@@ -11,26 +11,25 @@ module "mssql-server" {
1111 source = "kumarvna/mssql-db/azurerm"
1212 version = "1.1.0"
1313
14-
1514 # By default, this module will not create a resource group
1615 # proivde a name to use an existing resource group, specify the existing resource group name,
17- # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
18- resource_group_name = "rg-shared-westeurope-01"
19- location = "westeurope"
20- virtual_network_name = "vnet-shared-hub- westeurope-001 "
16+ # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
17+ create_resource_group = false
18+ resource_group_name = "rg-shared- westeurope-01 "
19+ location = "westeurope"
2120
2221 # SQL Server and Database details
23- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
22+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
2423 sqlserver_name = "sqldbserver01"
2524 database_name = "demomssqldb"
2625 sql_database_edition = "Standard"
2726 sqldb_service_objective_name = "S1"
2827
29- # SQL server extended auditing policy defaults to `true`.
30- # To turn off set enable_sql_server_extended_auditing_policy to `false`
31- # DB extended auditing policy defaults to `false`.
32- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
33- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
28+ # SQL server extended auditing policy defaults to `true`.
29+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
30+ # DB extended auditing policy defaults to `false`.
31+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
32+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
3433 enable_threat_detection_policy = true
3534 log_retention_days = 30
3635
@@ -48,7 +47,7 @@ module "mssql-server" {
4847 enable_log_monitoring = true
4948 log_analytics_workspace_name = "loganalytics-we-sharedtest2"
5049
51- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
50+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
5251 enable_firewall_rules = true
5352 firewall_rules = [
5453 {
@@ -58,14 +57,14 @@ module "mssql-server" {
5857 },
5958 {
6059 name = "desktop-ip"
61- start_ip_address = "49.204.225.134 "
62- end_ip_address = "49.204.225.134 "
60+ start_ip_address = "49.204.225.49 "
61+ end_ip_address = "49.204.225.49 "
6362 }
6463 ]
6564
6665 # Create and initialize a database with custom SQL script
6766 # need sqlcmd utility to run this command
68- # your desktop public IP must be added firewall rules to run this command
67+ # your desktop public IP must be added firewall rules to run this command
6968 initialize_sql_script_execution = true
7069 sqldb_init_script_file = "../artifacts/db-init-sample.sql"
7170
@@ -95,17 +94,17 @@ module "mssql-server" {
9594 private_subnet_address_prefix = ["10.1.5.0/29"]
9695
9796 # SQL Server and Database details
98- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
97+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
9998 sqlserver_name = "sqldbserver01"
10099 database_name = "demomssqldb"
101100 sql_database_edition = "Standard"
102101 sqldb_service_objective_name = "S1"
103102
104- # SQL server extended auditing policy defaults to `true`.
105- # To turn off set enable_sql_server_extended_auditing_policy to `false`
106- # DB extended auditing policy defaults to `false`.
107- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
108- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
103+ # SQL server extended auditing policy defaults to `true`.
104+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
105+ # DB extended auditing policy defaults to `false`.
106+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
107+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
109108 enable_threat_detection_policy = true
110109 log_retention_days = 30
111110
@@ -126,7 +125,7 @@ module "mssql-server" {
126125 enable_log_monitoring = true
127126 log_analytics_workspace_name = "loganalytics-we-sharedtest2"
128127
129- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
128+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
130129 enable_firewall_rules = true
131130 firewall_rules = [
132131 {
@@ -142,8 +141,8 @@ module "mssql-server" {
142141 ]
143142
144143 # Create and initialize a database with custom SQL script
145- # need sqlcmd utility to run this command
146- # your desktop public IP must be added to firewall rules to run this command
144+ # need sqlcmd utility to run this command
145+ # your desktop public IP must be added to firewall rules to run this command
147146 initialize_sql_script_execution = true
148147 sqldb_init_script_file = "../artifacts/db-init-sample.sql"
149148
@@ -165,23 +164,23 @@ module "mssql-server" {
165164
166165 # By default, this module will not create a resource group
167166 # proivde a name to use an existing resource group, specify the existing resource group name,
168- # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
169- resource_group_name = "rg-shared-westeurope-01"
170- location = "westeurope"
171- virtual_network_name = "vnet-shared-hub- westeurope-001 "
167+ # and set the argument to `create_resource_group = false`. Location will be same as existing RG.
168+ create_resource_group = false
169+ resource_group_name = "rg-shared- westeurope-01 "
170+ location = "westeurope"
172171
173172 # SQL Server and Database details
174- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
173+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
175174 sqlserver_name = "sqldbserver01"
176175 database_name = "demomssqldb"
177176 sql_database_edition = "Standard"
178177 sqldb_service_objective_name = "S1"
179178
180- # SQL server extended auditing policy defaults to `true`.
181- # To turn off set enable_sql_server_extended_auditing_policy to `false`
182- # DB extended auditing policy defaults to `false`.
183- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
184- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
179+ # SQL server extended auditing policy defaults to `true`.
180+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
181+ # DB extended auditing policy defaults to `false`.
182+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
183+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
185184 enable_threat_detection_policy = true
186185 log_retention_days = 30
187186
@@ -199,11 +198,11 @@ module "mssql-server" {
199198 enable_log_monitoring = true
200199 log_analytics_workspace_name = "loganalytics-we-sharedtest2"
201200
202- # Sql failover group creation. required secondary locaiton input.
201+ # Sql failover group creation. required secondary locaiton input.
203202 enable_failover_group = true
204203 secondary_sql_server_location = "northeurope"
205204
206- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
205+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
207206 enable_firewall_rules = true
208207 firewall_rules = [
209208 {
@@ -220,7 +219,7 @@ module "mssql-server" {
220219
221220 # Create and initialize a database with custom SQL script
222221 # need sqlcmd utility to run this command
223- # your desktop public IP must be added firewall rules to run this command
222+ # your desktop public IP must be added firewall rules to run this command
224223 initialize_sql_script_execution = true
225224 sqldb_init_script_file = "../artifacts/db-init-sample.sql"
226225
@@ -250,17 +249,17 @@ module "mssql-server" {
250249 private_subnet_address_prefix = ["10.1.5.0/29"]
251250
252251 # SQL Server and Database details
253- # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
252+ # The valid service objective name for the database include S0, S1, S2, S3, P1, P2, P4, P6, P11
254253 sqlserver_name = "sqldbserver01"
255254 database_name = "demomssqldb"
256255 sql_database_edition = "Standard"
257256 sqldb_service_objective_name = "S1"
258257
259- # SQL server extended auditing policy defaults to `true`.
260- # To turn off set enable_sql_server_extended_auditing_policy to `false`
261- # DB extended auditing policy defaults to `false`.
262- # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
263- # To enable Azure Defender for database set `enable_threat_detection_policy` to true
258+ # SQL server extended auditing policy defaults to `true`.
259+ # To turn off set enable_sql_server_extended_auditing_policy to `false`
260+ # DB extended auditing policy defaults to `false`.
261+ # to tun on set the variable `enable_database_extended_auditing_policy` to `true`
262+ # To enable Azure Defender for database set `enable_threat_detection_policy` to true
264263 enable_threat_detection_policy = true
265264 log_retention_days = 30
266265
@@ -269,7 +268,7 @@ module "mssql-server" {
269268 enable_vulnerability_assessment = false
270269 email_addresses_for_alerts = ["[email protected] ", "[email protected] "] 271270
272- # Sql failover group creation. required secondary locaiton input.
271+ # Sql failover group creation. required secondary locaiton input.
273272 enable_failover_group = true
274273 secondary_sql_server_location = "northeurope"
275274
@@ -285,7 +284,7 @@ module "mssql-server" {
285284 enable_log_monitoring = true
286285 log_analytics_workspace_name = "loganalytics-we-sharedtest2"
287286
288- # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
287+ # Firewall Rules to allow azure and external clients and specific Ip address/ranges.
289288 enable_firewall_rules = true
290289 firewall_rules = [
291290 {
@@ -301,8 +300,8 @@ module "mssql-server" {
301300 ]
302301
303302 # Create and initialize a database with custom SQL script
304- # need sqlcmd utility to run this command
305- # your desktop public IP must be added to firewall rules to run this command
303+ # need sqlcmd utility to run this command
304+ # your desktop public IP must be added to firewall rules to run this command
306305 initialize_sql_script_execution = true
307306 sqldb_init_script_file = "../artifacts/db-init-sample.sql"
308307
@@ -329,25 +328,25 @@ Run `terraform destroy` when you don't need these resources.
329328
330329## Outputs
331330
332- Name | Description
333- ---- | -----------
334- ` resource_group_name ` | The name of the resource group in which resources are created
335- ` resource_group_location ` | The location of the resource group in which resources are created
336- ` storage_account_id ` | The ID of the storage account
337- ` storage_account_name ` | The name of the storage account
338- ` primary_sql_server_id ` | The primary Microsoft SQL Server ID
339- ` primary_sql_server_fqdn ` | The fully qualified domain name of the primary Azure SQL Server
340- ` secondary_sql_server_id ` | The secondary Microsoft SQL Server ID
341- ` secondary_sql_server_fqdn ` | The fully qualified domain name of the secondary Azure SQL Server
342- ` sql_server_admin_user ` | SQL database administrator login id
343- ` sql_server_admin_password ` | SQL database administrator login password
344- ` sql_database_id ` | The SQL Database ID
345- ` sql_database_name ` | The SQL Database Name
346- ` sql_failover_group_id ` | A failover group of databases on a collection of Azure SQL servers
347- ` primary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint
348- ` secondary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint
349- ` sql_server_private_dns_zone_domain ` | DNS zone name of SQL server Private endpoints dns name records
350- ` primary_sql_server_private_endpoint_ip ` | Primary SQL server private endpoint IPv4 Addresses
351- ` primary_sql_server_private_endpoint_fqdn ` | Primary SQL server private endpoint IPv4 Addresses
352- ` secondary_sql_server_private_endpoint_ip ` | Secondary SQL server private endpoint IPv4 Addresses
353- ` secondary_sql_server_private_endpoint_fqdn ` | Secondary SQL server private endpoint IPv4 Addresses
331+ | Name | Description |
332+ | -------------------------------------------- | ------------------------------------------------------------------ |
333+ | ` resource_group_name ` | The name of the resource group in which resources are created |
334+ | ` resource_group_location ` | The location of the resource group in which resources are created |
335+ | ` storage_account_id ` | The ID of the storage account |
336+ | ` storage_account_name ` | The name of the storage account |
337+ | ` primary_sql_server_id ` | The primary Microsoft SQL Server ID |
338+ | ` primary_sql_server_fqdn ` | The fully qualified domain name of the primary Azure SQL Server |
339+ | ` secondary_sql_server_id ` | The secondary Microsoft SQL Server ID |
340+ | ` secondary_sql_server_fqdn ` | The fully qualified domain name of the secondary Azure SQL Server |
341+ | ` sql_server_admin_user ` | SQL database administrator login id |
342+ | ` sql_server_admin_password ` | SQL database administrator login password |
343+ | ` sql_database_id ` | The SQL Database ID |
344+ | ` sql_database_name ` | The SQL Database Name |
345+ | ` sql_failover_group_id ` | A failover group of databases on a collection of Azure SQL servers |
346+ | ` primary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint |
347+ | ` secondary_sql_server_private_endpoint ` | id of the Primary SQL server Private Endpoint |
348+ | ` sql_server_private_dns_zone_domain ` | DNS zone name of SQL server Private endpoints dns name records |
349+ | ` primary_sql_server_private_endpoint_ip ` | Primary SQL server private endpoint IPv4 Addresses |
350+ | ` primary_sql_server_private_endpoint_fqdn ` | Primary SQL server private endpoint IPv4 Addresses |
351+ | ` secondary_sql_server_private_endpoint_ip ` | Secondary SQL server private endpoint IPv4 Addresses |
352+ | ` secondary_sql_server_private_endpoint_fqdn ` | Secondary SQL server private endpoint IPv4 Addresses |
0 commit comments