-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_batch_account: Batch now supports creation of managed identities, but SystemAssigned Identity block not available #8532
Comments
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
I've posted feature request to Azure SDK For Go regarding this issue Azure/azure-sdk-for-go#15274 |
@magodo now it's supported in the SDK so it should now be possible to add the configuration into the Terraform Provider, using User Assigned Identity with Pool Creation :-) |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
Co-authored-by: aristosvo <[email protected]> Fixes #8532
This functionality has been released in v2.82.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Currently, Azure batch now supports creating batch accounts with a managed identity attached to it (https://docs.microsoft.com/en-us/azure/batch/batch-customer-managed-key). This makes accessing the keyvault much easier than a certificate solution. I was hoping this could be added to terraform with the principalId for the managed identity also returned so can be added in the access policy of the key vault.
New or Affected Resource(s)
azurerm_batch_account
Potential Terraform Configuration
The text was updated successfully, but these errors were encountered: