Open taipignas opened 1 year ago
the workaround for this would be
Thanks for raising this issue. Seems the access policy is required while using CMK. See the note from https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/mssql_server_transparent_data_encryption#key_vault_key_id.
yes, but terraform will not be able to add the access policy if it was removed. no other changes are detected, just access policy was deleted (by terraform recration or manually). terraform should complete successfully with adding a missing policy, but it will fail instead.
sorry maybe i didnt put it well. i mean remove the policy from azure, but keep it in terraform.
Did we find any proper resolution for the above error?
any solution?
Is there an existing issue for this?
Community Note
Terraform Version
1.4.6
AzureRM Provider Version
3.63.0
Affected Resource(s)/Data Source(s)
azurerm_mssql_database, azurerm_mssql_server_transparent_data_encryption
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
if access is missing but is defined in the configuration, it should be created first and then further procedures processed.
Actual Behaviour
even though the resource has no changes, it throws an error when applying terraform. planning works fine.
Steps to Reproduce
Sorry i cant provide more details right now
Important Factoids
No response
References
No response