Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create sql.tf #2328

Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Create sql.tf
  • Loading branch information
Andre Kolodochka committed Sep 6, 2024
commit 335571d18b786083fc683835e7b5d1d9163a0a60
81 changes: 81 additions & 0 deletions lightning/terraform/sql.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,81 @@
resource "azurerm_sql_firewall_rule" "example" {
name = "terragoat-firewall-rule-${var.environment}"
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_sql_server.example.name
start_ip_address = "10.0.17.62"
end_ip_address = "10.0.17.62"
}

resource "azurerm_sql_server" "example" {
name = "terragoat-sqlserver-${var.environment}${random_integer.rnd_int.result}"
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
version = "12.0"
administrator_login = "ariel"
administrator_login_password = "Aa12345678"
tags = {
environment = var.environment
terragoat = "true"
}
}

resource "azurerm_mssql_server_security_alert_policy" "example" {
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_sql_server.example.name
state = "Enabled"
storage_endpoint = azurerm_storage_account.example.primary_blob_endpoint
storage_account_access_key = azurerm_storage_account.example.primary_access_key
disabled_alerts = [
"Sql_Injection",
"Data_Exfiltration"
]
retention_days = 20
}

resource "azurerm_mysql_server" "example" {
name = "terragoat-mysql-${var.environment}${random_integer.rnd_int.result}"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name

administrator_login = "terragoat-${var.environment}"
administrator_login_password = random_string.password.result

sku_name = "B_Gen5_2"
storage_mb = 5120
version = "5.7"

auto_grow_enabled = true
backup_retention_days = 7
infrastructure_encryption_enabled = true
public_network_access_enabled = true
ssl_enforcement_enabled = false
}

resource "azurerm_postgresql_server" "example" {
name = "terragoat-postgresql-${var.environment}${random_integer.rnd_int.result}"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
sku_name = "B_Gen5_2"
storage_mb = 5120
backup_retention_days = 7
geo_redundant_backup_enabled = false
auto_grow_enabled = true
administrator_login = "terragoat"
administrator_login_password = "Aa12345678"
version = "9.5"
ssl_enforcement_enabled = false
}

resource "azurerm_postgresql_configuration" "thrtottling_config" {
name = "connection_throttling"
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_postgresql_server.example.name
value = "off"
}

resource "azurerm_postgresql_configuration" "example" {
name = "log_checkpoints"
resource_group_name = azurerm_resource_group.example.name
server_name = azurerm_postgresql_server.example.name
value = "off"
}