IMPROVEMENTS:
- Data Source:
azurerm_api_management
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105] - Data Source:
azurerm_kubernetes_cluster
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105] - Data Source:
azurerm_virtual_machine
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105] - Data Source:
azurerm_virtual_machine_scale_set
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105] azurerm_api_management
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_app_service
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_app_service_slot
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_container_group
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_data_factory
- support forpublic_network_enabled
[GH-9605]azurerm_data_factory_dataset_delimited_text
- support for thecompression_type
property [GH-10070]azurerm_data_factory_linked_service_sql_server
: support for thekey_vault_password
block [GH-10032]azurerm_eventgrid_domain
- support for thepublic_network_access_enabled
andinbound_ip_rule
properties [GH-9922]azurerm_eventgrid_topic
- support for thepublic_network_access_enabled
andinbound_ip_rule
properties [GH-9922]azurerm_function_app
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_function_app_slot
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_kusto_cluster
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_linux_virtual_machine
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_linux_virtual_machine_scale_set
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_security_center_automation
- the fieldevent_source
within thesource
block now supportsSecureScoreControls
andSecureScores
[GH-10126]azurerm_synapse_workspace
- support for thesql_identity_control_enabled
property [GH-10033]azurerm_virtual_machine
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_virtual_machine_scale_set
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_windows_virtual_machine
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]azurerm_windows_virtual_machine_scale_set
- adding validation on theidentity_ids
field within theidentity
block [GH-10105]
BUG FIXES:
- Data Source:
azurerm_log_analytics_workspace
- returning the Resource ID in the correct casing [GH-10162] azurerm_api_management
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_app_service
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_app_service_slot
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_application_gateway
- ensuring the casing onidentity_ids
within theidentity
block [GH-10031]azurerm_blueprint_assignment
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_container_group
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_databricks_workspace
- changing the sku no longer always forces a new resource to be created [GH-9541]azurerm_function_app
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_function_app_slot
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_kubernetes_cluster
- ensuring the casing of theuser_assigned_identity_id
field within thekubelet_identity
block [GH-10105]azurerm_kusto_cluster
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_linux_virtual_machine
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_linux_virtual_machine_scale_set
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_monitor_diagnostic_setting
- handling mixed casing of the EventHub Namespace Authorization Rule ID [GH-10104]azurerm_role_assignment
- fix race condition in read after create [GH-10134]azurerm_virtual_machine
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_virtual_machine_scale_set
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_windows_virtual_machine
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]azurerm_windows_virtual_machine_scale_set
- ensuring the casing of theidentity_ids
field within theidentity
block [GH-10105]
BREAKING CHANGES
azurerm_key_vault
- the fieldsoft_delete_enabled
is now defaulted totrue
to match the breaking change in the Azure API where Key Vaults now have Soft Delete enabled by default, which cannot be disabled. This property is now non-functional, defaults totrue
and will be removed in version 3.0 of the Azure Provider. (#10088)azurerm_key_vault
- the fieldsoft_delete_retention_days
is now defaulted to90
days to match the Azure API behaviour, as the Azure API does not return a value for this field when not explicitly configured, so defaulting this removes a diff with0
. (#10088)
FEATURES:
- New Data Source:
azurerm_eventgrid_domain_topic
(#10050) - New Data Source:
azurerm_ssh_public_key
(#9842) - New Resource:
azurerm_data_factory_linked_service_synapse
(#9928) - New Resource:
azurerm_disk_access
(#9889) - New Resource:
azurerm_media_streaming_locator
(#9992) - New Resource:
azurerm_sentinel_alert_rule_fusion
(#9829) - New Resource:
azurerm_ssh_public_key
(#9842)
IMPROVEMENTS:
- batch: updating to API version
2020-03-01
(#10036) - dependencies: upgrading to
v49.2.0
ofgithub.com/Azure/azure-sdk-for-go
(#10042) - dependencies: upgrading to
v0.15.1
ofgithub.com/tombuildsstuff/giovanni
(#10035) - Data Source:
azurerm_hdinsight_cluster
- support for thekafka_rest_proxy_endpoint
property (#8064) - Data Source:
azurerm_databricks_workspace
- support for thetags
property (#9933) - Data Source:
azurerm_subscription
- support for thetags
property (#8064) azurerm_app_service
- now supportsdetailed_error_mesage_enabled
andfailed_request_tracing_enabled
logs settings (#9162)azurerm_app_service
- now supportsservice_tag
inip_restriction
blocks (#9609)azurerm_app_service_slot
- now supportsdetailed_error_mesage_enabled
andfailed_request_tracing_enabled
logs settings (#9162)azurerm_batch_pool
support for thepublic_address_provisioning_type
property (#10036)azurerm_api_management
- supportConsumption_0
for thesku_name
property (#6868)azurerm_cdn_endpoint
- only sendcontent_types_to_compress
andgeo_filter
to the API when actually set (#9902)azurerm_cosmosdb_mongo_collection
- correctly read back the_id
index when mongo 3.6 (#8690)azurerm_container_group
- support for thevolume.empty_dir
property (#9836)azurerm_data_factory_linked_service_azure_file_storage
- support for thefile_share
property (#9934)azurerm_dedicated_host
- support for addtionalsku_name
values (#9951)azurerm_devspace_controller
- deprecating since new DevSpace Controllers can no longer be provisioned, this will be removed in version 3.0 of the Azure Provider (#10049)azurerm_function_app
- makepre_warmed_instance_count
computed to use azure's default (#9069)azurerm_function_app
- now supportsservice_tag
inip_restriction
blocks (#9609)azurerm_hdinsight_hadoop_cluster
- allow the valueStandard_D4a_V4
for thevm_type
property (#10000)azurerm_hdinsight_kafka_cluster
- support for therest_proxy
andkafka_management_node
blocks (#8064)azurerm_key_vault
- the fieldsoft_delete_enabled
is now defaulted totrue
to match the Azure API behaviour where Soft Delete is force-enabled and can no longer be disabled. This field is deprecated, can be safely removed from your Terraform Configuration, and will be removed in version 3.0 of the Azure Provider. (#10088)azurerm_kubernetes_cluster
- add support for network_mode (#8828)azurerm_log_analytics_linked_service
- add validation for resource ID type (#9932)azurerm_log_analytics_linked_service
- update validation to use generated validate functions (#9950)azurerm_monitor_diagnostic_setting
- validation thateventhub_authorization_rule_id
is a EventHub Namespace Authorization Rule ID (#9914)azurerm_monitor_diagnostic_setting
- validation thatlog_analytics_workspace_id
is a Log Analytics Workspace ID (#9914)azurerm_monitor_diagnostic_setting
- validation thatstorage_account_id
is a Storage Account ID (#9914)azurerm_network_security_rule
- increase allowed the number ofapplication_security_group
blocks allowed (#9884)azurerm_sentinel_alert_rule_ms_security_incident
- support thealert_rule_template_guid
anddisplay_name_exclude_filter
properties (#9797)azurerm_sentinel_alert_rule_scheduled
- support for thealert_rule_template_guid
property (#9712)azurerm_sentinel_alert_rule_scheduled
- support for creating incidents (#8564)azurerm_spring_cloud_app
- support the propertieshttps_only
,is_public
, andpersistent_disk
(#9957)azurerm_subscription
- support for thetags
property (#9047)azurerm_synapse_workspace
- support for themanaged_resource_group_name
property (#10017)azurerm_traffic_manager_profile
- support for thetraffic_view_enabled
property (#10005)
BUG FIXES:
provider: will not correctly register the Microsoft.Blueprint
and Microsoft.HealthcareApis
RPs (#10062)
azurerm_application_gateway
- allow750
forfile_upload_limit_mb
when the sku isWAF_v2
(#8753)azurerm_firewall_policy_rule_collection_group
- correctly validate thenetwork_rule_collection.destination_ports
property (#9490)azurerm_cdn_endpoint
- changing manydelivery_rule
conditionmatch_values
to optional (#8850)azurerm_cosmosdb_account
- always includekey_vault_id
in update requests for azure policy enginer compatibility (#9966)azurerm_cosmosdb_table
- do not call the throughput api when serverless (#9749)azurerm_key_vault
- the fieldsoft_delete_retention_days
is now defaulted to90
days to match the Azure API behaviour. (#10088)azurerm_kubernetes_cluster
- parse omslog_analytics_workspace_id
to ensure correct casing (#9976)azurerm_role_assignment
fix crash in retry logic (#10051)azurerm_storage_account
- allow hns whenaccount_tier
isPremium
(#9548)azurerm_storage_share_file
- allowing files smaller than 4KB to be uploaded (#10035)
UPGRADE NOTES:
azurerm_key_vault
- Azure will be introducing a breaking change on December 31st, 2020 by force-enabling Soft Delete on all new and existing Key Vaults. To workaround this, this release of the Azure Provider still allows you to configure Soft Delete on before this date (but once this is enabled this cannot be disabled). Since new Key Vaults will automatically be provisioned using Soft Delete in the future, and existing Key Vaults will be upgraded - a future release will deprecate thesoft_delete_enabled
field and default this to true early in 2021. (#9911)azurerm_key_vault_certificate
- Terraform will now attempt topurge
Certificates during deletion due to the upcoming breaking change in the Azure API where Key Vaults will have soft-delete force-enabled. This can be disabled by setting thepurge_soft_delete_on_destroy
field within thefeatures -> keyvault
block tofalse
. (#9911)azurerm_key_vault_key
- Terraform will now attempt topurge
Keys during deletion due to the upcoming breaking change in the Azure API where Key Vaults will have soft-delete force-enabled. This can be disabled by setting thepurge_soft_delete_on_destroy
field within thefeatures -> keyvault
block tofalse
. (#9911)azurerm_key_vault_secret
- Terraform will now attempt topurge
Secrets during deletion due to the upcoming breaking change in the Azure API where Key Vaults will have soft-delete force-enabled. This can be disabled by setting thepurge_soft_delete_on_destroy
field within thefeatures -> keyvault
block tofalse
. (#9911)
FEATURES:
- New Resource:
azurerm_eventgrid_system_topic_event_subscription
(#9852) - New Resource:
azurerm_media_job
(#9859) - New Resource:
azurerm_media_streaming_endpoint
(#9537) - New Resource:
azurerm_subnet_service_endpoint_storage_policy
(#8966) - New Resource:
azurerm_synapse_managed_private_endpoint
(#9260)
IMPROVEMENTS:
azurerm_app_service
- Add support foroutbound_ip_address_list
andpossible_outbound_ip_address_list
(#9871)azurerm_disk_encryption_set
- support for updatingkey_vault_key_id
(#7913)azurerm_iot_time_series_insights_gen2_environment
- exposingdata_access_fqdn
(#9848)azurerm_key_vault_certificate
- performing a "purge" of the Certificate during deletion if the feature is opted-in within thefeatures
block, see the "Upgrade Notes" for more information (#9911)azurerm_key_vault_key
- performing a "purge" of the Key during deletion if the feature is opted-in within thefeatures
block, see the "Upgrade Notes" for more information (#9911)azurerm_key_vault_secret
- performing a "purge" of the Secret during deletion if the feature is opted-in within thefeatures
block, see the "Upgrade Notes" for more information (#9911)azurerm_log_analytics_linked_service
- Add new fieldsworkspace_id
,read_access_id
, andwrite_access_id
(#9410)azurerm_linux_virtual_machine
- Normalise SSH keys to cover VM import cases (#9897)azurerm_subnet
- support for theservice_endpoint_policy
block (#8966)azurerm_traffic_manager_profile
- support for new fieldmax_return
and support fortraffic_routing_method
to beMultiValue
(#9487)
BUG FIXES:
azurerm_key_vault_certificate
- readingdns_names
andemails
within thesubject_alternative_names
block from the Certificate if not returned from the API (#8631)azurerm_key_vault_certificate
- polling until the Certificate is fully deleted during deletion (#9911)azurerm_key_vault_key
- polling until the Key is fully deleted during deletion (#9911)azurerm_key_vault_secret
- polling until the Secret is fully deleted during deletion (#9911)azurerm_log_analytics_workspace
- adding a state migration to correctly update the Resource ID (#9853)
For information on changes between the v2.40.0 and v2.0.0 releases, please see the previous v2.x changelog entries.
For information on changes in version v1.44.0 and prior releases, please see the v1.x changelog.