https://github.com/opszero/terraform-azurerm-vnet
https://github.com/opszero/terraform-azurerm-vnet
Last synced: 3 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/opszero/terraform-azurerm-vnet
- Owner: opszero
- License: other
- Created: 2025-06-02T08:49:50.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2025-08-18T22:27:41.000Z (6 months ago)
- Last Synced: 2025-08-19T00:26:07.378Z (6 months ago)
- Language: HCL
- Size: 24.4 KB
- Stars: 0
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
- Support: SUPPORT
Awesome Lists containing this project
README
## Providers
| Name | Version |
|------|---------|
| [azurerm](#provider\_azurerm) | >= 4.2.0 |
## Inputs
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [address\_space](#input\_address\_space) | The address space that is used by the virtual network. | `string` | `""` | no |
| [address\_spaces](#input\_address\_spaces) | The list of the address spaces that is used by the virtual network. | `list(string)` | `[]` | no |
| [bgp\_community](#input\_bgp\_community) | The BGP community attribute in format :. | `number` | `null` | no |
| [dns\_servers](#input\_dns\_servers) | The DNS servers to be used with vNet. | `list(string)` | `[]` | no |
| [edge\_zone](#input\_edge\_zone) | (Optional) Specifies the Edge Zone within the Azure Region where this Virtual Network should exist. Changing this forces a new Virtual Network to be created. | `string` | `null` | no |
| [enable](#input\_enable) | Flag to control the module creation | `bool` | `true` | no |
| [enable\_ddos\_pp](#input\_enable\_ddos\_pp) | Flag to control the resource creation | `bool` | `false` | no |
| [enable\_network\_watcher](#input\_enable\_network\_watcher) | Flag to control creation of network watcher. | `bool` | `false` | no |
| [enforcement](#input\_enforcement) | Specifies if the encrypted Virtual Network allows VM that does not support encryption. Possible values are DropUnencrypted and AllowUnencrypted. | `string` | `null` | no |
| [environment](#input\_environment) | Environment (e.g. `prod`, `dev`, `staging`). | `string` | `""` | no |
| [existing\_ddos\_pp](#input\_existing\_ddos\_pp) | ID of an existing DDOPS plan defined in the same subscription | `string` | `null` | no |
| [flow\_timeout\_in\_minutes](#input\_flow\_timeout\_in\_minutes) | The flow timeout in minutes for the Virtual Network, which is used to enable connection tracking for intra-VM flows. Possible values are between 4 and 30 minutes. | `number` | `10` | no |
| [label\_order](#input\_label\_order) | Label order, e.g. `name`,`application`. | `list(any)` |
[
"name",
"environment"
]
| no |
| [location](#input\_location) | The location/region where the virtual network is created. Changing this forces a new resource to be created. | `string` | `""` | no |
| [managedby](#input\_managedby) | ManagedBy, eg 'info@opszero.com' | `string` | `"info@opszero.com"` | no |
| [name](#input\_name) | Name (e.g. `app` or `cluster`). | `string` | `""` | no |
| [repository](#input\_repository) | Terraform current module repo | `string` | `"https://github.com/opszero/terraform-azure-vnet"` | no |
| [resource\_group\_name](#input\_resource\_group\_name) | The name of the resource group in which to create the virtual network. Changing this forces a new resource to be created. | `string` | `""` | no |
| [tags](#input\_tags) | Additional tags (e.g. map(`BusinessUnit`,`XYZ`). | `map(string)` | `{}` | no |
## Resources
| Name | Type |
|------|------|
| [azurerm_network_ddos_protection_plan.example](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/network_ddos_protection_plan) | resource |
| [azurerm_network_watcher.flow_log_nw](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/network_watcher) | resource |
| [azurerm_virtual_network.vnet](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/virtual_network) | resource |
## Outputs
| Name | Description |
|------|-------------|
| [ddos\_protection\_plan\_id](#output\_ddos\_protection\_plan\_id) | The ID of the DDoS Protection Plan |
| [id](#output\_id) | The id of the newly created vNet |
| [name](#output\_name) | The name of the newly created vNet |
| [network\_watcher\_id](#output\_network\_watcher\_id) | The ID of the Network Watcher. |
| [network\_watcher\_name](#output\_network\_watcher\_name) | The name of Network Watcher deployed. |
| [vnet\_address\_space](#output\_vnet\_address\_space) | The address space of the newly created vNet |
| [vnet\_guid](#output\_vnet\_guid) | The GUID of the virtual network. |
| [vnet\_location](#output\_vnet\_location) | The location of the newly created vNet |
| [vnet\_rg\_name](#output\_vnet\_rg\_name) | The name of the resource group in which to create the virtual network. Changing this forces a new resource to be created |
# 🚀 Built by opsZero!
Since 2016 [opsZero](https://opszero.com) has been providing Kubernetes
expertise to companies of all sizes on any Cloud. With a focus on AI and
Compliance we can say we seen it all whether SOC2, HIPAA, PCI-DSS, ITAR,
FedRAMP, CMMC we have you and your customers covered.
We provide support to organizations in the following ways:
- [Modernize or Migrate to Kubernetes](https://opszero.com/solutions/modernization/)
- [Cloud Infrastructure with Kubernetes on AWS, Azure, Google Cloud, or Bare Metal](https://opszero.com/solutions/cloud-infrastructure/)
- [Building AI and Data Pipelines on Kubernetes](https://opszero.com/solutions/ai/)
- [Optimizing Existing Kubernetes Workloads](https://opszero.com/solutions/optimized-workloads/)
We do this with a high-touch support model where you:
- Get access to us on Slack, Microsoft Teams or Email
- Get 24/7 coverage of your infrastructure
- Get an accelerated migration to Kubernetes
Please [schedule a call](https://calendly.com/opszero-llc/discovery) if you need support.