Skip to content

azurermNetworkSecurityAdminConfiguration

Manages a Network Manager Security Admin Configuration.

Example Usage

/*Provider bindings are generated by running cdktf get.
See https://cdk.tf/provider-generation for more details.*/
import * as azurerm from "./.gen/providers/azurerm";
/*The following providers are missing schema information and might need manual adjustments to synthesize correctly: azurerm.
For a more precise conversion please use the --provider flag in convert.*/
const azurermResourceGroupExample = new azurerm.resourceGroup.ResourceGroup(
  this,
  "example",
  {
    location: "West Europe",
    name: "example-resources",
  }
);
const dataAzurermSubscriptionCurrent =
  new azurerm.dataAzurermSubscription.DataAzurermSubscription(
    this,
    "current",
    {}
  );
const azurermNetworkManagerExample = new azurerm.networkManager.NetworkManager(
  this,
  "example_2",
  {
    description: "example network manager",
    location: azurermResourceGroupExample.location,
    name: "example-network-manager",
    resource_group_name: azurermResourceGroupExample.name,
    scope: [
      {
        subscription_ids: [dataAzurermSubscriptionCurrent.id],
      },
    ],
    scope_accesses: ["Connectivity", "SecurityAdmin"],
  }
);
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermNetworkManagerExample.overrideLogicalId("example");
const azurermNetworkManagerNetworkGroupExample =
  new azurerm.networkManagerNetworkGroup.NetworkManagerNetworkGroup(
    this,
    "example_3",
    {
      name: "example-network-group",
      network_manager_id: azurermNetworkManagerExample.id,
    }
  );
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermNetworkManagerNetworkGroupExample.overrideLogicalId("example");
const azurermNetworkManagerSecurityAdminConfigurationExample =
  new azurerm.networkManagerSecurityAdminConfiguration.NetworkManagerSecurityAdminConfiguration(
    this,
    "example_4",
    {
      apply_on_network_intent_policy_based_services: ["None"],
      description: "example admin conf",
      name: "example-admin-conf",
      network_manager_id: azurermNetworkManagerExample.id,
    }
  );
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermNetworkManagerSecurityAdminConfigurationExample.overrideLogicalId(
  "example"
);

Arguments Reference

The following arguments are supported:

  • name - (Required) Specifies the name which should be used for this Network Manager Security Admin Configuration. Changing this forces a new Network Manager Security Admin Configuration to be created.

  • networkManagerId - (Required) Specifies the ID of the Network Manager Security Admin Configuration. Changing this forces a new Network Manager Security Admin Configuration to be created.

  • applyOnNetworkIntentPolicyBasedServices - (Optional) A list of network intent policy based services. Possible values are all, none and allowRulesOnly. Exactly one value should be set. The all option requires microsoftNetwork/allowAdminRulesOnNipBasedServices feature registration to Subscription. Please see this document for more information.

  • description - (Optional) A description of the Security Admin Configuration.

Attributes Reference

In addition to the Arguments listed above - the following Attributes are exported:

  • id - The ID of the Network Manager Security Admin Configuration.

Timeouts

The timeouts block allows you to specify timeouts for certain actions:

  • create - (Defaults to 30 minutes) Used when creating the Network Manager Security Admin Configuration.
  • read - (Defaults to 5 minutes) Used when retrieving the Network Manager Security Admin Configuration.
  • update - (Defaults to 30 minutes) Used when updating the Network Manager Security Admin Configuration.
  • delete - (Defaults to 30 minutes) Used when deleting the Network Manager Security Admin Configuration.

Import

Network Manager Security Admin Configuration can be imported using the resourceId, e.g.

terraform import azurerm_network_security_admin_configuration.example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/securityAdminConfigurations/configuration1