Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for passing cmk config in original resource block #24661

Open
1 task done
Netkracker opened this issue Jan 26, 2024 · 0 comments
Open
1 task done

Support for passing cmk config in original resource block #24661

Netkracker opened this issue Jan 26, 2024 · 0 comments

Comments

@Netkracker
Copy link
Contributor

Netkracker commented Jan 26, 2024

Is there an existing issue for this?

  • I have searched the existing issues

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment and review the contribution guide to help.

Description

Not sure if this is a terraform provider design descision or an ARM API limitation
many different resources have a separate resource block to enable cmk encryption instead of passing the cmk info in the original resource block itself.

examples:
"azurerm_kusto_cluster" uses "azurerm_kusto_cluster_customer_managed_key"
"azurerm_mssql_managed_instance" uses "azurerm_mssql_managed_instance_transparent_data_encryption"
"azurerm_mssql_server" uses "azurerm_mssql_server_transparent_data_encryption"

while choosing this approach it is not possible to define policies that use the effect "Deny" on resources that do not use CMK, if the resources are created with terraform, as they never can be created in the first place.

educated guess is that azurerm_kusto_cluster is being created first and the policy engine denies the resource as it is not configured properly.

New or Affected Resource(s)/Data Source(s)

azurerm_kusto_cluster

Potential Terraform Configuration

No response

References

No response

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants