-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AzureRM KeyVault - Support more than 16 access policies #2837
Comments
@whytoe Thank you for opening this issue, while the documentation on docs has recently been updated (1/6/2019) to reflect the new limit of 1024 Since Terraform uses the I will follow up with the service team to find out if a newer version of the API exists, if so find out if it support the documented 1024 'access policies` as it says on docs.
|
@jeffreyCline why would you close this issue? it is still an issue, it should be tagged upstream Microsoft |
@katbyte or @tombuildsstuff can you confirm if this should be reopened and labelled with the Upstream/Microsoft |
@whytoe agreed this should be re-opened until we can determine which API version support this; @jeffreyCline since this is an API question - would you mind opening a Rest API Specs issue to track this publicly? Thanks |
@tombuildsstuff I have reached out to the service team. |
@tombuildsstuff @whytoe I have dug into this and it looks like the service team updated this value in the RP code on 6/4/2018 @ 7:31 PM. Which means it is now safe to update the resource code to allow 1024 access policies. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Community Note
Description
Key Vault supports up to 1024 access policy entries for a key vault.
Error: module.keyvault_name.azurerm_key_vault.vault: access_policy: attribute supports 16 item maximum, config has 23 declared
New or Affected Resource(s)
azurerm_keyvault
References
https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control - States the 16 limit doesnt exist anymore
https://www.terraform.io/docs/providers/azurerm/r/key_vault_access_policy.html - Talks about the 16 Object Limit
The text was updated successfully, but these errors were encountered: