondary Microsoft SQL Server ID
341-
`secondary_sql_server_fqdn`|The fully qualified domain name of the secondary Azure SQL Server
342-
`sql_server_admin_user`|SQL database administrator login id
343-
`sql_server_admin_password`|SQL database administrator login password
344-
`sql_database_id`|The SQL Database ID
345-
`sql_database_name`|The SQL Database Name
346-
`sql_failover_group_id`|A failover group of databases on a collection of Azure SQL servers
347-
`primary_sql_server_private_endpoint`|id of the Primary SQL server Private Endpoint
348-
`secondary_sql_server_private_endpoint`|id of the Primary SQL server Private Endpoint
349-
`sql_server_private_dns_zone_domain`|DNS zone name of SQL server Private endpoints dns name records
350-
`primary_sql_server_private_endpoint_ip`|Primary SQL server private endpoint IPv4 Addresses
351-
`primary_sql_server_private_endpoint_fqdn`|Primary SQL server private endpoint IPv4 Addresses
352-
`secondary_sql_server_private_endpoint_ip`|Secondary SQL server private endpoint IPv4 Addresses
353-
`secondary_sql_server_private_endpoint_fqdn`|Secondary SQL server private endpoint IPv4 Addresses
331+
| Name | Description |
332+
| -------------------------------------------- | ------------------------------------------------------------------ |
333+
| `resource_group_name` | The name of the resource group in which resources are created |
334+
| `resource_group_location` | The location of the resource group in which resources are created |
335+
| `storage_account_id` | The ID of the storage account |
336+
| `storage_account_name` | The name of the storage account |
337+
| `primary_sql_server_id` | The primary Microsoft SQL Server ID |
338+
| `primary_sql_server_fqdn` | The fully qualified domain name of the primary Azure SQL Server |
339+
| `secondary_sql_server_id` | The secondary Microsoft SQL Server ID |
340+
| `secondary_sql_server_fqdn` | The fully qualified domain name of the secondary Azure SQL Server |
341+
| `sql_server_admin_user` | SQL database administrator login id |
342+
| `sql_server_admin_password` | SQL database administrator login password |
343+
| `sql_database_id` | The SQL Database ID |
344+
| `sql_database_name` | The SQL Database Name |
345+
| `sql_failover_group_id` | A failover group of databases on a collection of Azure SQL servers |
346+
| `primary_sql_server_private_endpoint` | id of the Primary SQL server Private Endpoint |
347+
| `secondary_sql_server_private_endpoint` | id of the Primary SQL server Private Endpoint |
348+
| `sql_server_private_dns_zone_domain` | DNS zone name of SQL server Private endpoints dns name records |
349+
| `primary_sql_server_private_endpoint_ip` | Primary SQL server private endpoint IPv4 Addresses |
350+
| `primary_sql_server_private_endpoint_fqdn` | Primary SQL server private endpoint IPv4 Addresses |
351+
| `secondary_sql_server_private_endpoint_ip` | Secondary SQL server private endpoint IPv4 Addresses |
352+
| `secondary_sql_server_private_endpoint_fqdn` | Secondary SQL server private endpoint IPv4 Addresses |

examples/SQL_DB_Using_Geo-replication_with_Auto-Failover_Groups/README.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -11,23 +11,23 @@ module "mssql-server" {
1111
1212
# By default, this module will not create a resource group
1313
# proivde a name to use an existing resource group, specify the existing resource group name,
14-
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
15-
resource_group_name = "rg-shared-westeurope-01"
16-
location = "westeurope"
17-
virtual_network_name = "vnet-shared-hub-westeurope-001"
14+
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
15+
create_resource_group = false
16+
resource_group_name = "rg-shared-westeurope-01"
17+
location = "westeurope"
1818
1919
# SQL Server and Database details
20-
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
20+
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
2121
sqlserver_name = "sqldbserver01"
2222
database_name = "demomssqldb"
2323
sql_database_edition = "Standard"
2424
sqldb_service_objective_name = "S1"
2525
26-
# SQL server extended auditing policy defaults to `true`.
27-
# To turn off set enable_sql_server_extended_auditing_policy to `false`
28-
# DB extended auditing policy defaults to `false`.
29-
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
30-
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
26+
# SQL server extended auditing policy defaults to `true`.
27+
# To turn off set enable_sql_server_extended_auditing_policy to `false`
28+
# DB extended auditing policy defaults to `false`.
29+
# to tun on set the variable `enable_database_extended_auditing_policy` to `true`
30+
# To enable Azure Defender for database set `enable_threat_detection_policy` to true
3131
enable_threat_detection_policy = true
3232
log_retention_days = 30
3333
@@ -45,11 +45,11 @@ module "mssql-server" {
4545
enable_log_monitoring = true
4646
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
4747
48-
# Sql failover group creation. required secondary locaiton input.
48+
# Sql failover group creation. required secondary locaiton input.
4949
enable_failover_group = true
5050
secondary_sql_server_location = "northeurope"
5151
52-
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
52+
# Firewall Rules to allow azure and external clients and specific Ip address/ranges.
5353
enable_firewall_rules = true
5454
firewall_rules = [
5555
{
@@ -66,7 +66,7 @@ module "mssql-server" {
6666
6767
# Create and initialize a database with custom SQL script
6868
# need sqlcmd utility to run this command
69-
# your desktop public IP must be added firewall rules to run this command
69+
# your desktop public IP must be added firewall rules to run this command
7070
initialize_sql_script_execution = true
7171
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
7272

examples/SQL_DB_Using_Geo-replication_with_Auto-Failover_Groups/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ module "mssql-server" {
55
# By default, this module will not create a resource group
66
# proivde a name to use an existing resource group, specify the existing resource group name,
77
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
8-
resource_group_name = "rg-shared-westeurope-01"
9-
location = "westeurope"
10-
virtual_network_name = "vnet-shared-hub-westeurope-001"
8+
create_resource_group = false
9+
resource_group_name = "rg-shared-westeurope-01"
10+
location = "westeurope"
1111

1212
# SQL Server and Database details
1313
# The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11

0 commit comments

Comments
 (0)