8.6 KiB
8.6 KiB
Azure PostgreSQL Flexible Server Database
This template deploys an Azure PostgreSQL Flexible Server Database.
Resources
Terraform Resource Type | Description |
---|---|
azurerm_resource_group |
The resource group all resources are deployed into |
azurerm_virtual_network |
Manages the Azure Virtual Network including any configured subnets |
azurerm_network_security_group |
Manages the Azure Network Security Group that contains a list of network security rules |
azurerm_subnet |
Manages the Azure Subnet |
azurerm_subnet_network_security_group_association |
Associates an Azure Network Security Group with an Azure Subnet within an Azure Virtual Network |
azurerm_private_dns_zone |
Manages Azure Private DNS zones within Azure DNS |
azurerm_private_dns_zone_virtual_network_link |
Manages Private DNS zone Virtual Network Links |
azurerm_postgresql_flexible_server |
The Azure PostgreSQL Flexible Server that the Azure PostgreSQL Flexible Server Database will run on |
azurerm_postgresql_flexible_server_database |
The Azure PostgreSQL Flexible Server Database |
Variables
Name | Description |
---|---|
name |
Name of the deployment |
environment |
The depolyment environment name (used for postfixing resource names) |
location |
The Azure Region to deploy these resources in |
Example
>terraform plan
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# azurerm_network_security_group.default will be created
+ resource "azurerm_network_security_group" "default" {
+ id = (known after apply)
+ location = "westeurope"
+ name = "demo-postgresql-fs-dev-nsg"
+ resource_group_name = "demo-postgresql-fs-dev-rg"
+ security_rule = [
+ {
+ access = "Allow"
+ description = ""
+ destination_address_prefix = "*"
+ destination_address_prefixes = []
+ destination_application_security_group_ids = []
+ destination_port_range = "*"
+ destination_port_ranges = []
+ direction = "Inbound"
+ name = "test123"
+ priority = 100
+ protocol = "Tcp"
+ source_address_prefix = "*"
+ source_address_prefixes = []
+ source_application_security_group_ids = []
+ source_port_range = "*"
+ source_port_ranges = []
},
]
}
# azurerm_postgresql_flexible_server.default will be created
+ resource "azurerm_postgresql_flexible_server" "default" {
+ administrator_login = "adminTerraform"
+ administrator_password = (sensitive value)
+ backup_retention_days = 7
+ cmk_enabled = (known after apply)
+ delegated_subnet_id = (known after apply)
+ fqdn = (known after apply)
+ geo_redundant_backup_enabled = false
+ id = (known after apply)
+ location = "westeurope"
+ name = "demo-postgresql-fs-dev-server"
+ private_dns_zone_id = (known after apply)
+ public_network_access_enabled = (known after apply)
+ resource_group_name = "demo-postgresql-fs-dev-rg"
+ sku_name = "GP_Standard_D2s_v3"
+ storage_mb = 32768
+ version = "13"
+ zone = "1"
}
# azurerm_postgresql_flexible_server_database.default will be created
+ resource "azurerm_postgresql_flexible_server_database" "default" {
+ charset = "UTF8"
+ collation = "en_US.UTF8"
+ id = (known after apply)
+ name = "demo-postgresql-fs-dev-db"
+ server_id = (known after apply)
}
# azurerm_private_dns_zone.default will be created
+ resource "azurerm_private_dns_zone" "default" {
+ id = (known after apply)
+ max_number_of_record_sets = (known after apply)
+ max_number_of_virtual_network_links = (known after apply)
+ max_number_of_virtual_network_links_with_registration = (known after apply)
+ name = "demo-postgresql-fs-dev-pdz.postgres.database.azure.com"
+ number_of_record_sets = (known after apply)
+ resource_group_name = "demo-postgresql-fs-dev-rg"
+ soa_record {
+ email = (known after apply)
+ expire_time = (known after apply)
+ fqdn = (known after apply)
+ host_name = (known after apply)
+ minimum_ttl = (known after apply)
+ refresh_time = (known after apply)
+ retry_time = (known after apply)
+ serial_number = (known after apply)
+ tags = (known after apply)
+ ttl = (known after apply)
}
}
# azurerm_private_dns_zone_virtual_network_link.default will be created
+ resource "azurerm_private_dns_zone_virtual_network_link" "default" {
+ id = (known after apply)
+ name = "demo-postgresql-fs-dev-pdzvnetlink.com"
+ private_dns_zone_name = "demo-postgresql-fs-dev-pdz.postgres.database.azure.com"
+ registration_enabled = false
+ resource_group_name = "demo-postgresql-fs-dev-rg"
+ virtual_network_id = (known after apply)
}
# azurerm_resource_group.default will be created
+ resource "azurerm_resource_group" "default" {
+ id = (known after apply)
+ location = "westeurope"
+ name = "demo-postgresql-fs-dev-rg"
}
# azurerm_subnet.default will be created
+ resource "azurerm_subnet" "default" {
+ address_prefix = (known after apply)
+ address_prefixes = [
+ "10.0.2.0/24",
]
+ enforce_private_link_endpoint_network_policies = false
+ enforce_private_link_service_network_policies = false
+ id = (known after apply)
+ name = "demo-postgresql-fs-dev-subnet"
+ resource_group_name = "demo-postgresql-fs-dev-rg"
+ service_endpoints = [
+ "Microsoft.Storage",
]
+ virtual_network_name = "demo-postgresql-fs-dev-vnet"
+ delegation {
+ name = "fs"
+ service_delegation {
+ actions = [
+ "Microsoft.Network/virtualNetworks/subnets/join/action",
]
+ name = "Microsoft.DBforPostgreSQL/flexibleServers"
}
}
}
# azurerm_subnet_network_security_group_association.default will be created
+ resource "azurerm_subnet_network_security_group_association" "default" {
+ id = (known after apply)
+ network_security_group_id = (known after apply)
+ subnet_id = (known after apply)
}
# azurerm_virtual_network.default will be created
+ resource "azurerm_virtual_network" "default" {
+ address_space = [
+ "10.0.0.0/16",
]
+ dns_servers = (known after apply)
+ guid = (known after apply)
+ id = (known after apply)
+ location = "westeurope"
+ name = "demo-postgresql-fs-dev-vnet"
+ resource_group_name = "demo-postgresql-fs-dev-rg"
+ subnet = (known after apply)
+ vm_protection_enabled = false
}
Plan: 9 to add, 0 to change, 0 to destroy.
Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now.