We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.
Already on GitHub? Sign in to your account
1.8.3
3.100.0
azurerm_key_vault
resource "azurerm_key_vault" "keyvault" { name = var.name location = var.location resource_group_name = var.resource_group_name tenant_id = var.tenant_id public_network_access_enabled = false enable_rbac_authorization = true soft_delete_retention_days = 7 purge_protection_enabled = false sku_name = "standard" }
Output says it's all rainbows... # module.contractreview_keyvault.azurerm_key_vault.keyvault will be created + resource "azurerm_key_vault" "keyvault" { + access_policy = (known after apply) + enable_rbac_authorization = true + id = (known after apply) + location = "australiaeast" + name = "myprojectname-develop-contracts" + public_network_access_enabled = false + purge_protection_enabled = false + resource_group_name = "myprojectname-develop" + sku_name = "standard" + soft_delete_retention_days = 7 + tenant_id = "***" + vault_uri = (known after apply) } Plan: 1 to add, 0 to change, 0 to destroy. module.contractreview_keyvault.azurerm_key_vault.keyvault: Creating... module.contractreview_keyvault.azurerm_key_vault.keyvault: Creation complete after 6s [id=/subscriptions/***/resourceGroups/myprojectname-develop/providers/Microsoft.KeyVault/vaults/myprojectname-develop-contracts] Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
In portal --> created key vault --> Access configuration should be set to "Azure role-based access control (recommended"
Vault access policy is set instead
No
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Is there an existing issue for this?
Community Note
Terraform Version
1.8.3
AzureRM Provider Version
3.100.0
Affected Resource(s)/Data Source(s)
azurerm_key_vault
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
In portal --> created key vault --> Access configuration should be set to "Azure role-based access control (recommended"
Actual Behaviour
Vault access policy is set instead
Steps to Reproduce
resource "azurerm_key_vault" "keyvault" {
name = var.name
location = var.location
resource_group_name = var.resource_group_name
tenant_id = var.tenant_id
public_network_access_enabled = false
enable_rbac_authorization = true
soft_delete_retention_days = 7
purge_protection_enabled = false
sku_name = "standard"
}
Important Factoids
No
References
No
The text was updated successfully, but these errors were encountered: