@@ -12,8 +12,8 @@ locals {
1212# # Resource group in which all resources will be deployed.
1313# #-----------------------------------------------------------------------------
1414module "resource_group" {
15- source = " terraform-az-modules/resource-group/azure"
16- version = " 1.0.0 "
15+ source = " ../../../terraform-azure-resource-group " # " terraform-az-modules/resource-group/azure"
16+ # version = "1.0.1 "
1717 name = local. name
1818 environment = local. environment
1919 label_order = [" name" , " environment" ]
@@ -26,8 +26,8 @@ module "resource_group" {
2626# #-----------------------------------------------------------------------------
2727module "vnet" {
2828 depends_on = [module . resource_group ]
29- source = " terraform-az-modules/vnet/azure"
30- version = " 1.0.0"
29+ source = " ../../../terraform-azure-vnet " # " terraform-az-modules/vnet/azure"
30+ # version = "1.0.0"
3131 name = local. name
3232 environment = local. environment
3333 resource_group_name = module. resource_group . resource_group_name
@@ -41,8 +41,8 @@ module "vnet" {
4141# #-----------------------------------------------------------------------------
4242module "name_specific_subnet" {
4343 depends_on = [module . vnet ]
44- source = " terraform-az-modules/subnet/azure"
45- version = " 1.0.0"
44+ source = " ../../../terraform-azure-subnet " # " terraform-az-modules/subnet/azure"
45+ # version = "1.0.0"
4646 environment = " test"
4747 label_order = [" name" , " environment" , ]
4848 resource_group_name = module. resource_group . resource_group_name
@@ -74,8 +74,8 @@ module "name_specific_subnet" {
7474# # Log Analytic workspace for firerwall diagnostic setting.
7575# #-----------------------------------------------------------------------------
7676module "log-analytics" {
77- source = " terraform-az-modules/log-analytics/azure"
78- version = " 1.0.0"
77+ source = " ../../../terraform-azure-log-analytics " # " terraform-az-modules/log-analytics/azure"
78+ # version = "1.0.0"
7979 name = local. name
8080 environment = local. environment
8181 label_order = [" name" , " environment" , " location" ]
@@ -97,7 +97,6 @@ module "firewall" {
9797 environment = local. environment
9898 resource_group_name = module. resource_group . resource_group_name
9999 location = module. resource_group . resource_group_location
100- primary_public_ip_name = " public-ip-1"
101100 subnet_id = module. name_specific_subnet . subnet_ids [" AzureFirewallSubnet" ]
102101 public_ip_names = [" ingress" , " vnet" ] // Name of public ips you want to create.
103102 firewall_enable = true
@@ -115,13 +114,12 @@ module "firewall" {
115114# # This is same module as 'firewall module', but from this module only firewall rules and rule collection group will be deployed.
116115# #-----------------------------------------------------------------------------
117116module "firewall-rules" {
118- depends_on = [module . firewall ]
119- source = " ../.."
120- name = local. name
121- environment = local. environment
122- policy_rule_enabled = true
123- primary_public_ip_name = module. firewall . primary_public_ip_name
124- firewall_policy_id = module. firewall . firewall_policy_id
117+ depends_on = [module . firewall ]
118+ source = " ../.."
119+ name = local. name
120+ environment = local. environment
121+ policy_rule_enabled = true
122+ firewall_policy_id = module. firewall . firewall_policy_id
125123 application_rule_collection = [
126124 {
127125 name = " example_app_policy"
@@ -187,12 +185,12 @@ module "firewall-rules" {
187185 name = " nat_rule_collection1_rule1"
188186 protocols = [" TCP" , " UDP" ]
189187 source_addresses = [" 10.0.0.1" , " 10.0.0.2" ]
190- destination_address = module.firewall.primary_public_ip_address
188+ destination_address = module.firewall.public_ip_addresses[ " vnet " ]
191189 destination_ports = [" 80" ]
192190 translated_address = " 192.168.0.1"
193191 translated_port = " 8080"
194192 },
195193 ]
196194 },
197195 ]
198- }
196+ }
0 commit comments