-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for private endpoint in azurerm_storage_account
#11628
Comments
Fix #11628 === RUN TestAccStorageAccount_resourceAccessRules === PAUSE TestAccStorageAccount_resourceAccessRules === CONT TestAccStorageAccount_resourceAccessRules --- PASS: TestAccStorageAccount_resourceAccessRules (465.11s) === RUN TestAccStorageAccountNetworkRules_resourceAccessRules === PAUSE TestAccStorageAccountNetworkRules_resourceAccessRules === CONT TestAccStorageAccountNetworkRules_resourceAccessRules --- PASS: TestAccStorageAccountNetworkRules_resourceAccessRules (381.65s)
This has been released in version 2.59.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.59.0"
}
# ... other configuration ... |
…corp#11629) Fix hashicorp#11628 === RUN TestAccStorageAccount_resourceAccessRules === PAUSE TestAccStorageAccount_resourceAccessRules === CONT TestAccStorageAccount_resourceAccessRules --- PASS: TestAccStorageAccount_resourceAccessRules (465.11s) === RUN TestAccStorageAccountNetworkRules_resourceAccessRules === PAUSE TestAccStorageAccountNetworkRules_resourceAccessRules === CONT TestAccStorageAccountNetworkRules_resourceAccessRules --- PASS: TestAccStorageAccountNetworkRules_resourceAccessRules (381.65s)
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Support for
resource_access_rules
inazurerm_storage_account
.You can use private endpoints for your Azure Storage accounts to allow clients on a virtual network (VNet) to securely access data over a Private Link. The private endpoint uses an IP address from the VNet address space for your storage account service. Network traffic between the clients on the VNet and the storage account traverses over the VNet and a private link on the Microsoft backbone network, eliminating exposure from the public internet.
New or Affected Resource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: