When the Private Link is used, the MySql can be accessed using a private address. Therefore we should be able to deny public network access. This option should exists in azurerm_mysql_server
resource "azurerm_mysql_server" "example" {
...
public_network_access_enabled = true
}
This issue was fixed in v2.7.0
I was looking for the similar functionality for Azure sql but I was not able to find it. is "Deny public network access" is there for Azure sql? if not is there any plan to add it in future?
@rajatrawat99 - so far we only support it in postgres and mysql. It should make its way to mssql & maria db in the next few weeks.
Closing as this was released in 2.7!
This has been released in version 2.8.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example:
provider "azurerm" {
version = "~> 2.8.0"
}
# ... other configuration ...
Is it also on the roadmap for azurerm_sql_server?
@kfyhn - this will not be added to azurerm_sql_server as it is using the older APIs which do not support that property. The replacement resource azurerm_mssql_server supports it but it seems like it didn't make it into the docs so i've opened #7011 to add that.
@katbyte so are you saying it wont be available for azurerm_sql_server and will be available for azurerm_mssql_server. Does it mean azurerm_mssql_server is advanced version of azurerm_sql_server and replacement for it? I am asking you as I can not see this on docs.
I'm going to lock this issue because it has been closed for _30 days_ ⏳. This helps our maintainers find and focus on the active issues.
If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!