azure_rm_rediscachefirewallrule – Manage Azure Cache for Redis Firewall rules¶
New in version 2.8.
The below requirements are needed on the host that executes this module.
python >= 2.7
azure >= 2.0.0
For authentication with Azure you can pass parameters, set environment variables, use a profile stored in ~/.azure/credentials, or log in before you run your tasks or playbook with
Authentication is also possible using a service principal or Active Directory user.
To authenticate via service principal, pass subscription_id, client_id, secret and tenant or set environment variables AZURE_SUBSCRIPTION_ID, AZURE_CLIENT_ID, AZURE_SECRET and AZURE_TENANT.
To authenticate via Active Directory user, pass ad_user and password, or set AZURE_AD_USER and AZURE_PASSWORD in the environment.
Alternatively, credentials can be stored in ~/.azure/credentials. This is an ini file containing a [default] section and the following keys: subscription_id, client_id, secret and tenant or subscription_id, ad_user and password. It is also possible to add additional profiles. Specify the profile by passing profile or setting AZURE_PROFILE in the environment.
- Sign in with Azure CLI
How to authenticate using the
- name: Create a Firewall rule for Azure Cache for Redis azure_rm_rediscachefirewallrule: resource_group: myResourceGroup cache_name: myRedisCache name: myRule start_ip_address: 192.168.1.1 end_ip_address: 192.168.1.4 - name: Update a Firewall rule for Azure Cache for Redis azure_rm_rediscachefirewallrule: resource_group: myResourceGroup cache_name: myRedisCache name: myRule end_ip_address: 192.168.1.5
Common return values are documented here, the following are the fields unique to this module:
Id of the Azure Cache for Redis.
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by the Ansible Community. [community]