Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: support for attaching NSG Rules to Application Security Groups #912

Closed
tombuildsstuff opened this issue Mar 1, 2018 · 1 comment · Fixed by #925
Closed

Comments

@tombuildsstuff
Copy link
Contributor

As documented in this blog post - it's possible to attach NSG Rules to an Application Security Group by specifying the Source/Destination ASG:

az network nsg rule create \
  --resource-group myResourceGroup \
  --nsg-name myNsg \
  --name DatabaseRule \
  --priority 400 \
  --access "Allow" \
  --direction "inbound" \
  --source-asgs "AppServers" \
  --destination-asgs "DatabaseServers" \
  --destination-port-ranges 1336 \
  --protocol "TCP" 

We should enhance the azurerm_network_security_rule resource to support setting these fields, from what I can see these are exposed as the ID's in the API (rather than the name's) - and exist in the Go SDK (v12 / 2017-09-01)

@ghost
Copy link

ghost commented Mar 31, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks!

@ghost ghost locked and limited conversation to collaborators Mar 31, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.