@@ -11,26 +11,25 @@ module "mssql-server" {
11
11
source = "kumarvna/mssql-db/azurerm"
12
12
version = "1.1.0"
13
13
14
-
15
14
# By default, this module will not create a resource group
16
15
# proivde a name to use an existing resource group, specify the existing resource group name,
17
- # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
18
- resource_group_name = "rg-shared-westeurope-01"
19
- location = "westeurope"
20
- virtual_network_name = "vnet-shared-hub- westeurope-001 "
16
+ # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
17
+ create_resource_group = false
18
+ resource_group_name = "rg-shared- westeurope-01 "
19
+ location = "westeurope"
21
20
22
21
# SQL Server and Database details
23
- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
22
+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
24
23
sqlserver_name = "sqldbserver01"
25
24
database_name = "demomssqldb"
26
25
sql_database_edition = "Standard"
27
26
sqldb_service_objective_name = "S1"
28
27
29
- # SQL server extended auditing policy defaults to `true`.
30
- # To turn off set enable_sql_server_extended_auditing_policy to `false`
31
- # DB extended auditing policy defaults to `false`.
32
- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
33
- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
28
+ # SQL server extended auditing policy defaults to `true`.
29
+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
30
+ # DB extended auditing policy defaults to `false`.
31
+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
32
+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
34
33
enable_threat_detection_policy = true
35
34
log_retention_days = 30
36
35
@@ -48,7 +47,7 @@ module "mssql-server" {
48
47
enable_log_monitoring = true
49
48
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
50
49
51
- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
50
+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
52
51
enable_firewall_rules = true
53
52
firewall_rules = [
54
53
{
@@ -58,14 +57,14 @@ module "mssql-server" {
58
57
},
59
58
{
60
59
name = "desktop-ip"
61
- start_ip_address = "49.204.225.134 "
62
- end_ip_address = "49.204.225.134 "
60
+ start_ip_address = "49.204.225.49 "
61
+ end_ip_address = "49.204.225.49 "
63
62
}
64
63
]
65
64
66
65
# Create and initialize a database with custom SQL script
67
66
# need sqlcmd utility to run this command
68
- # your desktop public IP must be added firewall rules to run this command
67
+ # your desktop public IP must be added firewall rules to run this command
69
68
initialize_sql_script_execution = true
70
69
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
71
70
@@ -95,17 +94,17 @@ module "mssql-server" {
95
94
private_subnet_address_prefix = ["10.1.5.0/29"]
96
95
97
96
# SQL Server and Database details
98
- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
97
+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
99
98
sqlserver_name = "sqldbserver01"
100
99
database_name = "demomssqldb"
101
100
sql_database_edition = "Standard"
102
101
sqldb_service_objective_name = "S1"
103
102
104
- # SQL server extended auditing policy defaults to `true`.
105
- # To turn off set enable_sql_server_extended_auditing_policy to `false`
106
- # DB extended auditing policy defaults to `false`.
107
- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
108
- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
103
+ # SQL server extended auditing policy defaults to `true`.
104
+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
105
+ # DB extended auditing policy defaults to `false`.
106
+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
107
+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
109
108
enable_threat_detection_policy = true
110
109
log_retention_days = 30
111
110
@@ -126,7 +125,7 @@ module "mssql-server" {
126
125
enable_log_monitoring = true
127
126
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
128
127
129
- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
128
+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
130
129
enable_firewall_rules = true
131
130
firewall_rules = [
132
131
{
@@ -142,8 +141,8 @@ module "mssql-server" {
142
141
]
143
142
144
143
# Create and initialize a database with custom SQL script
145
- # need sqlcmd utility to run this command
146
- # your desktop public IP must be added to firewall rules to run this command
144
+ # need sqlcmd utility to run this command
145
+ # your desktop public IP must be added to firewall rules to run this command
147
146
initialize_sql_script_execution = true
148
147
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
149
148
@@ -165,23 +164,23 @@ module "mssql-server" {
165
164
166
165
# By default, this module will not create a resource group
167
166
# proivde a name to use an existing resource group, specify the existing resource group name,
168
- # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
169
- resource_group_name = "rg-shared-westeurope-01"
170
- location = "westeurope"
171
- virtual_network_name = "vnet-shared-hub- westeurope-001 "
167
+ # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
168
+ create_resource_group = false
169
+ resource_group_name = "rg-shared- westeurope-01 "
170
+ location = "westeurope"
172
171
173
172
# SQL Server and Database details
174
- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
173
+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
175
174
sqlserver_name = "sqldbserver01"
176
175
database_name = "demomssqldb"
177
176
sql_database_edition = "Standard"
178
177
sqldb_service_objective_name = "S1"
179
178
180
- # SQL server extended auditing policy defaults to `true`.
181
- # To turn off set enable_sql_server_extended_auditing_policy to `false`
182
- # DB extended auditing policy defaults to `false`.
183
- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
184
- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
179
+ # SQL server extended auditing policy defaults to `true`.
180
+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
181
+ # DB extended auditing policy defaults to `false`.
182
+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
183
+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
185
184
enable_threat_detection_policy = true
186
185
log_retention_days = 30
187
186
@@ -199,11 +198,11 @@ module "mssql-server" {
199
198
enable_log_monitoring = true
200
199
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
201
200
202
- # Sql failover group creation. required secondary locaiton input.
201
+ # Sql failover group creation. required secondary locaiton input.
203
202
enable_failover_group = true
204
203
secondary_sql_server_location = "northeurope"
205
204
206
- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
205
+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
207
206
enable_firewall_rules = true
208
207
firewall_rules = [
209
208
{
@@ -220,7 +219,7 @@ module "mssql-server" {
220
219
221
220
# Create and initialize a database with custom SQL script
222
221
# need sqlcmd utility to run this command
223
- # your desktop public IP must be added firewall rules to run this command
222
+ # your desktop public IP must be added firewall rules to run this command
224
223
initialize_sql_script_execution = true
225
224
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
226
225
@@ -250,17 +249,17 @@ module "mssql-server" {
250
249
private_subnet_address_prefix = ["10.1.5.0/29"]
251
250
252
251
# SQL Server and Database details
253
- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
252
+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
254
253
sqlserver_name = "sqldbserver01"
255
254
database_name = "demomssqldb"
256
255
sql_database_edition = "Standard"
257
256
sqldb_service_objective_name = "S1"
258
257
259
- # SQL server extended auditing policy defaults to `true`.
260
- # To turn off set enable_sql_server_extended_auditing_policy to `false`
261
- # DB extended auditing policy defaults to `false`.
262
- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
263
- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
258
+ # SQL server extended auditing policy defaults to `true`.
259
+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
260
+ # DB extended auditing policy defaults to `false`.
261
+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
262
+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
264
263
enable_threat_detection_policy = true
265
264
log_retention_days = 30
266
265
@@ -269,7 +268,7 @@ module "mssql-server" {
269
268
enable_vulnerability_assessment = false
270
269
email_addresses_for_alerts = ["[email protected] ", "[email protected] "]
271
270
272
- # Sql failover group creation. required secondary locaiton input.
271
+ # Sql failover group creation. required secondary locaiton input.
273
272
enable_failover_group = true
274
273
secondary_sql_server_location = "northeurope"
275
274
@@ -285,7 +284,7 @@ module "mssql-server" {
285
284
enable_log_monitoring = true
286
285
log_analytics_workspace_name = "loganalytics-we-sharedtest2"
287
286
288
- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
287
+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
289
288
enable_firewall_rules = true
290
289
firewall_rules = [
291
290
{
@@ -301,8 +300,8 @@ module "mssql-server" {
301
300
]
302
301
303
302
# Create and initialize a database with custom SQL script
304
- # need sqlcmd utility to run this command
305
- # your desktop public IP must be added to firewall rules to run this command
303
+ # need sqlcmd utility to run this command
304
+ # your desktop public IP must be added to firewall rules to run this command
306
305
initialize_sql_script_execution = true
307
306
sqldb_init_script_file = "../artifacts/db-init-sample.sql"
308
307
@@ -329,25 +328,25 @@ Run `terraform destroy` when you don't need these resources.
329
328
330
329
## Outputs
331
330
332
- Name | Description
333
- ---- | -----------
334
- ` resource_group_name ` | The name of the resource group in which resources are created
335
- ` resource_group_location ` | The location of the resource group in which resources are created
336
- ` storage_account_id ` | The ID of the storage account
337
- ` storage_account_name ` | The name of the storage account
338
- ` primary_sql_server_id ` | The primary Microsoft SQL Server ID
339
- ` primary_sql_server_fqdn ` | The fully qualified domain name of the primary Azure SQL Server
340
- ` secondary_sql_server_id ` | The secondary Microsoft SQL Server ID
341
- ` secondary_sql_server_fqdn ` | The fully qualified domain name of the secondary Azure SQL Server
342
- ` sql_server_admin_user ` | SQL database administrator login id
343
- ` sql_server_admin_password ` | SQL database administrator login password
344
- ` sql_database_id ` | The SQL Database ID
345
- ` sql_database_name ` | The SQL Database Name
346
- ` sql_failover_group_id ` | A failover group of databases on a collection of Azure SQL servers
347
- ` primary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint
348
- ` secondary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint
349
- ` sql_server_private_dns_zone_domain ` | DNS zone name of SQL server Private endpoints dns name records
350
- ` primary_sql_server_private_endpoint_ip ` | Primary SQL server private endpoint IPv4 Addresses
351
- ` primary_sql_server_private_endpoint_fqdn ` | Primary SQL server private endpoint IPv4 Addresses
352
- ` secondary_sql_server_private_endpoint_ip ` | Secondary SQL server private endpoint IPv4 Addresses
353
- ` secondary_sql_server_private_endpoint_fqdn ` | Secondary SQL server private endpoint IPv4 Addresses
331
+ | Name | Description |
332
+ | -------------------------------------------- | ------------------------------------------------------------------ |
333
+ | ` resource_group_name ` | The name of the resource group in which resources are created |
334
+ | ` resource_group_location ` | The location of the resource group in which resources are created |
335
+ | ` storage_account_id ` | The ID of the storage account |
336
+ | ` storage_account_name ` | The name of the storage account |
337
+ | ` primary_sql_server_id ` | The primary Microsoft SQL Server ID |
338
+ | ` primary_sql_server_fqdn ` | The fully qualified domain name of the primary Azure SQL Server |
339
+ | ` secondary_sql_server_id ` | The secondary Microsoft SQL Server ID |
340
+ | ` secondary_sql_server_fqdn ` | The fully qualified domain name of the secondary Azure SQL Server |
341
+ | ` sql_server_admin_user ` | SQL database administrator login id |
342
+ | ` sql_server_admin_password ` | SQL database administrator login password |
343
+ | ` sql_database_id ` | The SQL Database ID |
344
+ | ` sql_database_name ` | The SQL Database Name |
345
+ | ` sql_failover_group_id ` | A failover group of databases on a collection of Azure SQL servers |
346
+ | ` primary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint |
347
+ | ` secondary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint |
348
+ | ` sql_server_private_dns_zone_domain ` | DNS zone name of SQL server Private endpoints dns name records |
349
+ | ` primary_sql_server_private_endpoint_ip ` | Primary SQL server private endpoint IPv4 Addresses |
350
+ | ` primary_sql_server_private_endpoint_fqdn ` | Primary SQL server private endpoint IPv4 Addresses |
351
+ | ` secondary_sql_server_private_endpoint_ip ` | Secondary SQL server private endpoint IPv4 Addresses |
352
+ | ` secondary_sql_server_private_endpoint_fqdn ` | Secondary SQL server private endpoint IPv4 Addresses |
0 commit comments