azurermNetworkSecurityAdminConfiguration
Manages a Network Manager Security Admin Configuration.
Example Usage
/*Provider bindings are generated by running cdktf get.
See https://cdk.tf/provider-generation for more details.*/
import * as azurerm from "./.gen/providers/azurerm";
/*The following providers are missing schema information and might need manual adjustments to synthesize correctly: azurerm.
For a more precise conversion please use the --provider flag in convert.*/
const azurermResourceGroupExample = new azurerm.resourceGroup.ResourceGroup(
this,
"example",
{
location: "West Europe",
name: "example-resources",
}
);
const dataAzurermSubscriptionCurrent =
new azurerm.dataAzurermSubscription.DataAzurermSubscription(
this,
"current",
{}
);
const azurermNetworkManagerExample = new azurerm.networkManager.NetworkManager(
this,
"example_2",
{
description: "example network manager",
location: azurermResourceGroupExample.location,
name: "example-network-manager",
resource_group_name: azurermResourceGroupExample.name,
scope: [
{
subscription_ids: [dataAzurermSubscriptionCurrent.id],
},
],
scope_accesses: ["Connectivity", "SecurityAdmin"],
}
);
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermNetworkManagerExample.overrideLogicalId("example");
const azurermNetworkManagerNetworkGroupExample =
new azurerm.networkManagerNetworkGroup.NetworkManagerNetworkGroup(
this,
"example_3",
{
name: "example-network-group",
network_manager_id: azurermNetworkManagerExample.id,
}
);
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermNetworkManagerNetworkGroupExample.overrideLogicalId("example");
const azurermNetworkManagerSecurityAdminConfigurationExample =
new azurerm.networkManagerSecurityAdminConfiguration.NetworkManagerSecurityAdminConfiguration(
this,
"example_4",
{
apply_on_network_intent_policy_based_services: ["None"],
description: "example admin conf",
name: "example-admin-conf",
network_manager_id: azurermNetworkManagerExample.id,
}
);
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermNetworkManagerSecurityAdminConfigurationExample.overrideLogicalId(
"example"
);
Arguments Reference
The following arguments are supported:
-
name
- (Required) Specifies the name which should be used for this Network Manager Security Admin Configuration. Changing this forces a new Network Manager Security Admin Configuration to be created. -
networkManagerId
- (Required) Specifies the ID of the Network Manager Security Admin Configuration. Changing this forces a new Network Manager Security Admin Configuration to be created. -
applyOnNetworkIntentPolicyBasedServices
- (Optional) A list of network intent policy based services. Possible values areall
,none
andallowRulesOnly
. Exactly one value should be set. Theall
option requiresmicrosoftNetwork/allowAdminRulesOnNipBasedServices
feature registration to Subscription. Please see this document for more information. -
description
- (Optional) A description of the Security Admin Configuration.
Attributes Reference
In addition to the Arguments listed above - the following Attributes are exported:
id
- The ID of the Network Manager Security Admin Configuration.
Timeouts
The timeouts
block allows you to specify timeouts for certain actions:
create
- (Defaults to 30 minutes) Used when creating the Network Manager Security Admin Configuration.read
- (Defaults to 5 minutes) Used when retrieving the Network Manager Security Admin Configuration.update
- (Defaults to 30 minutes) Used when updating the Network Manager Security Admin Configuration.delete
- (Defaults to 30 minutes) Used when deleting the Network Manager Security Admin Configuration.
Import
Network Manager Security Admin Configuration can be imported using the resourceId
, e.g.