From a9758c37bc46218c3f771313171a4b0977b48fbe Mon Sep 17 00:00:00 2001 From: Steph Date: Tue, 18 Jul 2023 09:36:55 +0200 Subject: [PATCH 1/4] removed kubernetes and kubernetesconfiguration from required.go --- internal/resourceproviders/required.go | 2 -- 1 file changed, 2 deletions(-) diff --git a/internal/resourceproviders/required.go b/internal/resourceproviders/required.go index e2a02f10d555..b2361e808ceb 100644 --- a/internal/resourceproviders/required.go +++ b/internal/resourceproviders/required.go @@ -47,8 +47,6 @@ func Required() map[string]struct{} { "Microsoft.HealthcareApis": {}, "Microsoft.GuestConfiguration": {}, "Microsoft.KeyVault": {}, - "Microsoft.Kubernetes": {}, - "Microsoft.KubernetesConfiguration": {}, "Microsoft.Kusto": {}, "microsoft.insights": {}, "Microsoft.Logic": {}, From 06c1d3e32aaba6a5aea7947aa484f47a388c9bbe Mon Sep 17 00:00:00 2001 From: Steph Date: Tue, 18 Jul 2023 09:57:33 +0200 Subject: [PATCH 2/4] add Note in docs about user permissions --- website/docs/index.html.markdown | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/website/docs/index.html.markdown b/website/docs/index.html.markdown index fa877f401992..5b2c5411cc33 100644 --- a/website/docs/index.html.markdown +++ b/website/docs/index.html.markdown @@ -29,6 +29,8 @@ Terraform supports a number of different methods for authenticating to Azure: We recommend using either a Service Principal or Managed Service Identity when running Terraform non-interactively (such as when running Terraform in a CI server) - and authenticating using the Azure CLI when running Terraform locally. +->**Note:** The Service Principal or Managed Service Identity running Terraform should have permissions to register [Azure Resource Providers](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/resource-providers-and-types). If the user running Terraform has insufficient permissions to register Resource Providers then we recommend setting the property [skip_provider_registration](#skip_provider_registration) in the provider block to prevent auto-registration. + ## Example Usage ```hcl @@ -45,7 +47,9 @@ terraform { # Configure the Microsoft Azure Provider provider "azurerm" { - features {} + features { + skip_provider_registration = true # This is only required when the user running Terraform lacks the permissions to register Azure Resource Providers. + } } # Create a resource group From 78f745f726305ac1923dfc4204290a0e70eb2459 Mon Sep 17 00:00:00 2001 From: stephybun Date: Tue, 18 Jul 2023 10:32:44 +0200 Subject: [PATCH 3/4] review suggestion Co-authored-by: jackofallops <11830746+jackofallops@users.noreply.github.com> --- website/docs/index.html.markdown | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/docs/index.html.markdown b/website/docs/index.html.markdown index 5b2c5411cc33..c503d2c1ae2d 100644 --- a/website/docs/index.html.markdown +++ b/website/docs/index.html.markdown @@ -48,7 +48,7 @@ terraform { # Configure the Microsoft Azure Provider provider "azurerm" { features { - skip_provider_registration = true # This is only required when the user running Terraform lacks the permissions to register Azure Resource Providers. + skip_provider_registration = true # This is only required when the User, Service Principal, or Identity running Terraform lacks the permissions to register Azure Resource Providers. } } From 7f0477b37654fa61c7981a80e59d6a5fe1b60193 Mon Sep 17 00:00:00 2001 From: stephybun Date: Tue, 18 Jul 2023 11:07:55 +0200 Subject: [PATCH 4/4] shorten to managed identity for consistent nomenclature Co-authored-by: Tom Bamford --- website/docs/index.html.markdown | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/docs/index.html.markdown b/website/docs/index.html.markdown index c503d2c1ae2d..47972dae9716 100644 --- a/website/docs/index.html.markdown +++ b/website/docs/index.html.markdown @@ -29,7 +29,7 @@ Terraform supports a number of different methods for authenticating to Azure: We recommend using either a Service Principal or Managed Service Identity when running Terraform non-interactively (such as when running Terraform in a CI server) - and authenticating using the Azure CLI when running Terraform locally. -->**Note:** The Service Principal or Managed Service Identity running Terraform should have permissions to register [Azure Resource Providers](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/resource-providers-and-types). If the user running Terraform has insufficient permissions to register Resource Providers then we recommend setting the property [skip_provider_registration](#skip_provider_registration) in the provider block to prevent auto-registration. +->**Note:** The User, Service Principal or Managed Identity running Terraform should have permissions to register [Azure Resource Providers](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/resource-providers-and-types). If the principal running Terraform has insufficient permissions to register Resource Providers then we recommend setting the property [skip_provider_registration](#skip_provider_registration) in the provider block to prevent auto-registration. ## Example Usage