-
Notifications
You must be signed in to change notification settings - Fork 304
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conditionally create nsg security rule | Parametrise source IP ranges #137
Conversation
Any chance you could make the priority a little higher, to allow flexibility to overwrite it if necessary? 110 or something instead of the lowest value of 100? |
Can this please be reviewed and included in the next release? |
I need this functionality as well. I'd like to disable this module's NSG and instead attach my own for greater control. |
Hello, I also need to disable this feature because I want to apply my own NSG in the scope of the subnet. Or you can provide a more flexible way to edit and control the NSG created by this compute module? |
Hi @rginev , thanks for opening this PR. 🚀 . Would you mind updating your code to merge the latest code? |
Hi @yupwei68, thanks for attending the PR - code has been synced |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👍
Any indication on when the new version will be pushed to the terraform registry? |
I get this error since my fork of master today, relating to this PR I believe:
The docs say that you can't use I need to be able to disable the association of this module's NSG with a VM's NIC, so I'm going to be creating a PR for that in the next day or two. I need more granularity with the NSG. |
Hi @chicken231 , sorry that I can not reproduce your error with the example in the README and my test CI shows success. Would you mind providing a more detailed reproducing steps and opening an issue for it? Thanks. |
@GarethOates Thanks for your comment. It has been released in 3.4.0. |
@yupwei68 terraform-azurerm-compute/main.tf Line 174 in c068a84
One way to fix it would be to change the default value of I just grabbed the example from the README (the advanced one since it's the only example/test which specifies
|
I would want some control on nsg security rule for remote_port:
Create it only if remote_port is specified
Add ability to control source IP ranges