diff --git a/README.md b/README.md
index 8a42027..9869818 100644
--- a/README.md
+++ b/README.md
@@ -49,14 +49,14 @@ No modules.
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [vnet\_name](#input\_vnet\_name) | The name of the virtual network. | `string` | n/a | yes |
-| [azure\_bastion\_security\_rules](#input\_azure\_bastion\_security\_rules) | A map of security rules to be created in the AzureBastionSubnet Network Security Group. The key of the map is the name of the security rule.
This Map contains the required rules for the Azure Bastion Subnet. These rules are required for the Azure Bastion service to work properly.
This map is merged with the default rules and security rules to create the final set of rules for the Azure Bastion Subnet.
hclhcl |
subnets = {
"AzureBastionSubnet" = {
address_prefixes = ["100.0.5.0/24"]
}
map(object({|
access = string
name = string
direction = string
priority = number
protocol = string
description = optional(string)
destination_address_prefix = optional(string, null)
destination_address_prefixes = optional(set(string), null)
destination_application_security_group_ids = optional(set(string), null)
destination_port_range = optional(string, null)
destination_port_ranges = optional(set(string), null)
source_address_prefix = optional(string, null)
source_address_prefixes = optional(set(string), null)
source_application_security_group_ids = optional(set(string), null)
source_port_range = optional(string, null)
source_port_ranges = optional(set(string), null)
timeouts = optional(object({
create = optional(string, "30")
delete = optional(string, "30")
read = optional(string, "5")
update = optional(string, "30")
}))
}))
{| no | -| [default\_rules](#input\_default\_rules) | A map of default security rules to be created in **every** Network Security Group, except if you specificy "network\_security\_group\_config -> Azure default" in the subnet configuration.
"Allow-DataPlane-in-from-VirtualNetwork": {
"access": "Allow",
"description": "Allow DataPlane traffic from the VirtualNetwork",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "8080",
"direction": "Inbound",
"name": "Allow-DataPlane-in-from-VirtualNetwork",
"priority": 4042,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Allow-DataPlane-in-from-VirtualNetwork-5701": {
"access": "Allow",
"description": "Allow DataPlane traffic from the VirtualNetwork on port 5701",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "5701",
"direction": "Inbound",
"name": "Allow-DataPlane-in-from-VirtualNetwork-5701",
"priority": 4043,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Allow-DataPlane-out-to-VirtualNetwork-5701": {
"access": "Allow",
"description": "Allow DataPlane traffic to the VirtualNetwork on port 5701",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "5701",
"direction": "Outbound",
"name": "Allow-DataPlane-out-to-VirtualNetwork-5701",
"priority": 4043,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-DataPlane-out-to-VirtualNetwork-8080": {
"access": "Allow",
"description": "Allow DataPlane traffic to the VirtualNetwork on port 8080",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "8080",
"direction": "Outbound",
"name": "Allow-DataPlane-out-to-VirtualNetwork-8080",
"priority": 4042,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Http-out-to-Internet": {
"access": "Allow",
"description": "Allow HTTP traffic to the Internet",
"destination_address_prefix": "Internet",
"destination_port_range": "80",
"direction": "Outbound",
"name": "Allow-Http-out-to-Internet",
"priority": 4045,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Https-in-from-AzureLoadBalancer": {
"access": "Allow",
"description": "Allow HTTPS traffic from the AzureLoadBalancer",
"destination_address_prefix": "*",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-AzureLoadBalancer",
"priority": 4044,
"protocol": "Tcp",
"source_address_prefix": "AzureLoadBalancer",
"source_port_range": "*"
},
"Allow-Https-in-from-GatewayManager": {
"access": "Allow",
"description": "Allow HTTPS traffic from the GatewayManager",
"destination_address_prefix": "*",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-GatewayManager",
"priority": 4041,
"protocol": "Tcp",
"source_address_prefix": "GatewayManager",
"source_port_range": "*"
},
"Allow-Https-in-from-Internet": {
"access": "Allow",
"description": "Allow HTTPS traffic from the Internet",
"destination_address_prefix": "*",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-Internet",
"priority": 4040,
"protocol": "Tcp",
"source_address_prefix": "Internet",
"source_port_range": "*"
},
"Allow-Https-out-to-AzureCloud": {
"access": "Allow",
"description": "Allow HTTPS traffic to the AzureCloud",
"destination_address_prefix": "AzureCloud",
"destination_port_range": "443",
"direction": "Outbound",
"name": "Allow-Https-out-to-AzureCloud",
"priority": 4044,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Rdp-out-to-VirtualNetwork": {
"access": "Allow",
"description": "Allow RDP traffic to the VirtualNetwork",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "3389",
"direction": "Outbound",
"name": "Allow-Rdp-out-to-VirtualNetwork",
"priority": 4040,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Ssh-out-to-VirtualNetwork": {
"access": "Allow",
"description": "Allow SSH traffic to the VirtualNetwork",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "22",
"direction": "Outbound",
"name": "Allow-Ssh-out-to-VirtualNetwork",
"priority": 4041,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
}
}
hclhcl |
subnets = {
"ToolingSubnet" = {
address_prefixes = ["100.0.3.0/24"]
default_outbound_access_enabled = false
create_network_security_group = true
network_security_group_config = {
azure_default = true
}
}
map(object({|
access = string
name = string
direction = string
priority = number
protocol = string
description = optional(string)
destination_address_prefix = optional(string, null)
destination_address_prefixes = optional(set(string), null)
destination_application_security_group_ids = optional(set(string), null)
destination_port_range = optional(string, null)
destination_port_ranges = optional(set(string), null)
source_address_prefix = optional(string, null)
source_address_prefixes = optional(set(string), null)
source_application_security_group_ids = optional(set(string), null)
source_port_range = optional(string, null)
source_port_ranges = optional(set(string), null)
timeouts = optional(object({
create = optional(string, "30")
delete = optional(string, "30")
read = optional(string, "5")
update = optional(string, "30")
}))
}))
{| no | -| [natgateway](#input\_natgateway) | This object describes the public IP configuration when creating Nat Gateway's with a public IP. If creating more than one public IP, then these values will be used for all public IPs.
"Allow-Https-in-from-vnets": {
"access": "Allow",
"description": "Allow HTTPS traffic from VNets",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-vnets",
"priority": 4095,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Allow-Https-out-to-vnets": {
"access": "Allow",
"description": "Allow HTTPS traffic to VNets",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "443",
"direction": "Outbound",
"name": "Allow-Https-out-to-vnets",
"priority": 4095,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Deny-Any-Any-Any-In": {
"access": "Deny",
"description": "Deny all inbound traffic",
"destination_address_prefix": "*",
"destination_port_range": "*",
"direction": "Inbound",
"name": "Deny-Any-Any-Any-In",
"priority": 4096,
"protocol": "*",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Deny-Any-Any-Any-Out": {
"access": "Deny",
"description": "Deny all outbound traffic",
"destination_address_prefix": "*",
"destination_port_range": "*",
"direction": "Outbound",
"name": "Deny-Any-Any-Any-Out",
"priority": 4096,
"protocol": "*",
"source_address_prefix": "*",
"source_port_range": "*"
}
}
hclhcl |
natgateway = {
name = "my-nat-gw"
}
object({| `null` | no | +| [azure\_bastion\_security\_rules](#input\_azure\_bastion\_security\_rules) | A map of security rules to be created in the AzureBastionSubnet Network Security Group. The key of the map is the name of the security rule.
allocation_method = optional(string, "Static")
ddos_protection_mode = optional(string, "VirtualNetworkInherited")
ddos_protection_plan_id = optional(string, null)
domain_name_label = optional(string, null)
idle_timeout_in_minutes = optional(number, 4)
inherit_tags = optional(bool, true)
ip_version = optional(string, "IPv4")
lock_level = optional(string, null)
name = optional(string, null)
sku = optional(string, "Standard")
sku_tier = optional(string, "Regional")
zones = optional(list(string))
})
hclhcl |
subnets = {
"AzureBastionSubnet" = {
address_prefixes = ["100.0.5.0/24"]
}
map(object({|
name = string
access = string
direction = string
priority = number
protocol = string
description = optional(string)
destination_address_prefix = optional(string, null)
destination_address_prefixes = optional(set(string), null)
destination_application_security_group_ids = optional(set(string), null)
destination_port_range = optional(string, null)
destination_port_ranges = optional(set(string), null)
source_address_prefix = optional(string, null)
source_address_prefixes = optional(set(string), null)
source_application_security_group_ids = optional(set(string), null)
source_port_range = optional(string, null)
source_port_ranges = optional(set(string), null)
timeouts = optional(object({
create = optional(string, "30")
delete = optional(string, "30")
read = optional(string, "5")
update = optional(string, "30")
}))
}))
{| no | +| [default\_rules](#input\_default\_rules) | A map of default security rules to be created in **every** Network Security Group, except if you specificy "network\_security\_group\_config -> Azure default" in the subnet configuration.
"Allow-DataPlane-in-from-VirtualNetwork": {
"access": "Allow",
"description": "Allow DataPlane traffic from the VirtualNetwork",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "8080",
"direction": "Inbound",
"name": "Allow-DataPlane-in-from-VirtualNetwork",
"priority": 4042,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Allow-DataPlane-in-from-VirtualNetwork-5701": {
"access": "Allow",
"description": "Allow DataPlane traffic from the VirtualNetwork on port 5701",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "5701",
"direction": "Inbound",
"name": "Allow-DataPlane-in-from-VirtualNetwork-5701",
"priority": 4043,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Allow-DataPlane-out-to-VirtualNetwork-5701": {
"access": "Allow",
"description": "Allow DataPlane traffic to the VirtualNetwork on port 5701",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "5701",
"direction": "Outbound",
"name": "Allow-DataPlane-out-to-VirtualNetwork-5701",
"priority": 4043,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-DataPlane-out-to-VirtualNetwork-8080": {
"access": "Allow",
"description": "Allow DataPlane traffic to the VirtualNetwork on port 8080",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "8080",
"direction": "Outbound",
"name": "Allow-DataPlane-out-to-VirtualNetwork-8080",
"priority": 4042,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Http-out-to-Internet": {
"access": "Allow",
"description": "Allow HTTP traffic to the Internet",
"destination_address_prefix": "Internet",
"destination_port_range": "80",
"direction": "Outbound",
"name": "Allow-Http-out-to-Internet",
"priority": 4045,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Https-in-from-AzureLoadBalancer": {
"access": "Allow",
"description": "Allow HTTPS traffic from the AzureLoadBalancer",
"destination_address_prefix": "*",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-AzureLoadBalancer",
"priority": 4044,
"protocol": "Tcp",
"source_address_prefix": "AzureLoadBalancer",
"source_port_range": "*"
},
"Allow-Https-in-from-GatewayManager": {
"access": "Allow",
"description": "Allow HTTPS traffic from the GatewayManager",
"destination_address_prefix": "*",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-GatewayManager",
"priority": 4041,
"protocol": "Tcp",
"source_address_prefix": "GatewayManager",
"source_port_range": "*"
},
"Allow-Https-in-from-Internet": {
"access": "Allow",
"description": "Allow HTTPS traffic from the Internet",
"destination_address_prefix": "*",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-Internet",
"priority": 4040,
"protocol": "Tcp",
"source_address_prefix": "Internet",
"source_port_range": "*"
},
"Allow-Https-out-to-AzureCloud": {
"access": "Allow",
"description": "Allow HTTPS traffic to the AzureCloud",
"destination_address_prefix": "AzureCloud",
"destination_port_range": "443",
"direction": "Outbound",
"name": "Allow-Https-out-to-AzureCloud",
"priority": 4044,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Rdp-out-to-VirtualNetwork": {
"access": "Allow",
"description": "Allow RDP traffic to the VirtualNetwork",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "3389",
"direction": "Outbound",
"name": "Allow-Rdp-out-to-VirtualNetwork",
"priority": 4040,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Allow-Ssh-out-to-VirtualNetwork": {
"access": "Allow",
"description": "Allow SSH traffic to the VirtualNetwork",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "22",
"direction": "Outbound",
"name": "Allow-Ssh-out-to-VirtualNetwork",
"priority": 4041,
"protocol": "Tcp",
"source_address_prefix": "*",
"source_port_range": "*"
}
}
hclhcl |
subnets = {
"ToolingSubnet" = {
address_prefixes = ["100.0.3.0/24"]
default_outbound_access_enabled = false
create_network_security_group = true
network_security_group_config = {
azure_default = true
}
}
map(object({|
name = string
access = string
direction = string
priority = number
protocol = string
description = optional(string)
destination_address_prefix = optional(string, null)
destination_address_prefixes = optional(set(string), null)
destination_application_security_group_ids = optional(set(string), null)
destination_port_range = optional(string, null)
destination_port_ranges = optional(set(string), null)
source_address_prefix = optional(string, null)
source_address_prefixes = optional(set(string), null)
source_application_security_group_ids = optional(set(string), null)
source_port_range = optional(string, null)
source_port_ranges = optional(set(string), null)
timeouts = optional(object({
create = optional(string, "30")
delete = optional(string, "30")
read = optional(string, "5")
update = optional(string, "30")
}))
}))
{| no | +| [natgateway](#input\_natgateway) | This object describes the public IP configuration when creating Nat Gateway's with a public IP. If creating more than one public IP, then these values will be used for all public IPs.
"Allow-Https-in-from-vnets": {
"access": "Allow",
"description": "Allow HTTPS traffic from VNets",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "443",
"direction": "Inbound",
"name": "Allow-Https-in-from-vnets",
"priority": 4095,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Allow-Https-out-to-vnets": {
"access": "Allow",
"description": "Allow HTTPS traffic to VNets",
"destination_address_prefix": "VirtualNetwork",
"destination_port_range": "443",
"direction": "Outbound",
"name": "Allow-Https-out-to-vnets",
"priority": 4095,
"protocol": "Tcp",
"source_address_prefix": "VirtualNetwork",
"source_port_range": "*"
},
"Deny-Any-Any-Any-In": {
"access": "Deny",
"description": "Deny all inbound traffic",
"destination_address_prefix": "*",
"destination_port_range": "*",
"direction": "Inbound",
"name": "Deny-Any-Any-Any-In",
"priority": 4096,
"protocol": "*",
"source_address_prefix": "*",
"source_port_range": "*"
},
"Deny-Any-Any-Any-Out": {
"access": "Deny",
"description": "Deny all outbound traffic",
"destination_address_prefix": "*",
"destination_port_range": "*",
"direction": "Outbound",
"name": "Deny-Any-Any-Any-Out",
"priority": 4096,
"protocol": "*",
"source_address_prefix": "*",
"source_port_range": "*"
}
}
hclhcl |
natgateway = {
name = "my-nat-gw"
}
object({| `null` | no | | [private\_dns](#input\_private\_dns) | This object describes the private DNS configuration for the virtual network.
name = optional(string, null)
allocation_method = optional(string, "Static")
ddos_protection_mode = optional(string, "VirtualNetworkInherited")
ddos_protection_plan_id = optional(string, null)
domain_name_label = optional(string, null)
idle_timeout_in_minutes = optional(number, 4)
inherit_tags = optional(bool, true)
ip_version = optional(string, "IPv4")
lock_level = optional(string, null)
sku = optional(string, "Standard")
sku_tier = optional(string, "Regional")
zones = optional(list(string))
})
hclhcl |
private_dns = {
"keyvault" = {
zone_name = "privatelink.vaultcore.azure.net"
}
"blob" = {
zone_name = "privatelink.blob.core.windows.net"
}
"azurecr" = {
zone_name = "privatelink.azurecr.io"
}
}
map(object({| `null` | no | -| [public\_ip](#input\_public\_ip) | This object describes the public IP configuration when creating a public IP.
zone_name = string
zone_link_enabled = optional(bool, true)
zone_link_name = optional(string)
resource_group_name = optional(string)
}))
object({| `{}` | no | +| [public\_ip](#input\_public\_ip) | This object describes the public IP configuration when creating a public IP.
allocation_method = optional(string, "Static")
ip_version = optional(string, "IPv4")
name = optional(string, null)
sku = optional(string, "Standard")
sku_tier = optional(string, "Regional")
zones = optional(list(string))
})
object({| `{}` | no | | [resource\_group](#input\_resource\_group) | The name of the resource group in which to create the resources. |
name = optional(string, null)
allocation_method = optional(string, "Static")
ip_version = optional(string, "IPv4")
sku = optional(string, "Standard")
sku_tier = optional(string, "Regional")
zones = optional(list(string))
})
object({|
name = string
location = string
})
{| no | -| [security\_rules](#input\_security\_rules) | A map of security rules to be created in **every** Network Security Group. The key of the map is the name of the security rule.
"location": null,
"name": null
}
shell az network list-service-tags --location westcentralus. For further information please see [Azure CLI
hclhcl |
security_rules = {
"test" = {
access = "Allow"
name = "BLAAAAAA"
description = "Allow HTTPS traffic to the Internet"
destination_address_prefix = "Internet"
destination_port_range = "443"
direction = "Outbound"
priority = 555
protocol = "Tcp"
source_address_prefix = "VirtualNetwork"
source_port_range = "*"
}
}
map(object({| `{}` | no | -| [subnets](#input\_subnets) | This object describes the subnets to create within the virtual network.
access = string
name = string
description = optional(string)
destination_address_prefix = optional(string)
destination_address_prefixes = optional(set(string))
destination_application_security_group_ids = optional(set(string))
destination_port_range = optional(string)
destination_port_ranges = optional(set(string))
direction = string
priority = number
protocol = string
source_address_prefix = optional(string)
source_address_prefixes = optional(set(string))
source_application_security_group_ids = optional(set(string))
source_port_range = optional(string)
source_port_ranges = optional(set(string))
timeouts = optional(object({
create = optional(string)
delete = optional(string)
read = optional(string)
update = optional(string)
}))
}))
hclhcl |
subnets = {
"CoreSubnet" = {
address_prefixes = ["100.0.1.0/24"]
default_outbound_access_enabled = false
}
"DevopsSubnet" = {
address_prefixes = ["100.0.2.0/24"]
default_outbound_access_enabled = false
delegate_to = "Microsoft.ContainerInstance/containerGroups"
create_network_security_group = true
}
"ToolingSubnet" = {
address_prefixes = ["100.0.3.0/24"]
default_outbound_access_enabled = false
create_network_security_group = true
network_security_group_config = {
azure_default = true
}
}
"OtherSubnet" = {
address_prefixes = ["100.0.4.0/24"]
default_outbound_access_enabled = false
no_nsg_association = true
}
"AzureBastionSubnet" = {
address_prefixes = ["100.0.5.0/24"]
default_outbound_access_enabled = false
}
}
map(object({| `{}` | no | +| [security\_rules](#input\_security\_rules) | A map of security rules to be created in **every** Network Security Group. The key of the map is the name of the security rule.
address_prefix = optional(string)
address_prefixes = optional(list(string))
default_outbound_access_enabled = optional(bool, false)
delegate_to = optional(string, null)
nat_gateway = optional(object({
id = string
}))
name = optional(string)
no_nsg_association = optional(bool, false)
create_network_security_group = optional(bool, false)
network_security_group_config = optional(object({
azure_default = optional(bool, false)
}), null)
network_security_group_id = optional(string, null)
private_endpoint_network_policies = optional(string, "Enabled")
private_link_service_network_policies_enabled = optional(bool, true)
role_assignments = optional(map(object({
role_definition_id_or_name = string
principal_id = string
description = optional(string, null)
skip_service_principal_aad_check = optional(bool, false)
condition = optional(string, null)
condition_version = optional(string, null)
delegated_managed_identity_resource_id = optional(string, null)
principal_type = optional(string, null)
})))
route_table = optional(object({
id = string
}))
service_endpoint_policies = optional(map(object({
id = string
})))
service_endpoints = optional(set(string))
sharing_scope = optional(string, null)
timeouts = optional(object({
create = optional(string)
delete = optional(string)
read = optional(string)
update = optional(string)
}))
}))
shell az network list-service-tags --location westcentralus. For further information please see [Azure CLI
hclhcl |
security_rules = {
"test" = {
access = "Allow"
name = "BLAAAAAA"
description = "Allow HTTPS traffic to the Internet"
destination_address_prefix = "Internet"
destination_port_range = "443"
direction = "Outbound"
priority = 555
protocol = "Tcp"
source_address_prefix = "VirtualNetwork"
source_port_range = "*"
}
}
map(object({| `{}` | no | +| [subnets](#input\_subnets) | This object describes the subnets to create within the virtual network.
name = string
access = string
description = optional(string)
destination_address_prefix = optional(string)
destination_address_prefixes = optional(set(string))
destination_application_security_group_ids = optional(set(string))
destination_port_range = optional(string)
destination_port_ranges = optional(set(string))
direction = string
priority = number
protocol = string
source_address_prefix = optional(string)
source_address_prefixes = optional(set(string))
source_application_security_group_ids = optional(set(string))
source_port_range = optional(string)
source_port_ranges = optional(set(string))
timeouts = optional(object({
create = optional(string)
delete = optional(string)
read = optional(string)
update = optional(string)
}))
}))
hclhcl |
subnets = {
"CoreSubnet" = {
address_prefixes = ["100.0.1.0/24"]
default_outbound_access_enabled = false
}
"DevopsSubnet" = {
address_prefixes = ["100.0.2.0/24"]
default_outbound_access_enabled = false
delegate_to = "Microsoft.ContainerInstance/containerGroups"
create_network_security_group = true
}
"ToolingSubnet" = {
address_prefixes = ["100.0.3.0/24"]
default_outbound_access_enabled = false
create_network_security_group = true
network_security_group_config = {
azure_default = true
}
}
"OtherSubnet" = {
address_prefixes = ["100.0.4.0/24"]
default_outbound_access_enabled = false
no_nsg_association = true
}
"AzureBastionSubnet" = {
address_prefixes = ["100.0.5.0/24"]
default_outbound_access_enabled = false
}
}
map(object({| `{}` | no | | [tags](#input\_tags) | A map of tags to assign to the resource. | `map(string)` | `{}` | no | | [vnet\_address\_space](#input\_vnet\_address\_space) | The address space that is used by the virtual network. | `list(string)` |
name = optional(string)
address_prefix = optional(string)
address_prefixes = optional(list(string))
default_outbound_access_enabled = optional(bool, false)
delegate_to = optional(string, null)
nat_gateway = optional(object({
id = string
}))
no_nsg_association = optional(bool, false)
create_network_security_group = optional(bool, false)
network_security_group_config = optional(object({
azure_default = optional(bool, false)
}), null)
network_security_group_id = optional(string, null)
private_endpoint_network_policies = optional(string, "Enabled")
private_link_service_network_policies_enabled = optional(bool, true)
role_assignments = optional(map(object({
role_definition_id_or_name = string
principal_id = string
description = optional(string, null)
skip_service_principal_aad_check = optional(bool, false)
condition = optional(string, null)
condition_version = optional(string, null)
delegated_managed_identity_resource_id = optional(string, null)
principal_type = optional(string, null)
})))
route_table = optional(object({
id = string
}))
service_endpoint_policies = optional(map(object({
id = string
})))
service_endpoints = optional(set(string))
sharing_scope = optional(string, null)
timeouts = optional(object({
create = optional(string)
delete = optional(string)
read = optional(string)
update = optional(string)
}))
}))
[| no | | [vnet\_dns\_servers](#input\_vnet\_dns\_servers) | The DNS servers to be used by the virtual network. | `list(string)` | `[]` | no |
"10.0.0.0/16"
]