-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce network rules by default #47
Comments
Investigate if any other modules require similar updates. |
In addition to Storage and Key Vault, a similar update to the Service Bus module may be required (based on policy). |
variable "public_network_access_enabled" {
description = "Should public network access be enabled for this PostgreSQL server?"
type = bool
default = true
}
variable "firewall_rules" {
description = "A map of firewall rules to be configured for this SQL server."
type = map(object({
name = string
start_ip_address = string
end_ip_address = string
}))
default = {
"azure" = {
name = "AllowAllWindowsAzureIps"
start_ip_address = "0.0.0.0"
end_ip_address = "0.0.0.0"
}
}
}
variable "public_network_access_enabled" {
description = "Should public network access be enabled for this Automation account?"
type = bool
default = true
}
variable "public_network_access_enabled" {
description = "Should public network access be enabled for this Container Registry?"
type = bool
default = true
}
variable "public_network_access_enabled" {
description = "Whether public network access is allowed for the workspace. Defaults to false"
type = bool
default = true
}
variable "allowed_firewall_rules" {
description = "List of rules allowing certain ips through the firewall."
type = list(object({
name : string
start_ip_address : string
end_ip_address : string
}))
default = []
} |
|
public_network_access_enabled = true |
remains to clarify what to do and not |
Moving back to "In progress". Se if we can create new subissues from this after some investigation. |
Removed in Azure provider v4. |
Could add overview of all module repos in issue description to keep track of which modules we have checked and not. |
There has been no activity on this issue for 60 days. stale label will be added. If no additional activity occurs, the issue will be closed in 7 days. |
All modules should deny all traffic by default for all relevant resources, unless it's a service that is usually exposed to the internet (e.g. a Web App).
Should also add this as a best practice in this repo.
Tasks
The text was updated successfully, but these errors were encountered: