Azure Data Lake Analytics Firewall Rule

This page shows how to write Terraform and Azure Resource Manager for Data Lake Analytics Firewall Rule and write them securely.

azurerm_data_lake_analytics_firewall_rule (Terraform)

The Analytics Firewall Rule in Data Lake can be configured in Terraform with the resource name azurerm_data_lake_analytics_firewall_rule. The following sections describe 10 examples of how to use the resource and its parameters.

Example Usage from GitHub

azurerm_data_lake_analytics_firewall_rule_allowed.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "allowed" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "1.2.3.4"
  end_ip_address      = "2.3.4.5"
azurerm_data_lake_analytics_firewall_rule_denied.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "denied" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "0.0.0.0"
  end_ip_address      = "255.255.255.255"
main.tf#L7
resource "azurerm_data_lake_analytics_firewall_rule" "this" {
  account_name        = var.account_name
  end_ip_address      = var.end_ip_address
  name                = var.name
  resource_group_name = var.resource_group_name
  start_ip_address    = var.start_ip_address
main.tf#L7
resource "azurerm_data_lake_analytics_firewall_rule" "this" {
  account_name        = var.account_name
  end_ip_address      = var.end_ip_address
  name                = var.name
  resource_group_name = var.resource_group_name
  start_ip_address    = var.start_ip_address
services.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "denied" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "0.0.0.0"
  end_ip_address      = "255.255.255.255"
services.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "denied" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "0.0.0.0"
  end_ip_address      = "255.255.255.255"
services.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "denied" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "0.0.0.0"
  end_ip_address      = "255.255.255.255"
services.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "denied" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "0.0.0.0"
  end_ip_address      = "255.255.255.255"
services.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "denied" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "0.0.0.0"
  end_ip_address      = "255.255.255.255"
services.tf#L1
resource "azurerm_data_lake_analytics_firewall_rule" "denied" {
  name                = "office-ip-range"
  account_name        = azurerm_data_lake_analytics.example.name
  resource_group_name = azurerm_resource_group.example.name
  start_ip_address    = "0.0.0.0"
  end_ip_address      = "255.255.255.255"

Review your Terraform file for Azure best practices

Shisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).

Parameters

Explanation in Terraform Registry

Manages a Azure Data Lake Analytics Firewall Rule.

Tips: Best Practices for The Other Azure Data Lake Resources

In addition to the azurerm_data_lake_store, Azure Data Lake has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.

risk-label

azurerm_data_lake_store

Ensure to enable the encryption of data lake storage

It is better to enable the encryption of Data Lake storage.

Review your Azure Data Lake settings

In addition to the above, there are other security points you should be aware of making sure that your .tf files are protected in Shisho Cloud.

Microsoft.DataLakeAnalytics/accounts/firewallRules (Azure Resource Manager)

The accounts/firewallRules in Microsoft.DataLakeAnalytics can be configured in Azure Resource Manager with the resource name Microsoft.DataLakeAnalytics/accounts/firewallRules. The following sections describe how to use the resource and its parameters.

Example Usage from GitHub

An example could not be found in GitHub.

Parameters

  • apiVersion required - string
  • name required - string

    The name of the firewall rule to create or update.

  • properties required
      • endIpAddress required - string

        The end IP address for the firewall rule. This can be either ipv4 or ipv6. Start and End should be in the same protocol.

      • startIpAddress required - string

        The start IP address for the firewall rule. This can be either ipv4 or ipv6. Start and End should be in the same protocol.

  • type required - string

Frequently asked questions

What is Azure Data Lake Analytics Firewall Rule?

Azure Data Lake Analytics Firewall Rule is a resource for Data Lake of Microsoft Azure. Settings can be wrote in Terraform.

Where can I find the example code for the Azure Data Lake Analytics Firewall Rule?

For Terraform, the snyk-labs/infrastructure-as-code-goof, snyk-labs/infrastructure-as-code-goof and kevinhead/azurerm source code examples are useful. See the Terraform Example section for further details.