From 23d49c277f9ad2be8f1bf3a622b721a61d887446 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Wed, 30 Oct 2024 07:35:31 +0000 Subject: [PATCH] terraform-docs: automated action --- README.md | 1 + modules/network/README.md | 2 ++ 2 files changed, 3 insertions(+) diff --git a/README.md b/README.md index 882c38ac..606ab5c5 100644 --- a/README.md +++ b/README.md @@ -500,6 +500,7 @@ proxy_url = VALUE | [script\_post\_cluster\_creation](#input\_script\_post\_cluster\_creation) | Script to run after cluster creation | `string` | `""` | no | | [script\_pre\_start\_io](#input\_script\_pre\_start\_io) | Script to run before starting IO | `string` | `""` | no | | [set\_dedicated\_fe\_container](#input\_set\_dedicated\_fe\_container) | Create cluster with FE containers | `bool` | `false` | no | +| [sg\_custom\_ingress\_rules](#input\_sg\_custom\_ingress\_rules) | Custom inbound rules to be added to the security group. |
list(object({
from_port = string
to_port = string
protocol = string
cidr_block = string
}))
| `[]` | no | | [sg\_id](#input\_sg\_id) | The security group id. | `string` | `""` | no | | [smb\_cluster\_name](#input\_smb\_cluster\_name) | The name of the SMB setup. | `string` | `"Weka-SMB"` | no | | [smb\_create\_private\_dns\_resolver](#input\_smb\_create\_private\_dns\_resolver) | Create dns resolver for smb with outbound rule | `bool` | `false` | no | diff --git a/modules/network/README.md b/modules/network/README.md index 6caddf3b..cf813c06 100644 --- a/modules/network/README.md +++ b/modules/network/README.md @@ -83,6 +83,7 @@ No modules. | [azurerm_nat_gateway.nat_gateway](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/nat_gateway) | resource | | [azurerm_nat_gateway_public_ip_prefix_association.nat_ip_association](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/nat_gateway_public_ip_prefix_association) | resource | | [azurerm_network_security_group.sg](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/network_security_group) | resource | +| [azurerm_network_security_rule.sg_custom](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/network_security_rule) | resource | | [azurerm_network_security_rule.sg_public_ssh](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/network_security_rule) | resource | | [azurerm_network_security_rule.sg_weka_ui](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/network_security_rule) | resource | | [azurerm_private_dns_zone.dns](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/private_dns_zone) | resource | @@ -110,6 +111,7 @@ No modules. | [private\_dns\_zone\_name](#input\_private\_dns\_zone\_name) | The private DNS zone name. | `string` | `""` | no | | [private\_dns\_zone\_use](#input\_private\_dns\_zone\_use) | Determines whether to use private DNS zone. Required for LB dns name. | `bool` | `true` | no | | [rg\_name](#input\_rg\_name) | A predefined resource group in the Azure subscription. | `string` | n/a | yes | +| [sg\_custom\_ingress\_rules](#input\_sg\_custom\_ingress\_rules) | Custom inbound rules to be added to the security group. |
list(object({
from_port = string
to_port = string
protocol = string
cidr_block = string
}))
| `[]` | no | | [sg\_id](#input\_sg\_id) | The security group id. | `string` | `""` | no | | [subnet\_name](#input\_subnet\_name) | Subnet name, if exist. | `string` | `""` | no | | [subnet\_prefix](#input\_subnet\_prefix) | Address prefixes to use for the subnet. | `string` | `"10.0.2.0/24"` | no |